用户名: 密码: 验证码:
面向移动计算的WEB中间件关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
移动计算环境动态多变且异构,面向移动计算的WEB中间件需要适应这些复杂性,本文从提高移动计算平台应用软件的适应性、意识性支持等方面入手,分析了中间件技术的发展现状和趋势,结合移动计算中间件特点和面临的各种挑战,提出了基于意识的Web中间件体系结构,力图实现一种能够较好支持移动计算环境的软件基础架构,并通过原型系统验证该中间件体系结构的有效性。本文主要内容和贡献点包括:
     1.提出了基于意识的移动WEB中间件架构,分析设计了中间件中的WEB技术引擎、上下文感知引擎和意识核心引擎,通过上下文感知引擎,中间件能够获取动态环境中的各种上下文信息,并结合近场通讯(Near FieldCommunication-NFC)技术,利用意识核心引擎,解决动态环境中服务的自动获取,以及应用的适应性问题。
     2.提出了基于NFC的上下文意识中间件架构,解决了移动计算中具有上下文意识的,并能适应各种上下文变化的高级应用问题,提供了上下文意识应用的基础设施支持。同时,基于改进的AdaBoost算法和LBP(Local Binary Pattern)算法,实现了面向移动设备的快速人脸识别系统。基于NFC的上下文意识中间件框架和人脸识别算法,有效支持各种上下文的获取、解释和访问,应用进一步验证该方法能更好地改善用户体验。而且,论文提出了一种跨平台NFC软件栈架构。通过NFC软件栈运行时环境提供抽象的、无差异的操作系统基础服务;通过NFC控制器抽象层向上层屏蔽不同NFC控制器之间的差异;通过NFC服务接口层来适应不同的操作系统或应用框架,以实现对第三方NFC应用的兼容。基于该架构实现的NFC软件栈可以适应多种软硬件平台,使其功能和性能满足移动WEB中间件要求。
     3.提出了面向移动计算的、具有QoE意识的WEB中间件架构,提出了面向多媒体服务的QoS/QoE相关模型,研究了无线网络环境中使用QoS参数评价QoE的方法。使用提出的QoS/QoE相关模型,基于论文提出的移动WEB中间件开发的应用,能够预测特定网络环境中多媒体服务的QoE值,并自动调整应用参数,解决移动多媒体计算环境中应用自动意识并适应网络环境的问题,改善多媒体服务的QoE。而且,论文提出的QoS/QoE相关模型测试QoE的方法与基于模型的方法测试QoE结果做了对比验证,进一步证明论文提出方法的有效性。
     4.提出了面向移动多媒体计算的、具有私密保护意识的中间件架构,基于NFC传感器获得动态环境中私密保护上下文需求信息,提供端到端的视频通讯安全策略,确保只有授权的用户看到视频信息。并采用基于伪随机数的方法实时在DCT域对视频信号加扰,即Intra宏块的变换域参数符号做伪随机翻转,从而使得非授权用户无法正确解码所需要的视频。为保证产生伪随机数的种子状态值的安全传输,对称密钥加密和公钥加密技术用于确保其安全送达接收方。同时,尽可能减少私密意识计算复杂度对实时视频通讯的影响。
     5.提出了针对HTML5Canvas的渲染算法。该算法改进了Canvas的渲染流程;并在优化了Grid算法的基础上实现了线性渐变和放射渐变填充;通过动态跟踪图形的失效区域,合理划分出多个局部待渲染区域,实现了局部渲染,与传统算法相比,在大分辨率的设备上性能提高非常明显;通过分析Canvas中曲线绘制原理,提出了任意圆弧的轮廓化算法,该算法通过中点规则计算出圆弧Bézier曲线的控制点,相比传统算法,算法复杂度小,绘制效率高,适用移动设备。最后的仿真测试验证了以上几个方面优化的良好效果。
Web middleware used in mobile computing must be adaptable to the changefulenvironments of mobile computing. This paper focused on the adaptivity andawareness support of application software in mobile computing platform, analyzed thestate of the art in middleware technology, discussed features and challenges ofmiddleware for mobile computing, and proposed awareness-based web middlewarearchitecture. We aimed to propose a software infrastructure that could meetrequirements of mobile computing and facilitate the development of mobile computingapplications. Experiments made on the prototype middleware system showed thefeasibility and effectiveness of the middleware architecture. The main contents andcontributions include:
     1. Awareness-based web middleware architecture for mobile computing isproposed, and analysis and design of the middleware for web engine, context-sensingengine and awareness core engine are provided. Using context-sensing engine, themiddleware can acquire the various context in the changeful environments of mobilecomputing. Based on NFC technology, the middleware with awareness core engine canautomatically find and acquire services in the changed environments of mobilecomputing, and solve the adaption problem of mobile computing application.
