Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253463
P. Inostroza
In this paper, a real-time tracking/synthesis loop is proposed to animate the eye texture of a 3D head model by a camera performance. The user's eyes, captured by a video camera, are tracked by means of a frame-rate pupil detector technique, based on an active illumination scheme. A small area of interest is selected around each pupil detected in the video. These areas contain the eye and eyebrow features. Substituting the captured areas on the texture of the 3D model, the eyes and eyebrows animation is created. To avoid the 'collage' effect, the extracted areas are color-corrected, stretched and blended with the texture.
{"title":"Real-time update on the 3D head model texture","authors":"P. Inostroza","doi":"10.1109/CYBER.2003.1253463","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253463","url":null,"abstract":"In this paper, a real-time tracking/synthesis loop is proposed to animate the eye texture of a 3D head model by a camera performance. The user's eyes, captured by a video camera, are tracked by means of a frame-rate pupil detector technique, based on an active illumination scheme. A small area of interest is selected around each pupil detected in the video. These areas contain the eye and eyebrow features. Substituting the captured areas on the texture of the 3D model, the eyes and eyebrows animation is created. To avoid the 'collage' effect, the extracted areas are color-corrected, stretched and blended with the texture.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132470049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253442
Tolga Abaci, Rachel de Bondeli, J. Cíger, M. Clavien, Fatih Erol, M. Gutiérrez, Stéphanie Noverraz, Olivier Renault, F. Vexo, D. Thalmann
This paper presents an evaluation of the benefits and user acceptance of a multimodal interface in which the user interacts with a game-like interactive virtual reality application "The Enigma of the Sphinx". The interface consists of a large projection screen as the main display, a "magic wand", a stereo sound system and the user's voice for "casting spells". We present our conclusions concerning "friendliness" and sense of presence, based on observations of more than 150 users in a public event.
{"title":"The enigma of the sphinx","authors":"Tolga Abaci, Rachel de Bondeli, J. Cíger, M. Clavien, Fatih Erol, M. Gutiérrez, Stéphanie Noverraz, Olivier Renault, F. Vexo, D. Thalmann","doi":"10.1109/CYBER.2003.1253442","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253442","url":null,"abstract":"This paper presents an evaluation of the benefits and user acceptance of a multimodal interface in which the user interacts with a game-like interactive virtual reality application \"The Enigma of the Sphinx\". The interface consists of a large projection screen as the main display, a \"magic wand\", a stereo sound system and the user's voice for \"casting spells\". We present our conclusions concerning \"friendliness\" and sense of presence, based on observations of more than 150 users in a public event.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115027931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253484
Lee Chye Seng, Tan Tiong Hok
In a short span of 3 years, the Nanyang Technological University (NTU) in Singapore witnessed a quantum growth in the adoption of e-learning. With the use of professors-friendly e-learning applications, NTU managed to achieve mass buy-in by the professors when the e-learning take-up rate is near 90% of the existing NTU course curriculum. As NTU moves on to celebrate the 3 rd year anniversary of e-learning experience, revolutionary measures were taken to come up with careful design considerations that aim to "humanize" e-learning, i.e. make e-learning interactive and fun with active human collaborations. This includes the proliferation use of video talking head that synchronizes with the lecture presentation, and live audio-video delivery, text chat and document annotations of a lecture delivery. This paper reviews the process NTU adopted in adding human touch to traditional e-learning projects and serves as a good case study for the other institutions that aim to achieve interactive or engaged on-line learning.
