H. Yu, L. Wang, J. Zhang, J. Barksdale, and X. Yuan
[1] D. Cline & P. Egbert, Terrain decimation through quadtreemorphing, IEEE Trans. on Visualization and Computer Graphics, 7 (1), 2001, 62–69.357 doi:10.1109/2945.910822 [2] M. Duchaineau, M. Wolinsky, D. Sigeti, M. Miller, C. Aldrich,& M.B. Mineev-Weinstein, ROAMing terrain: Real-time optimally adapting meshes, Proc. IEEE Visualization ’97, Phoenix,AZ, 1997, 81–88. doi:10.1109/VISUAL.1997.663860 [3] R. Pajarola & E. Zurich, Large scale terrain visualization usingthe restricted quadtree triangulation, Proc. IEEE Visualization’98, Research Triangle Park, North Carolina, 1998, 19–26. doi:10.1109/VISUAL.1998.745280 [4] http://sismissionsystems.boeing.com/support/index.cfm?content=edge_viewer. [5] http://www.nima.mil/. [6] T. Goddard & V.S. Sunderam, ToolSpace: Web-based 3Dcollaboration, Proc. 4th Symp. on the Virtual Reality ModelingLanguage, Paderborn, Germany, 1999, 161–166. doi:10.1145/299246.299290 [7] T.J. Jankun-Kelly, O. Kreylos, K. Ma, B. Hamam, K. Joy, J.Shalf & E.W. Bethel, Deploying web-based visual explorationtools on the grid, IEEE Computer Graphics and Applications,23 (2), 2003, 40–50. doi:10.1109/MCG.2003.1185579 [8] M. Jern, Collaborative visual data navigation on the Web,Proc. IEEE Int. Conf. on Information Visualization, London,2000, 268–273. doi:10.1109/IV.2000.859767 [9] J. Wood, K. Brodlie, & H. Wright, Visualization over the WorldWide Web and its application to environmental data, Proc.IEEE Int. Conf. Visualization, San Francisco, 1996, 81–86. [10] R. Oppliger, Security technologies for the World Wide Web(Artech House, 2002). [11] A. Probst, W. Essmayr, & E. Weippl, Reusable componentsfor developing security-aware applications, Proc. 18th AnnualComputer Security Applications Conference, Las Vegas, 2002,239–248. doi:10.1109/CSAC.2002.1176295 [12] A.D. Rubin & D.E. Geer, A survey of web security, IEEEComputer, September 1998, 34–41. doi:10.1109/2.708448 [13] D. Scott & R. Sharp, Developing secure web applications,IEEE Internet Computing, 2002, 6 (6), 38–45. doi:10.1109/MIC.2002.1067735 [14] G. Konduri & A. Chandrakasan, A framework for collaborativeand distributed web-based design, Proc. 36th ACM/IEEEConf. on Design Automation, New Orleans, 1999, 898–903. doi:10.1145/309847.310095 [15] B. Wydaeghe, K. Verschaeve, B. Michiels, B.V. Damme, E.Arckens, & V. Jonckers, Building an OMT-editor using designpatterns: An experience report, Proc. of Technology of Object-Oriented Languages, Santa Barbara, CA, 1998, 26–32. [16] F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, &M. Stal, Pattern-oriented software architecture, Volume 1: Asystem of patterns, 1st ed. (John Wiley & Sons, 1996). [17] JavaTM Secure Socket Extension (JSSE) in J2SE, http://java.sun.com/products/jsse/javase.html. [18] SSEC VisAD application, http://www.ssec.wisc.edu/∼billh/visad.html. [19] The source for Java technology, http://java.sun.com/. [20] JavaTM network launching protocol (JNLP) specification, Version: 1.0.1, Sun Microsystems Inc., 2001.
Important Links:
Go Back