     2. A mobile web middleware architecture for the development ofcontext-awareness applications using NFC(Near Field Communication) and fast facerecognition system on mobile phone which is developed based on improved AdaBoostand LBP(Local Binary Pattern) is presented. Based on it, the efficient support foracquiring, interpreting and accessing contexts is provided, and the developedapplications further verify that the improvement of user's quality of experience isobtained. Moreover, the cross platform NFC stack and its architecture are presented.The NFC stack runtime environment module can offer encapsulated operation systemcore service. The NFC controller abstract layer module can hide the differencebetween different types of NFC controllers to upper layer. The NFC service interface layer module can work with different operation system applicative component anddifferent application framework, and it can support third party NFC applicationperfectly. Now the reference implementation of cross platform NFC stack can work ondifferent platform. The functionality and performance of it can meet the requirement.
     3. Web middleware architecture for the development of QoE-aware multimediaapplications on a mobile device is presented. A QoS/QoE correlation model formultimedia service is proposed, and the QoE evaluation method using QoS parameterin wireless network environment is studied. Using the proposed QoS/QoE correlationmodel, applications based on our web middleware can predict the objective QoE valueof multimedia service in offered network environment and adjust applicationparameters to improve QoE. Moreover, the comparision with model-based approach tomeasuring QoE verifies that the proposed QoS/QoE correlation model is feasible.
     4. Web middleware architecture for the development of privacy-aware mobilemultimedia applications is presented. Base on NFC technology, the middleware canacquire the privacy protection contexts in the changed environments, and provide theend-to-end security scheme for video communication. This system can keepinformation secret from all but those who are authorized to see it. Symmetric keyencryption and public-key encryption techniques are used to ensure privacyinformation security. At the same time, a real-time scrambling approach to concealvideo information is presented. The sign of transform coefficients for Intramacro-block is pseudo-randomly flipped, and so only the authorized persons areallowed to correctly decode the code-stream. Furthermore, this is achieved with a smallimpact on coding performance and negligible computation complexity increase.
     5. HTML Canvas2D vector rendering algorithm. The algorithm improve therender process of Canvas; and implement the linear gradient and radiation gradient fillwhich based on optimized the Grid algorithm; thorough dynamic tracking invalidarea in canvas, collect several regions which will be rendered in canvas to implementpartial rendering. Another optimization strategy is present an outline algorithm forgenerating any circular arc, the algorithm using midpoint rule to calculate controlpoints of cubic bézier curve which is used to fit circular arc. The algorithm has lowercomplexity and higher rendering efficiency compare with the past algorithms, and issuitable for mobile devices implementation. Comparing with the traditional implementation, the methods have obviously performance improvement on highresolution mobile devices. The final simulation tests show above aspects have goodresults in render optimization.
