Search For:

Displaying 1-10 out of 10 total
An Efficient Direct Volume Rendering Approach for Dichromats
Found in: IEEE Transactions on Visualization and Computer Graphics
By Weifeng Chen,Wei Chen,Hujun Bao
Issue Date:December 2011
pp. 2144-2152
Color vision deficiency (CVD) affects a high percentage of the population worldwide. When seeing a volume visualization result, persons with CVD may be incapable of discriminating the classification information expressed in the image if the color transfer ...
Analytic Double Product Integrals for All-Frequency Relighting
Found in: IEEE Transactions on Visualization and Computer Graphics
By Rui Wang, Minghao Pan, Weifeng Chen, Zhong Ren, Kun Zhou, Wei Hua, Hujun Bao
Issue Date:July 2013
pp. 1133-1142
This paper presents a new technique for real-time relighting of static scenes with all-frequency shadows from complex lighting and highly specular reflections from spatially varying BRDFs. The key idea is to depict the boundaries of visible regions using p...
Privacy-Assured Similarity Query over Graph-Structured Data in Mobile Cloud
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (ICDCSW)
By Yingguang Zhang, Sen Su, Weifeng Chen, Yulong Wang, Peng Xu, Fangchun Yang
Issue Date:July 2013
pp. 398-403
In the emerging mobile cloud paradigm, more and more innovative social applications are provided. The data of these applications is usually represented by the graph structure. For effective data retrieval, it is a crucial requirement to enable substructure...
Wireless Access Point Deployment for Both Coverage and Localization
Found in: Networking, Architecture, and Storage, International Conference on
By Lin Liao, Weifeng Chen, Chuanlin Zhang, Lizhuo Zhang, Weijia Jia
Issue Date:July 2010
pp. 348-356
Wireless access points (APs) divide a plane into small areas where their coverage ranges overlap. A mobile device can be located within a particular small overlapped area based on the unique set of APs covering the device. We formally define an optimal AP ...
Challenges of Location Tracking Techniques in Wireless Forensics
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Emmanuel Velasco, Weifeng Chen, Ping Ji, Raymond Hsieh
Issue Date:August 2008
pp. 3-6
Comparing to wired networks, wireless networks provide several advantages. However, these advantages come at a price. Wireless networks do not carry over the same security features as its wired counterpart. An unprotected wireless network can be easily use...
Modelling Threshold Secret Sharing Schemes in Ad Hoc Networks
Found in: Networking, Architecture, and Storage, International Conference on
By Weifeng Chen, Huan Li
Issue Date:June 2008
pp. 207-214
A threshold secret sharing scheme divides a secret key into multiple shares. The secret key can be constructed based on a certain number of shares, if the number is bigger than the threshold. Threshold secret sharing schemes increase the availability of se...
A Soft Constraint Privacy Model based on Identifiability
Found in: Computer Software and Applications Conference, Annual International
By Weifeng Chen., Zhen Liu, Anton Riabov
Issue Date:July 2007
pp. 675-980
Disclosing any information contained within an information system that stores personal data can be associated with risk. Nevertheless, the risk of privacy violation is often considered acceptable, since otherwise the most routine business operations can be...
Optimizing Event Distribution in Publish/Subscribe Systems in the Presence of Policy-Constraints and Composite Events
Found in: Network Protocols, IEEE International Conference on
By Weifeng Chen, Jim Kurose, Don Towsley, Zihui Ge
Issue Date:November 2005
pp. 191-200
<p>In the publish/subscribe paradigm, information is disseminated from publishers to subscribers that are interested in receiving the information. In practice, information dissemination is often restricted by policy constraints due to concerns such a...
Recommendations in Using Group Key Management Algorithms
Found in: DARPA Information Survivability Conference and Exposition,
By Weifeng Chen, Lakshminath R. Dondeti
Issue Date:April 2003
pp. 222
Scalable group key management (also known as group rekeying) schemes proposed in the literature can be classified into three categories: stateful schemes, stateless schemes and self-healing schemes. These schemes differ mainly on the interdependency of rek...
The Design of Computer Hardware Curriculum Experimental Project Based on SOPC
Found in: Information Science and Engineering, International Conference on
By Bing Li, Bao Ma, Weifeng Chen, Zhengyu Yang
Issue Date:December 2009
pp. 3486-3489
With the rapid development of integrated circuit, the traditional experimental model of computer hardware curriculum can't meet the demand of the present development. This paper discussed experimental systems model based on SOPC under the foundation of the...