{"title":"Construction of a Safe Web Service Based on WSE","authors":"Zhi-Guo Chen, Yafeng Xu, Yong-Gang Wang, Hang Li","doi":"10.1109/CW.2008.83","DOIUrl":"https://doi.org/10.1109/CW.2008.83","url":null,"abstract":"With the XML Web Services being widely used, the security problem becomes more and more obvious in Web services because of congenitally deficient. How to guarantee the data transmission security in the web environment has gradually become the consideration of entire Web project quality's key. This paper discusses how to use the WS-Security Specification to build the security of Web services by studying the Web services protocol framework and its data exchange foundation, studies the root of the popularity of Web services and its security problem foundation, and discusses how to use the WS-Security Specification to build the security Web services. Finally, a sample is given to show how to construct a safe and reliable Web Service environment with WSE.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124914721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Immersive Roaming of Stereoscopic Panorama","authors":"Hongfei Fan, Jinyuan Jia, Hongkai Wen, Luchen Tan","doi":"10.1109/CW.2008.87","DOIUrl":"https://doi.org/10.1109/CW.2008.87","url":null,"abstract":"A new solution to stereoscopic panorama roaming is proposed in this paper, which involves stereoscopic panorama acquisition, synchronous panorama roaming technique and some key issues of implementations. It synthesizes traditional panorama technique and stereoscopic displaying technique successfully, and enhances the immersion sense of panorama roaming significantly. The developed prototype and related experiments have sufficiently shown the feasibility and effectiveness of the newly presented approach.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"26 27","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113984153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Texture and Color Based Method for Color Image Segmentation","authors":"H. Yin, Xiaoyan Lou, Mangxian Qiu, Guangxue Yue","doi":"10.1109/CW.2008.111","DOIUrl":"https://doi.org/10.1109/CW.2008.111","url":null,"abstract":"A new method of fully automatic color image segmentation is proposed in this paper. First, colors in the image are quantized to several representing classes in the HSI color space. And then the uniform surface uncertainty of every pixel is computed which will be used to generate the fuzzy image. Then seeds are detected and region growing is implemented to form the initial regions. A region merging algorithm base on the color information is used to merge the over-segmented regions. Utilized in natural image and texture image processing, the new method has got a good performance.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114373163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhihong Tian, Baoshan Qin, Jianwei Ye, Hongli Zhang
{"title":"Alertclu: A Realtime Alert Aggregation and Correlation System","authors":"Zhihong Tian, Baoshan Qin, Jianwei Ye, Hongli Zhang","doi":"10.1109/CW.2008.116","DOIUrl":"https://doi.org/10.1109/CW.2008.116","url":null,"abstract":"Intrusion detection can be defined as the process of identifying malicious behavior that targets a network and its resources. An important problem in the field of intrusion detection is the management of alerts. This paper describes a realtime aggregation and correlation system named Alertclu. With the aid of similarity-based alert clustering analysing technology, Alertclu can improve the aggregation of intrusion detection system outputs and allow one to seamlessly incorporate additional information. In addition, Alertclu supports the operators by classifying alerts into true positives and false positives. The results of experiment show that the proposed system is able to reduce the numerous redundant alerts and effectively reduces the analyst operators' workload.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116015033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Crowd Emotion Contagion Simulation with GPU Acceleration","authors":"Nan Xiang, Zhigeng Pan, Lingyu Zhu, Jianwu Long","doi":"10.1109/CW.2016.37","DOIUrl":"https://doi.org/10.1109/CW.2016.37","url":null,"abstract":"The emotion contagion is an important research point in the crowd simulation field. However, as the positions of crowd usually change dynamically, computing the contagion process becomes a challenge. There exists a solution for a similar problem, the N-body problem, but it's too time consuming to be adapted in crowd simulation as it needs to calculate the reactions between every two objects. In order to solve this problem, we provided a fast adjacent test and contagion computing algorithm with GPU acceleration. Firstly individuals' affection fields were set and projected onto two dimensional ground and represented by squares of the same size; secondly the whole ground was divided into squares as the same size as those for the affection projection; thirdly, adjacent squares were tested to generate the nearer neighbors and the contagion results were calculated. All these steps were processed in parallel by GPU.