引文
[1] G.S. Blair. The Role of Open Implementation and Reflection Supporting MobileApplications[C]. Proceedings of the9th International Workshop on Database and ExpertSystems Applications, Vienna, Austria,1998,394-399
    [2] D. Saha, A. Mukherjee. Pervasive Computing: A Paradigm for the21st Century. IEEEComputer[M]. IEEE Computer Society Press,2003,25-31
    [3] S.A. Alternis. Solutions for Location Data Mediation[EB/OL]. http://www.alternis.fr/
    [4] A.Pope. The Corba Reference Guide: Understanding the Common Object Request BrokerArchitecture[M]. Addison-Wesley,1998
    [5] S. Baker. Corba Distributed Objects: Using Orbix[M]. Addison-Wesley,1997
    [6] OMG. CORBA Component Model[EB/OL]. http://www.omg.org/cgi-bin/doc?orbos/97-06-12,1997
    [7] D.Rogerson. Inside COM[M]. Microsoft Press,1997
    [8] E.Pitt, K. McNiff. J. Rmi. The Remote Method Invocation Guide[M]. Addison Wesley, June,2001
    [9] R. M-Haefel. Enterprise Javabeans[M]. O’Reilly&Associates,2000
    [10] M.Haahr, R.Cunningham, V.Cahill. Supporting CORBA Applications in a MobileEnvironment (ALICE)[C]. Proceedings of5th International Conference on Mobile Computingand Networking, Seattle, USA,1999,36-47
    [11] T.Reinstorf, R.Ruggaber, J.Seitz. A WAP-based Session Layer Supporting DistributedApplications in Nomadic Environments[C]. Proceedings of International Conference onMiddleware, Heidelberg, Germany,2001,56-76
    [12] R.M-Haefel, D.A.Chappell, M.Loukides. Java Message Service[M]. O’Reilly&Associates,2000
    [13] A.L.Murphy, G.P.Picco,G.-C.Roman. Lime: A Middleware for Physical and LogicalMobility[C]. Proceedings of the21st International Conference on Distributed ComputingSystems (ICDCS-21), Phoenix, USA,2001,524-533
    [14] Softwired. IBus Mobile [EB/OL]. http://www.softwired-inc.com/products/mobile/mobile.html,April,2012
    [15]邓海生,李军怀.基于反射式中间件的移动计算模型[J].计算机工程,2012,38(20):278-281
    [16]胡海洋,马晓星,陶先平,等.反射中间件的研究与进展[J].计算机学报,2005,28(9):1407-1420
    [17] T. Ledoux. OpenCorba: A Reective Open Broker [M]. Saint-Malo, France: Springer-Verlag,July1999,1616(99):197-214
    [18] G.S.Blair, G.Coulson, A.Andersen, et al. The Design and Implementation of Open ORB2[J].IEEE Distributed Systems Online,2001,2(6)
    [19] F.Kon, M.Roman, P.Liu, et al. Monitoring, Security, and Dynamic Configuration with theDynamic TAO Reflective ORB[C]. Proceedings of International Conference on DistributedSystems Platforms and Open Distributed Processing, New York, USA,2000,121-143
    [20] G.Picco, A.Murphy, G.C.Roman. LIME: Linda Meets Mobility[C]. Proceedings of the21stInternational Conference on Software Engineering, Los Angeles, USA,1999,368-377
    [21] W.P.McLaughry, S.W.Lehman,T.J.Ford,et al. T Spaces[J]. IBM Systems Journal,1998,37:3454-3474
    [22] B.Schilit, N.Adams, R.Want. Context-Aware Computing Applications[C]. Proceedings of theWorkshop on Mobile Computing Systems and Applications. Santa Cruz, USA,1994,85-90
    [23] G.Welling, B.Badrinath. An Architecture for Exporting Environment Awareness to MobileComputing[J]. IEEE Transactions on Software Engineering,1998,24(5):391-400
    [24]郑笛,王俊.支持上下文感知的构件适配模型研究[J].计算机工程,2012,38(2):39-41
    [25] N.Bulusu,J.Heidemann,D.Eistrin..GPS-less Low-cost Outdoor Localization For Nery SmallDevices[J]. IEEE Personal Communications,2000,7(5):28-34