{"title":"Humanizing e-learning","authors":"Lee Chye Seng, Tan Tiong Hok","doi":"10.1109/CYBER.2003.1253484","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253484","url":null,"abstract":"In a short span of 3 years, the Nanyang Technological University (NTU) in Singapore witnessed a quantum growth in the adoption of e-learning. With the use of professors-friendly e-learning applications, NTU managed to achieve mass buy-in by the professors when the e-learning take-up rate is near 90% of the existing NTU course curriculum. As NTU moves on to celebrate the 3 rd year anniversary of e-learning experience, revolutionary measures were taken to come up with careful design considerations that aim to \"humanize\" e-learning, i.e. make e-learning interactive and fun with active human collaborations. This includes the proliferation use of video talking head that synchronizes with the lecture presentation, and live audio-video delivery, text chat and document annotations of a lecture delivery. This paper reviews the process NTU adopted in adding human touch to traditional e-learning projects and serves as a good case study for the other institutions that aim to achieve interactive or engaged on-line learning.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129335126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253446
Pavol Eliás, A. Ferko, M. Grabner
The paper introduces a new way of understanding the web graphics phenomenon. We based it on the popular culture approach by M. Bakhtin. We introduce and exemplify the categories of ambiguous messages created and communicated by web graphics. The discussion on coding of ambiguous information is given. Revolution in multimedia requires completing conventions in information coding. One day, the paradigm of unambiguous meaning of coded information will be attacked by the needs of coding of ambiguous meaning. The paper proposes one way how to code the ambiguity. For transparent illustration only the comic information is used (but not defined). One possible way of visualization of structure of coded comic information is shown. The implication for user interface is discussed. Sharing of ambiguous visual content is undoubtedly one of the prominent Web-based graphics applications.
{"title":"Bakhtinian understanding to Web graphics","authors":"Pavol Eliás, A. Ferko, M. Grabner","doi":"10.1109/CYBER.2003.1253446","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253446","url":null,"abstract":"The paper introduces a new way of understanding the web graphics phenomenon. We based it on the popular culture approach by M. Bakhtin. We introduce and exemplify the categories of ambiguous messages created and communicated by web graphics. The discussion on coding of ambiguous information is given. Revolution in multimedia requires completing conventions in information coding. One day, the paradigm of unambiguous meaning of coded information will be attacked by the needs of coding of ambiguous meaning. The paper proposes one way how to code the ambiguity. For transparent illustration only the comic information is used (but not defined). One possible way of visualization of structure of coded comic information is shown. The implication for user interface is discussed. Sharing of ambiguous visual content is undoubtedly one of the prominent Web-based graphics applications.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131620936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253494
Zhuowei Li, A. Das, Sukumar Nandi
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more and more attention. In this paper, one anomaly-based intrusion detection technique (ScanAID: Statistical ChAracteristics of N-grams for Anomaly-based Intrusion Detection) is proposed to detect intrusive behaviors in a computer system. The statistical properties in sequences of system calls are abstracted to model the normal behaviors of a privileged process, in which the model is characterized by a vector of anomaly values of N-grams. With a reasonable definition of efficiency parameter, the length of an N-gram and the size of the training dataset are optimized to get an efficient and compact model. Then, with the optimal modeling parameters, the flexibility and efficiency of the model are evaluated by the ROC curves. Our experimental results show that the proposed statistical anomaly detection technique is promising and deserves further research (such as applying it to network environments).