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114679190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conditional GANs against DNS based unsupervised detection of malicious domains","authors":"Mathias Lundteigen Mohus, Emil Henry Flakk","doi":"10.1109/CW55638.2022.00059","DOIUrl":"https://doi.org/10.1109/CW55638.2022.00059","url":null,"abstract":"While Unsupervised Learning methods have been employed in detecting malicious domains using DNS data, it is unknown if these techniques are robust in an adversarial setting. We present a novel method using a conditional GAN, where DNS data could be generated to evade detection, while maintaining adversarial functionality. This could also be employed defensively, by using the discriminator as a detector.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124247255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerate Your Graphic Program with GPU/CPU Cache","authors":"Likun Zhou, Dingfang Chen","doi":"10.1109/CW.2008.58","DOIUrl":"https://doi.org/10.1109/CW.2008.58","url":null,"abstract":"This paper discusses how to optimize the digital graphic program with cache system used in GPU/CPU architecture to gain more FPS. Firstly, we introduce the basic principle of cache system summarily; secondly, we discuss the three main organization and mapping technologies of cache system in detail, and then compare these three cache mapping solutions by giving examples; thirdly, illustrate the cache-friendly programming style, how to avoid cache race and cache split in programming.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123807570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gps","authors":"Anna Wu, Xiaolong Zhang, Wei Zhang","doi":"10.1109/CW.2008.99","DOIUrl":"https://doi.org/10.1109/CW.2008.99","url":null,"abstract":"The proliferation of GPS units in our life has greatly changed how people find their ways in the real world. However, overreliance on step-by-step route directions from these automated navigation systems may result in less consciously building spatial knowledge of the environment, which is critical to wayfinding. Also, GPS devices may divert people's attention from objects in the physical world to virtual representations on screen, and make people less engaged with the real environment. Consequently, when GPS device are out of access, malfunction, or simply give wrong directions, people may not be well prepared to react to unexpected environmental conditions and find alternative action plans. Such mental unreadiness may cause safety problems in emergency situations. In this paper, we discuss the importance of building spatial awareness in wayfinding activities, analyze GPS features and constraints, and propose the context-awareness design principles that may supplement the efficiency of GPS as well as keep people actively engaged in exploration.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124675462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust Public-key Image Watermarking Scheme Based on Weakness Signal Detection Using Chaos System","authors":"Yanjun Hu, Xiaoping Ma, Li Gao","doi":"10.1109/CW.2008.76","DOIUrl":"https://doi.org/10.1109/CW.2008.76","url":null,"abstract":"This paper presents a different idea that a watermarking scheme can be considered as a weak signal detection in strong noise, while the protected digital work is viewed as noise. Based on detection method of weak square signal in strong noise with a chaotic oscillator, a public-key robust watermarking scheme is proposed. This scheme can show all details except the private key. After the watermarking scheme is described, the model feasibility experiment and anti-attack ability experiments are made and discussed. Experimental and discussion results show that the scheme is robust enough against attacks of the commonly used image processing methods. Also, experimental results show that the algorithm is robust to malicious attacks.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115307574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olivier Heguy, Stéphane Sanchez, A. Berro, H. Luga
{"title":"Generic Classifiers System and Learning Behaviours in Virtual Worlds","authors":"Olivier Heguy, Stéphane Sanchez, A. Berro, H. Luga","doi":"10.1109/CW.2004.35","DOIUrl":"https://doi.org/10.1109/CW.2004.35","url":null,"abstract":"Animating entities in a virtual world is a complex problem. Many are solved using some scripting engines but programmers must spend a lot of time designing and implementing them. The use of learning engines tends to ease the work of the programmer. Learning classifiers systems (LCS) mix learning and evolution to generate adaptive behaviours. The extension of LCS to a polymorphic structure simplifies the rule coding without sacrificing performances. We present in this paper this generic structure and two applications of virtual reality using those systems to produce individual and group behaviours.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"452 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122799435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}