    [26] D.Fritsch, D.Klinec, S.Volz. NEXUS-Positioning and Data Management Concepts forLocation Aware Applications[C]. Proceedings of the2nd International Symposium onTelegeop rocessing. Nice-Sophia-Antipolis, France,2000,171-184
    [27] P.R.Pietzuch, J.M.Bacon. Hermes: A Distributed Event-Based Middleware Architecture[C].Submitted to the Workshop on Distributed Event-Based Systems (DEBS),2002
    [28] J.Bacon, K.Moody, J.Bates,et al.Generic Support for Distributed Applications[J].IEEEComputer,2000:68-77
    [29] R.Meier,V.Cahill.STEAM:Event-Based Middleware for Wireless Ad Hoc Networks[C].Proceedings of the International Workshop on Distributed Event-Based Systems, Vienna,Austria,2002,639-644
    [30] S.Liu, L.Cheng. A Context-aware Reflective Middleware Framework for DistributedReal-time and Embedded Systems [J]. Journal of Systems and Software,2011,84(2):205-218
    [31]张华新,胡维华.反射式中间件技术的研究[J].计算机与数字工程,2005,33(10):74-76
    [32] B.Schilit, M.Theimer. Disseminating Active Map Information to Mobile Hosts[J]. Network,IEEE,1994,8:22-32
    [33] B.Gon alves, P.Costa, L.M.Botelho. Context-awareness.CASCOM: Intelligent ServiceCoordination in the Semantic Web Whitestein Series in Software Agent Technologies andAutonomic Computing [M]. Birkh user Basel: February,2011
    [34] K.Henricksen, J.Indulska, A. Rakotonirainy. Modeling Context Information in PervasiveComputing Systems[C].Proceedings of the first international conference on pervasivecomputing, Zurich, Switzerland,2002,167-180
    [35] G.Chen, D.Kotz. A Survey of Context-aware Mobile Computing Research[R]. Hanover, NH,USA: Dartmouth College,2000
    [36] T.Gu, X.H.Wang, H.K.Pung,et al. An Ontology-based Context Model in IntelligentEnvironments[C]. Proceedings of Communication Networks and Distributed SystemsModeling and Simulation Conference, San Diego, USA,2004,270-275
    [37] X.H.Wang,D.Q. Zhang,T.Gu,et al. Ontology Based Context Modeling and Reasoning usingOWL[C]. Proceedings of the Second IEEE Annual Conference on Pervasive Computing andCommunications Workshops, IEEE Computer Society,2004,18-22
    [38] Microsoft (2010). Microsoft Corporation [EB/OL]. www.beautyoftheweb.com/#/highlights/html5. December31,2010
    [39] S. Fetal (2010) Gecko. Mozilla Developer Network [EB/OL]. https://developer.mozilla.org/en/Gecko. December31,2010
    [40] ISO/IEC.21481. Information Technology Telecommunications and Information ExchangeBetween Systems Near Field Communication Interface and Protocol-2(NFCIP-2)[S]. January,2005
    [41] NFC Forum. NFC Record Type Definition (RTD), NFC Forum Technical Specification, Rev.1.0[S]. Jul.2006
    [42]孙强.近距离无线通信技术标准解析[J].信息技术与标准化,2006,5:26-30
    [43]游玉俊,包志华,曹平. ECMA-340标准介绍[J].电信工程技术与标准化,2006,19:38-43
    [44]李小朋.基于NFC技术的电子钱包系统设计与安全性研究[D].北京:北京邮电大学,2007
    [45]夏文栋,林凯.融合NFC的3G智能卡系统[J].计算机工程,2011,37:230-239
    [46]王宇伟,张辉.基于手机的NFC应用研究[J].中国无线电,2007,6:4-8
    [47]蒋华,徐晨,袁红林.基于NFC的移动商务模型研究[J].信息技术,2006,30:66-72
    [48]姚钢. NFC技术将经由Android平台走向普及[J].电子设计技术,2011,3:69-73
    [49] Inside Secure. Open NFC Core Edition-Porting Guide [EB/OL].http://open-nfc.org/documents/SIS_NFC_0709-014%20Open%20NFC%20Core%20Edition%20-%20Porting%20Guide%20v1.9.chm,2012
    [50] Inside Secure. Open NFC-NFC HAL for Microread-Porting Guide[EB/OL].http://open-nfc.org/documents/SIS_NFC_1007-208OpenNFC-NFCHALforMicroread-PortingGuidev0.6.chm,2012
