• Articles • Previous Articles     Next Articles

Volumetric Virtual Environments

HE Taosong;   

  1. Software Production Research Department; Bell LaboratoriesLucent Technologies; Naperville; IL 60566; USA;
  • Online:2000-01-10 Published:2000-01-10

Driven by fast development of both virtual reality and volume visualization, we discuss some critical techniques towards building a volumetric VRsystem, specifically the modeling, rendering, and manipulations of a volumetric scene.Techniques such as voxel-based object simplification, accelerated volume rendering,fast stereo volume rendering, and volumetric "collision detection" are introduced andimproved, with the idea of demonstrating the possibilities and potential benefits ofincorporating volumetric mode…

Key words: AVS-M; video coding; standard; RTP payload format; file format;



[1] Curless B, Levoy M. A volumetric method for building complex models From range images. In Computer Graphics Proceedings, Annual Conference Series, ACM SIGGRAPH, New Orleans, Lousiana, August 1996, pp.303-312.

[2] Clark J. Hierarchical geometric models for visible surface algorithms. Communications of the ACM., 1976, 19(10): 547-554.

[3] He T, Hong L, Varshney A, Wang S. Controlled topology simplification. IEEE Transactions on Visukzation and Computer Graphics, 1996, 2(2): 171-184. ……….
[1] Adrian Atanasiu. A New Batch Verifying Scheme for Identifying Illegal Signatures [J]. , 2013, 28(1): 144-151.
[2] Ji-Wei Jin (金继伟), Fei-Fei Ma (马菲菲), Member, ACM and Jian Zhang (张健), Senior Member, CCF, ACM, IEEE. Integrating Standard Dependency Schemes in QCSP Solvers [J]. , 2012, 27(1): 37-41.
[3] Qiong Huang(黄 琼) and Duncan S. Wong(王 石). Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model [J]. , 2010, 25(4): 807-826.
[4] Pisai Setthawong and Surat Tanterdtid. Flood Avoidance Mechanisms for Bridged Resilient Packet Rings [J]. , 2008, 23(5 ): 815-824 .
[5] Bo Qin, Qian-Hong Wu, Willy Susilo, Yi Mu, Yu-Min Wang, and Zheng-Tao Jiang. Short Group Signatures Without Random Oracles [J]. , 2007, 22(6): 805-821 .
[6] Pierre Bourque, Serge Oligny, Alain Abran, and Bertrand Fournier. Developing Project Duration Models in Software Engineering [J]. , 2007, 22(3): 348-357 .
[7] Cliff Reader. AVS Intellectual Property Rights (IPR) Policy [J]. , 2006, 21(3): 306-309 .
[8] Qiang Wang, De-Bin Zhao, and Wen Gao. Context-Based 2D-VLC Entropy Coder in AVS Video Coding Standard [J]. , 2006, 21(3): 315-322 .
[9] Jian-Wen Chen, Guo-Ping Li, and Yun He. A Novel MBAFF Scheme of AVS [J]. , 2006, 21(3): 323-331 .
[10] Ye-Kui Wang. AVS-M: From Standards to Applications [J]. , 2006, 21(3): 332-344 .
[11] Tie-Jun Huang and Yong-Liang Liu. Basic Considerations on AVS DRM Architecture [J]. , 2006, 21(3): 366-369 .
[12] Xin-Fu Wang and De-Bin Zhao. Performance Comparison of AVS and H.264/AVC Video Coding Standards [J]. , 2006, 21(3): 310-314 .
[13] HONG XianLong , JING Tong , XU JingYu , BAO HaiYun and GU Jun . CNB: A Critical-Network-Based Timing Optimization Method for Standard Cell Global Routing [J]. , 2003, 18(6): 0-0.
[14] LUO Lin (罗 琳), LI Jin (李 劲), LI ShiPeng (李世鹏) and ZHUANG ZhenQuan (庄镇泉). A Motion Compensated Lifting Wavelet Codec for 3D Video Coding [J]. , 2003, 18(2): 0-0.
[15] ZHOU Shouqin(周受钦),CHIN Kwai Sang(钱桂生),LING Weiqing(凌卫青)and XIE Youbai(谢友柏). Study on Distributed Knowledge Information System for Product Design [J]. , 2001, 16(5): 0-0.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Zhu Mingyuan;. Two Congruent Semantics for Prolog with CUT[J]. , 1990, 5(1): 82 -91 .
[2] Wang Nengbin; Liu Haiqing;. An Intelligent Tool to Support Requirements Analysis and Conceptual Design of Database Design[J]. , 1991, 6(2): 153 -160 .
[3] Lin Shan;. Using a Student Model to Improve Explanation in an ITS[J]. , 1992, 7(1): 92 -96 .
[4] Wang Hui; Liu Dayou; Wang Yafei;. Sequential Back-Propagation[J]. , 1994, 9(3): 252 -260 .
[5] Jiang Chanaiun;. Net Operations (Ⅱ)-The Iterated Addition Operation of Petri Nets[J]. , 1995, 10(6): 509 -517 .
[6] Yu Huiqun; Sun Yongqiang;. Hybridity in Embedded Computing Systems[J]. , 1996, 11(1): 90 -96 .
[7] Yu Huiqun; Song Guoxin; Sun Yongqiang;. Completeness of the Accumulation Calculus[J]. , 1998, 13(1): 25 -31 .
[8] Chen Gang;. Dependent Type System with Subtyping (I)Type Level Transitivity Elimination[J]. , 1998, 13(6): 564 -578 .
[9] CHEN Haiming;. Function Definition Language FDL andIts Implementation[J]. , 1999, 14(4): 414 -421 .
[10] LIAO Husheng;. An Action Analysis for Combining Partial Evaluation[J]. , 2000, 15(2): 196 -201 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved