{"title":"Operations and Functions in the Proposed OSN","authors":"","doi":"10.1142/9789811205927_0004","DOIUrl":"https://doi.org/10.1142/9789811205927_0004","url":null,"abstract":"","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115034917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BACK MATTER","authors":"","doi":"10.1142/9789811205927_bmatter","DOIUrl":"https://doi.org/10.1142/9789811205927_bmatter","url":null,"abstract":"","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124656249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feasibility, Performance, and Scalability Analysis","authors":"","doi":"10.1142/9789811205927_0006","DOIUrl":"https://doi.org/10.1142/9789811205927_0006","url":null,"abstract":"","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130817169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FRONT MATTER","authors":"","doi":"10.1142/9789811205927_fmatter","DOIUrl":"https://doi.org/10.1142/9789811205927_fmatter","url":null,"abstract":"","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131893831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Background and Related Work","authors":"Bill Hess","doi":"10.1142/9789811205927_0002","DOIUrl":"https://doi.org/10.1142/9789811205927_0002","url":null,"abstract":"In computer graphics, the View Frustum determines which parts of the scene are drawn on the screen. The View Frustum is an area that is defined by 6 planes. These planes represent the borders of what is visible on the screen defined by the camera. They constrain the top, bottom, left, right, front and back of the viewing area. The most important to us the back view plane. Unlike the top, bottom, left and right frustum planes, the back plane actually removes geometry from the scene that would otherwise be visible. As the camera moves through the scene, geometry in the background will suddenly appear and disappear as it moves across the back view plane. The distance between the front and back view planes determines the depth of scene. The front view plane is usually fixed very close to the camera position. This means that the depth is determined by how far the back plane is placed away from the camera. Ideally we would like to place the back view plane infinitely far away from the camera so that no background geometry is removed from the screen. However, there are two limitations that prevent this. The first is the limitation of the Z-buffer. The Z-buffer is an area of video memory that stores the depths at which polygons are drawn for every pixel. When polygons are drawn in the scene, their depth is calculated for every pixel they will occupy. If the depth recorded in the depth buffer is closer to the camera than the current polygon at that pixel, it will not be drawn. This allows graphics application writers to not worry about the order in which they decide to draw objects in the scene. This also allows geometry to intersect while preserving the proper depth ordering. The Z-buffer can only hold a finite number of values. In any given scene, there is a range of possible distances from the camera that can map to the same Z-buffer value. This is not an issue in many graphics scenes because the depth of the scene is not very large and even very close objects are rendered properly. However, as the back plane is pushed away from the camera, the range of values mapping to the same Z-buffer value increases. The Z-buffer precision cannot change per application as it is implemented in hardware. If two differently colored objects are drawn to the same depth in the Z-buffer, the hardware may choose which object to draw per pixel in an undefined way.","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114904678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conclusions and Future Works","authors":"E. McCalla","doi":"10.1007/978-3-319-05849-8_10","DOIUrl":"https://doi.org/10.1007/978-3-319-05849-8_10","url":null,"abstract":"","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Analysis of the Proposed Architecture","authors":"","doi":"10.1142/9789811205927_0005","DOIUrl":"https://doi.org/10.1142/9789811205927_0005","url":null,"abstract":"","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115109242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Fundamental Network Architecture and Other Preliminaries of the Proposed Solution","authors":"","doi":"10.1142/9789811205927_0003","DOIUrl":"https://doi.org/10.1142/9789811205927_0003","url":null,"abstract":"","PeriodicalId":309628,"journal":{"name":"World Scientific Series in Digital Forensics and Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131908442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}