{"title":"协同虚拟环境中的联合操作管理","authors":"Xiaojun Shen, N. Georganas","doi":"10.1109/HAVE.2003.1244732","DOIUrl":null,"url":null,"abstract":"Some international standards have been developed that are very likely to make a major impact on CVE (Collaborative Virtual Environment) technology: the Distributed Interactive Simulation (DIS) (IEEE Standard 1278.1) and the High Level Architecture (HLA) (IEEE Standard 1516). Deriving from military-purpose simulations, DIS and HLA, however, have limitations on building large-scale general-purpose CVE applications. For instance, HLA object-attribute based ownership management only allows joint manipulation in a constraint-based solution. The purpose of this research effort is to realize joint manipulation management in CVE. This paper begins with a discussion of interaction requests and interaction model and proceeds to describe three generic approaches for joint manipulation management: Constraint-based, Synchronized and Non Synchronized.","PeriodicalId":431267,"journal":{"name":"The 2nd IEEE Internatioal Workshop on Haptic, Audio and Visual Environments and Their Applications, 2003. HAVE 2003. Proceedings.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Joint manipulation management in collaborative virtual environments\",\"authors\":\"Xiaojun Shen, N. Georganas\",\"doi\":\"10.1109/HAVE.2003.1244732\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Some international standards have been developed that are very likely to make a major impact on CVE (Collaborative Virtual Environment) technology: the Distributed Interactive Simulation (DIS) (IEEE Standard 1278.1) and the High Level Architecture (HLA) (IEEE Standard 1516). Deriving from military-purpose simulations, DIS and HLA, however, have limitations on building large-scale general-purpose CVE applications. For instance, HLA object-attribute based ownership management only allows joint manipulation in a constraint-based solution. The purpose of this research effort is to realize joint manipulation management in CVE. This paper begins with a discussion of interaction requests and interaction model and proceeds to describe three generic approaches for joint manipulation management: Constraint-based, Synchronized and Non Synchronized.\",\"PeriodicalId\":431267,\"journal\":{\"name\":\"The 2nd IEEE Internatioal Workshop on Haptic, Audio and Visual Environments and Their Applications, 2003. HAVE 2003. Proceedings.\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-11-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The 2nd IEEE Internatioal Workshop on Haptic, Audio and Visual Environments and Their Applications, 2003. HAVE 2003. Proceedings.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HAVE.2003.1244732\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 2nd IEEE Internatioal Workshop on Haptic, Audio and Visual Environments and Their Applications, 2003. HAVE 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HAVE.2003.1244732","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Joint manipulation management in collaborative virtual environments
Some international standards have been developed that are very likely to make a major impact on CVE (Collaborative Virtual Environment) technology: the Distributed Interactive Simulation (DIS) (IEEE Standard 1278.1) and the High Level Architecture (HLA) (IEEE Standard 1516). Deriving from military-purpose simulations, DIS and HLA, however, have limitations on building large-scale general-purpose CVE applications. For instance, HLA object-attribute based ownership management only allows joint manipulation in a constraint-based solution. The purpose of this research effort is to realize joint manipulation management in CVE. This paper begins with a discussion of interaction requests and interaction model and proceeds to describe three generic approaches for joint manipulation management: Constraint-based, Synchronized and Non Synchronized.