信息和基础设施安全是全球关注的重大问题。入侵检测技术作为安全基础设施的最后一道防线,越来越受到人们的重视。本文提出了一种基于异常的入侵检测技术(ScanAID: Statistical ChAracteristics of N-grams for anomaly-based intrusion detection),用于检测计算机系统中的入侵行为。将系统调用序列中的统计属性抽象为特权进程的正常行为模型,该模型用N-grams异常值向量来表征。通过合理定义效率参数,优化N-gram的长度和训练数据集的大小,得到高效紧凑的模型。然后,利用最优建模参数,通过ROC曲线对模型的灵活性和效率进行评价。实验结果表明,所提出的统计异常检测技术是有前途的,值得进一步研究(例如将其应用于网络环境)。
{"title":"Utilizing statistical characteristics of N-grams for intrusion detection","authors":"Zhuowei Li, A. Das, Sukumar Nandi","doi":"10.1109/CYBER.2003.1253494","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253494","url":null,"abstract":"Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more and more attention. In this paper, one anomaly-based intrusion detection technique (ScanAID: Statistical ChAracteristics of N-grams for Anomaly-based Intrusion Detection) is proposed to detect intrusive behaviors in a computer system. The statistical properties in sequences of system calls are abstracted to model the normal behaviors of a privileged process, in which the model is characterized by a vector of anomaly values of N-grams. With a reasonable definition of efficiency parameter, the length of an N-gram and the size of the training dataset are optimized to get an efficient and compact model. Then, with the optimal modeling parameters, the flexibility and efficiency of the model are evaluated by the ROC curves. Our experimental results show that the proposed statistical anomaly detection technique is promising and deserves further research (such as applying it to network environments).","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134228385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253455
V. Savchenko, I. Semenova, Nikita Kojekine, O. Egorova, Michael A. Savchenko, I. Hagiwara
This paper presents work in progress and continues a project devoted to developing shape modeling system based on implementation of radial based function (RBF) technology. In this paper, we study the opportunities offered by this technology to computer-aided design and computer graphics communities by looking at the problems of surface generation and enhancement. Experimental results are included to demonstrate the functionality of our mesh-modeling tool.
{"title":"Mesh generation and refinement of polygonal data sets","authors":"V. Savchenko, I. Semenova, Nikita Kojekine, O. Egorova, Michael A. Savchenko, I. Hagiwara","doi":"10.1109/CYBER.2003.1253455","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253455","url":null,"abstract":"This paper presents work in progress and continues a project devoted to developing shape modeling system based on implementation of radial based function (RBF) technology. In this paper, we study the opportunities offered by this technology to computer-aided design and computer graphics communities by looking at the problems of surface generation and enhancement. Experimental results are included to demonstrate the functionality of our mesh-modeling tool.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132600321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253450
J. Zheng, Min Shi
This work establishes a cyber space of an urban area for visiting on the Internet. By registering entire scenes along every street and scenes at many locations, people can visually travel from street to street, and reach their destinations in cyber city. The issues we discuss here are how to map a large scale area to image domain in a small amount of data, how to cover visual information as complete as possible in the mapping, and how to effectively display the captured scenes for various activities in cyber city. Route Panoramas captured along streets and Panoramic Views captured at widely open sites are associated to city maps to provide a navigation function. This paper focuses on the properties of our extended images - route panorama, the archiving process applied to an urban area, and a real environment we developed to transmit and display scenes on the WWW and portable devices. The created cyber spaces of real cities have broad applications such as city tour, real estate, E-commerce, heritage preservation, urban planning and construction.
{"title":"Mapping cityscapes to cyber space","authors":"J. Zheng, Min Shi","doi":"10.1109/CYBER.2003.1253450","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253450","url":null,"abstract":"This work establishes a cyber space of an urban area for visiting on the Internet. By registering entire scenes along every street and scenes at many locations, people can visually travel from street to street, and reach their destinations in cyber city. The issues we discuss here are how to map a large scale area to image domain in a small amount of data, how to cover visual information as complete as possible in the mapping, and how to effectively display the captured scenes for various activities in cyber city. Route Panoramas captured along streets and Panoramic Views captured at widely open sites are associated to city maps to provide a navigation function. This paper focuses on the properties of our extended images - route panorama, the archiving process applied to an urban area, and a real environment we developed to transmit and display scenes on the WWW and portable devices. The created cyber spaces of real cities have broad applications such as city tour, real estate, E-commerce, heritage preservation, urban planning and construction.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122309553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253465
Hongen Lu
To form agent cooperation in an open environment, such as the Internet, is extremely difficult, despite agent service is one of the main forces to drive the Web into a growing marketplace of services. In this paper, a method to combine agent services matchmaking and cooperation is proposed. For flexible and semantic matchmaking, multiple strategies are provided; and based on the results of matchmaking, a naive Bayesian model is given for agents to form cooperation. This approach, which considers matchmaking and cooperation formation as one process, brings a new angle for us to solve the connection problem for agents to work collaboratively in a dynamic and open environment, such as the World Wide Web.
