DEVELOPING A SECURE GEOSPATIAL VISUALIZATION AND COLLABORATION SYSTEM USING SOFTWARE ENGINEERING TECHNOLOGY

H. Yu, L. Wang, J. Zhang, J. Barksdale, and X. Yuan

References

  1. [1] D. Cline & P. Egbert, Terrain decimation through quadtree morphing, IEEE Trans. on Visualization and Computer Graphics, 7 (1), 2001, 62–69. 357 doi:10.1109/2945.910822
  2. [2] M. Duchaineau, M. Wolinsky, D. Sigeti, M. Miller, C. Aldrich, & M.B. Mineev-Weinstein, ROAMing terrain: Real-time optimally adapting meshes, Proc. IEEE Visualization ’97, Phoenix, AZ, 1997, 81–88. doi:10.1109/VISUAL.1997.663860
  3. [3] R. Pajarola & E. Zurich, Large scale terrain visualization using the restricted quadtree triangulation, Proc. IEEE Visualization ’98, Research Triangle Park, North Carolina, 1998, 19–26. doi:10.1109/VISUAL.1998.745280
  4. [4] http://sismissionsystems.boeing.com/support/index.cfm? content=edge_viewer.
  5. [5] http://www.nima.mil/.
  6. [6] T. Goddard & V.S. Sunderam, ToolSpace: Web-based 3D collaboration, Proc. 4th Symp. on the Virtual Reality Modeling Language, Paderborn, Germany, 1999, 161–166. doi:10.1145/299246.299290
  7. [7] T.J. Jankun-Kelly, O. Kreylos, K. Ma, B. Hamam, K. Joy, J. Shalf & E.W. Bethel, Deploying web-based visual exploration tools on the grid, IEEE Computer Graphics and Applications, 23 (2), 2003, 40–50. doi:10.1109/MCG.2003.1185579
  8. [8] M. Jern, Collaborative visual data navigation on the Web, Proc. IEEE Int. Conf. on Information Visualization, London, 2000, 268–273. doi:10.1109/IV.2000.859767
  9. [9] J. Wood, K. Brodlie, & H. Wright, Visualization over the World Wide Web and its application to environmental data, Proc. IEEE Int. Conf. Visualization, San Francisco, 1996, 81–86.
  10. [10] R. Oppliger, Security technologies for the World Wide Web (Artech House, 2002).
  11. [11] A. Probst, W. Essmayr, & E. Weippl, Reusable components for developing security-aware applications, Proc. 18th Annual Computer Security Applications Conference, Las Vegas, 2002, 239–248. doi:10.1109/CSAC.2002.1176295
  12. [12] A.D. Rubin & D.E. Geer, A survey of web security, IEEE Computer, September 1998, 34–41. doi:10.1109/2.708448
  13. [13] D. Scott & R. Sharp, Developing secure web applications, IEEE Internet Computing, 2002, 6 (6), 38–45. doi:10.1109/MIC.2002.1067735
  14. [14] G. Konduri & A. Chandrakasan, A framework for collaborative and distributed web-based design, Proc. 36th ACM/IEEE Conf. on Design Automation, New Orleans, 1999, 898–903. doi:10.1145/309847.310095
  15. [15] B. Wydaeghe, K. Verschaeve, B. Michiels, B.V. Damme, E. Arckens, & V. Jonckers, Building an OMT-editor using design patterns: An experience report, Proc. of Technology of ObjectOriented Languages, Santa Barbara, CA, 1998, 26–32.
  16. [16] F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, & M. Stal, Pattern-oriented software architecture, Volume 1: A system of patterns, 1st ed. (John Wiley & Sons, 1996).
  17. [17] JavaTM Secure Socket Extension (JSSE) in J2SE, http:// java.sun.com/products/jsse/javase.html.
  18. [18] SSEC VisAD application, http://www.ssec.wisc.edu/∼billh/ visad.html.
  19. [19] The source for Java technology, http://java.sun.com/.
  20. [20] JavaTM network launching protocol (JNLP) specification, Version: 1.0.1, Sun Microsystems Inc., 2001.

Important Links:

Go Back