    [51]许海翔,伏京生,翟巍,等. NFC应用的产业生态环境剖析[J].通信世界,2007:48-21
    [52] NFC Forum. NFC Technology Overview [EB/OL]. http://www.nfc-forum.org/events/oulu_spotlight/Technical_Architecture.pdf,2009
    [53] ETSI. Smart Cards: UICC-Contactless Front-end (CLF) Interface-Part1: Physical and dataLink Layer Characteristics (Release7)[EB/OL]. http://www.etsi.org/deliver/etsi_ts/102600_102699/102613/07.07.00_60/ts_102613v070700p.pdf,2009
    [54] ETSI. Smart Cards: UICC-Contactless Front-end (CLF) Interface, Host Controller Interface(HCI)(Release7)[EB/OL]. http://www.etsi.org/deliver/etsi_ts/102600_102699/102622/07.00.00_60/ts_102622v070000p.pdf,2009
    [55] G.Abowd, A.Dey, P.Brown,et al.Towards a Better Understanding of Context andContext-awareness[C]. Handheld and Ubiquitous Computing, Heidelberg,1999:304-307
    [56].Y lmaz, R.C.Erdur. IConAwa-An intelligent context-aware system [J]. Expert Systems withApplications,2012,39(3):2907-2918
    [57] M.Baldauf, S.Dustdar, F.Rosenberg. A survey on context-aware systems [J]. InternationalJournal of Ad Hoc and Ubiquitous Computing,2007,2(4):263-277.
    [58] D.Saha, A.Mukherjee. Pervasive computing: a paradigm for the21st century [J]. Computer,2003,36(3):25-31.
    [59] K.Henricksen, J.Indulska, T.McFadden, et al. Middleware for distributed context-awaresystems [J]. On the Move to Meaningful Internet Systems2005: CoopIS, DOA, and ODBASE,2005:846-863.
    [60] A.K. Dey, G.D.Abowd, D. A. Salber. A conceptual framework and a toolkit for supporting therapid prototyping of context-aware applications [J]. Human–Computer Interaction,2001,16(2-4):97-166.
    [61] S.S.Yau, Y.Wang,F.Karim. Development of situation-aware application software for ubiquitouscomputing environments[C]. Computer Software and Applications Conference,2002.Annual,2002:233-238.
    [62] P.Fahy, S. Clarke. CASS-a middleware for mobile context-aware applications[C] Workshop onContext Awareness, MobiSys.2004.
    [63] J.Morak,H.Kumpusch,D. Hayn, et al. Design and evaluation of a Telemonitoring conceptbased on NFC-enabled mobile phones and sensor devices[J]. IEEE Transactions onInformation Technology in Biomedicine,2012,16(1):17-23.
    [64] F.Borrego-Jaraba, R.I.Luque, M.A.Gómez-Nieto. A NFC-based pervasive solution for citytouristic surfing [J]. Personal and Ubiquitous Computing,2011,15(7):731-742.
    [65] J.Neefs, F.Schrooyen, J.Doggen,et al. Paper Ticketing vs. Electronic Ticketing Based onOff-Line System'Tapango'[C].2010Second International Workshop on Near FieldCommunication (NFC). Taipei,2010:3-8.
    [66] T.Gu, X.H.Wang, H.K.Pung,et al. An Ontology-based Context Model in IntelligentEnvironments[C]. Proceedings of Communication Networks and Distributed SystemsModeling and Simulation Conference, San Diego, USA,2004,270-275
    [67] P.C.Garrido,G.M.Miraz,I.L.Ruiz,et al.A Model for the Development of NFCContext-Awareness Applications on Internet of Things[C].2010Second InternationalWorkshop on Near Field Communication (NFC). Ocland,2010:9-14.
    [68] Y.S.Chang,Y. S. Hung, C. L. Chang, et al. Toward a NFC phone-driven context awarenesssmart environment[C]. Ubiquitous, Autonomic and Trusted Computing,2009. UIC-ATC'09.Symposia and Workshops on. Beijing,2009:298-303.