{"title":"Agent services matchmaking for cooperation","authors":"Hongen Lu","doi":"10.1109/CYBER.2003.1253465","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253465","url":null,"abstract":"To form agent cooperation in an open environment, such as the Internet, is extremely difficult, despite agent service is one of the main forces to drive the Web into a growing marketplace of services. In this paper, a method to combine agent services matchmaking and cooperation is proposed. For flexible and semantic matchmaking, multiple strategies are provided; and based on the results of matchmaking, a naive Bayesian model is given for agents to form cooperation. This approach, which considers matchmaking and cooperation formation as one process, brings a new angle for us to solve the connection problem for agents to work collaboratively in a dynamic and open environment, such as the World Wide Web.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130907984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253439
Suiping Zhou, Wentong Cai, S. Turner, Hanfeng Zhao
A distributed virtual environment (DVE) enables geographically distributed clients to interact with each other in a simulated environment. Due to the distributed architecture of DVEs, it is generally not easy to evaluate the performance of DVEs. In this paper, we propose a consistency model based on a metric called time-space inconsistency. The model relates a human participant's perception to the characteristic parameters of a DVE. Based on the model, the performance of a DVE can be easily evaluated without the actual execution of the DVE application, which is especially useful in the designing stage of a DVE. A ping-pong game is developed to verify the proposed model. Experiment results show that the model is effective in evaluating the performance of the game.
{"title":"A consistency model for evaluating distributed virtual environments","authors":"Suiping Zhou, Wentong Cai, S. Turner, Hanfeng Zhao","doi":"10.1109/CYBER.2003.1253439","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253439","url":null,"abstract":"A distributed virtual environment (DVE) enables geographically distributed clients to interact with each other in a simulated environment. Due to the distributed architecture of DVEs, it is generally not easy to evaluate the performance of DVEs. In this paper, we propose a consistency model based on a metric called time-space inconsistency. The model relates a human participant's perception to the characteristic parameters of a DVE. Based on the model, the performance of a DVE can be easily evaluated without the actual execution of the DVE application, which is especially useful in the designing stage of a DVE. A ping-pong game is developed to verify the proposed model. Experiment results show that the model is effective in evaluating the performance of the game.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124046350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-03DOI: 10.1109/CYBER.2003.1253459
Zheng Lei, E. Prakash
This paper describes the development of a virtual surgery system, called VQSplat. The system takes volume data as inputs and is capable of display multiple volumetric models, manipulating and editing (cutting) them. The system uses a hierarchical multi-resolution point rendering system, which is derived from an existing point rendering system, QSplat. The features of VQSplat are listed as follows: Use hierarchical multi-resolution point rendering system to render volume data; Support multiple translucent object display; Support object selection, manipulation, free cutting; A unique hierarchical data structure to accelerate the rendering process, as well as cutting, and object splitting; integrated support of raw volume data importing, image enhancement, normal estimation; and portable code. Separate core library with user interface.
{"title":"Virtual surgery system","authors":"Zheng Lei, E. Prakash","doi":"10.1109/CYBER.2003.1253459","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253459","url":null,"abstract":"This paper describes the development of a virtual surgery system, called VQSplat. The system takes volume data as inputs and is capable of display multiple volumetric models, manipulating and editing (cutting) them. The system uses a hierarchical multi-resolution point rendering system, which is derived from an existing point rendering system, QSplat. The features of VQSplat are listed as follows: Use hierarchical multi-resolution point rendering system to render volume data; Support multiple translucent object display; Support object selection, manipulation, free cutting; A unique hierarchical data structure to accelerate the rendering process, as well as cutting, and object splitting; integrated support of raw volume data importing, image enhancement, normal estimation; and portable code. Separate core library with user interface.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123324561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}