World Scientific Series in Digital Forensics and Cybersecurity最新文献

筛选
英文 中文
Operations and Functions in the Proposed OSN OSN的操作和功能
World Scientific Series in Digital Forensics and Cybersecurity Pub Date : 2019-08-01 DOI: 10.1142/9789811205927_0004
{"title":"Operations and Functions in the Proposed OSN","authors":"","doi":"10.1142/9789811205927_0004","DOIUrl":"https://doi.org/10.1142/9789811205927_0004","url":null,"abstract":"","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115034917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BACK MATTER 回到问题
World Scientific Series in Digital Forensics and Cybersecurity Pub Date : 2019-08-01 DOI: 10.1142/9789811205927_bmatter
{"title":"BACK MATTER","authors":"","doi":"10.1142/9789811205927_bmatter","DOIUrl":"https://doi.org/10.1142/9789811205927_bmatter","url":null,"abstract":"","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124656249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feasibility, Performance, and Scalability Analysis 可行性、性能和可伸缩性分析
World Scientific Series in Digital Forensics and Cybersecurity Pub Date : 2019-08-01 DOI: 10.1142/9789811205927_0006
{"title":"Feasibility, Performance, and Scalability Analysis","authors":"","doi":"10.1142/9789811205927_0006","DOIUrl":"https://doi.org/10.1142/9789811205927_0006","url":null,"abstract":"","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130817169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FRONT MATTER 前页
World Scientific Series in Digital Forensics and Cybersecurity Pub Date : 2019-08-01 DOI: 10.1142/9789811205927_fmatter
{"title":"FRONT MATTER","authors":"","doi":"10.1142/9789811205927_fmatter","DOIUrl":"https://doi.org/10.1142/9789811205927_fmatter","url":null,"abstract":"","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131893831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Background and Related Work 背景及相关工作
World Scientific Series in Digital Forensics and Cybersecurity Pub Date : 2019-08-01 DOI: 10.1142/9789811205927_0002
Bill Hess
{"title":"Background and Related Work","authors":"Bill Hess","doi":"10.1142/9789811205927_0002","DOIUrl":"https://doi.org/10.1142/9789811205927_0002","url":null,"abstract":"In computer graphics, the View Frustum determines which parts of the scene are drawn on the screen. The View Frustum is an area that is defined by 6 planes. These planes represent the borders of what is visible on the screen defined by the camera. They constrain the top, bottom, left, right, front and back of the viewing area. The most important to us the back view plane. Unlike the top, bottom, left and right frustum planes, the back plane actually removes geometry from the scene that would otherwise be visible. As the camera moves through the scene, geometry in the background will suddenly appear and disappear as it moves across the back view plane. The distance between the front and back view planes determines the depth of scene. The front view plane is usually fixed very close to the camera position. This means that the depth is determined by how far the back plane is placed away from the camera. Ideally we would like to place the back view plane infinitely far away from the camera so that no background geometry is removed from the screen. However, there are two limitations that prevent this. The first is the limitation of the Z-buffer. The Z-buffer is an area of video memory that stores the depths at which polygons are drawn for every pixel. When polygons are drawn in the scene, their depth is calculated for every pixel they will occupy. If the depth recorded in the depth buffer is closer to the camera than the current polygon at that pixel, it will not be drawn. This allows graphics application writers to not worry about the order in which they decide to draw objects in the scene. This also allows geometry to intersect while preserving the proper depth ordering. The Z-buffer can only hold a finite number of values. In any given scene, there is a range of possible distances from the camera that can map to the same Z-buffer value. This is not an issue in many graphics scenes because the depth of the scene is not very large and even very close objects are rendered properly. However, as the back plane is pushed away from the camera, the range of values mapping to the same Z-buffer value increases. The Z-buffer precision cannot change per application as it is implemented in hardware. If two differently colored objects are drawn to the same depth in the Z-buffer, the hardware may choose which object to draw per pixel in an undefined way.","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114904678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conclusions and Future Works 结论及未来工作
World Scientific Series in Digital Forensics and Cybersecurity Pub Date : 2019-08-01 DOI: 10.1007/978-3-319-05849-8_10
E. McCalla
{"title":"Conclusions and Future Works","authors":"E. McCalla","doi":"10.1007/978-3-319-05849-8_10","DOIUrl":"https://doi.org/10.1007/978-3-319-05849-8_10","url":null,"abstract":"","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of the Proposed Architecture 提议架构的安全性分析
World Scientific Series in Digital Forensics and Cybersecurity Pub Date : 2019-08-01 DOI: 10.1142/9789811205927_0005
{"title":"Security Analysis of the Proposed Architecture","authors":"","doi":"10.1142/9789811205927_0005","DOIUrl":"https://doi.org/10.1142/9789811205927_0005","url":null,"abstract":"","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115109242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Fundamental Network Architecture and Other Preliminaries of the Proposed Solution 提出的解决方案的基本网络结构和其他初步设想
World Scientific Series in Digital Forensics and Cybersecurity Pub Date : 2019-08-01 DOI: 10.1142/9789811205927_0003
{"title":"The Fundamental Network Architecture and Other Preliminaries of the Proposed Solution","authors":"","doi":"10.1142/9789811205927_0003","DOIUrl":"https://doi.org/10.1142/9789811205927_0003","url":null,"abstract":"","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131908442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信