    [69] Y. S. Chang, C. L. Chang, Y. S. Hung, et al. NCASH: NFC phone-enabled personalizedcontext awareness smart-home environment[J]. Cybernetics and Systems: An InternationalJournal,2010,41(2):123-145.
    [70] Ecma International Std. ECMA-340. Near Field Communication Interface and Protocol[S].Ecma International Std. Geneva:www.ecma-international.org, Dec.11,2004
    [71] M. H. Yang, D. J. Kriegman, N. Ahuja. Detecting faces in images: A survey[J]. PatternAnalysis and Machine Intelligence, IEEE Transactions on,2002,24(1):34-58.
    [72]王蕴红,范伟,谭铁牛.融合全局与局部特征的子空间人脸识别算法[J].计算机学报,2005(10):1657-1663
    [73] P. Viola, M. Jones. Rapid object detection using a boosted cascade of simple features[C].Computer Vision and Pattern Recognition,2001. Kauai,2001,1: I-511-I-518vol.1.
    [74] T. Ahonen, A. Hadid, M. Pietikainen. Face description with local binary patterns: Applicationto face recognition [J]. Pattern Analysis and Machine Intelligence, IEEE Transactions on,2006,28(12):2037-2041.
    [75] T. Ojala, M. Pietikainen, T. Maenpaa. Multiresolution gray-scale and rotation invariant textureclassification with local binary patterns [J]. Pattern Analysis and Machine Intelligence, IEEETransactions on,2002,24(7):971-987.
    [76] ITU-T. Recommendation. P.10/G.100Amendment1: New Appendix I–Definition of Qualityof Experience (QoE)[S]. Geneva: ITU. Jan.21,2007
    [77] ITU-T. Subjective Video Quality Assessment Methods For Multimedia Applications[S].Geneva: ITU. Sep.2,1999:910
    [78] F.Wei, J.Xu, T.Wen, et al. Smart phone based online QoE assessment for end-to-endmultimedia services on3G mobile Internets[C]. Consumer Electronics, Communications andNetworks (CECNet),20122nd International Conference on. Yichang,2012:2861-2865.
    [79] X. Revés, N. Nafisi, R. Ferrús, et al. User perceived quality evaluation in a b3g networktestbed[C]. Proc. of IST Mobile Summit, Mykonos,2006:1-6
    [80] Y. Park, Y. Seok, N. Choi, et al. Rate-adaptive multimedia multicasting over IEEE802.11wireless LANs[C]. Consumer Communications and Networking Conference,2006. Beijing,2006:178-182.
    [81] S. Winkler. Video quality and beyond[C]. Proc. European Signal Processing Conference.Rodes,2007:3-7.
    [82] H. J. Kim, S. G. Choi. A study on a QoS/QoE correlation model for QoE evaluation on IPTVservice[C]. Advanced Communication Technology,2010The12th International Conferenceon. Nanjing,2010:1377-1382.
    [83] S. Khirman, P. Henriksen. Relationship between quality-of-service and quality-of-experiencefor public internet service[C]. In Proc. of the3rd Workshop on Passive and ActiveMeasurement. Pittsburgh,2002.
    [84] A. J. Menezes, C. Paul, A. Scott. Handbook of Applied Cryptography [M]. CRC Press,October,1996
    [85] F. Dufaux, T. Ebrahimi. Scrambling for privacy protection in video surveillance systems [J].Circuits and Systems for Video Technology, IEEE Transactions on,2008,18(8):1168-1174.
    [86] F. Dufaux, T. Ebrahimi. Scrambling for video surveillance with privacy[C]. Computer Visionand Pattern Recognition Workshop,2006. New York,2006:160-160.
    [87] W. Zhang, S. C. Cheung, M. Chen. Hiding privacy information in video surveillancesystem[C]. Proceedings of the12th IEEE International Conference on Image Processing.Genoa,2005:868-871.
    [88] I. Martínez-Ponte, X. Desurmont, J. Meessen, et al. ROBUST HUM AN FACE HIDINGENSURING PRIVACY [J].2005.
    [89] T. E. Boult. Pico: Privacy through invertible cryptographic obscuration[C]. Computer Visionfor Interactive and Intelligent Environment. Lexington,2005:27-38.
    [90] E. Newton, L. Sweeney, B. Malin. Preserving Privacy by De-Identifying Facial Images[R].Pittsburgh: Carnegie Mellon University, Sep.7.2003
    [91] J. Shen. Privacy-protection in Real-time Video Communication[C]. International Conferenceon Embedded Software and Systems,2009. Hangzhou,2009:217-220.
    [92] Adobe Flash. Adobe Flash[S]. San José, Adobe,2011
    [93] W3C. SVG Tiny1.2. Scalable vector graphics (SVG) tiny1.2specification[S]. W3C,2008
    [94] W3C. HTML5Canvas. HTML Canvas2D Context[S]. W3C,2012
    [95] Ecma International Std. ECMA-262. Standard ECMA-262ECMAScript LanguageSpecification5th edition[S]. Ecma International Std. Geneva:www.ecma-international.org,Aug.9,2012
    [96]张骥先,罗蕾,姜帆.移动设备上富媒体场景渲染优化策略[J].计算机辅助设计与图形学学报,2010,22(8):1272-1278
    [97] Khronos. OpenVG1.1-2008. Open Vector Graphics[S]. Khronos,2008
    [98] Khronos. OpenGL ES1.0-2008. OpenGL for Embedded Systems[S]. Khronos,2008
    [99] C. Cyril, J. L. Feuvre, J. C. Moissinac. Design of an Efficient Scalable Vector Graphics Playerfor Constrained Devices[J]. IEEE Transactions on Consumer Electronics,2008,54(2):895-903
    [100]何高奇,潘志庚,张明敏.面向移动设备的矢量图形绘制技术[J].浙江大学学报,2008,42(11):1856-1864
    [101]张骥先,罗蕾,姜帆.移动终端上笔画字体存储研究及轮廓化算法[J].计算机辅助设计与图形学学报,2010,22(12):2125-2132
    [102] Y. Fujio. Curves and Surfaces in Computer Aided Geometric Design[M]. Berlin: Springer,1988,1-378
    [103] R. Aleksas. Approximation of a Cubic Bézier Curve by Circular Arcs and Vice Versa [J].Information Technology and Control,2006,35(4):371-378
    [104]陈秦玉,汪国昭.圆弧的C-Bézier曲线表示[J].软件学报.2002,13(11):2155-2161
    [105] J. Lin J,A. A. Ball, J. J. Zheng. Approximating Circular Arcs by Bézier Curves and ItsApplication to Modelling Tooling for FE Forming Simulations [J]. International Journal ofMachine Tools and Manufacture,2001,41(5):703-717
    [106] M. Goldapp. Approximation of Circular Arcs by Cubic Polynomials [J]. Computer AidedGeometric Design,1991,8(3):227-238
    [107] K. Kallio. Scanline Edge-flag Algorithm for Antialiasing[C]. Theory and Practice ofComputer Graphics Conference, Bangor,2007,246-255
    [108] D.Khanh.Antialiased Rendering of Self-intersecting Polygons Using PolygonDecomposition[C]. Proceedings of the12th Pacific Conference on Computer Graphics andApplications, Seoul,2004,383-391
    [109] G. Q. He, Z. G. Pan, M. M. Zhang. Technologies of Vector Graphics Rendering on MobileDevices [J]. Journal of Zhejiang University,2008,42(11):1856-1864
    [110] J. C. Ren, S. Q. Liu. Improvement of Area Filling Scanline Algorithm [J]. CAD&CG,1998,10(6):481-482
    [111] Y. Gong, F. C. Yang, L Huang, et al. Model-based Approach to Measuring Quality ofExperience[C]. First International Conference on Emerging Network Intelligence, Sliema,2009,29-32

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700