Jinsheng Xu

Learn More
<i>Geometry compression</i> is the coding of 3D geometric data in a form that requires less space to store and less bandwidth to transmit. <i>Animated geometry compression</i> is the compression of temporal sequences of geometric data. An octree-based motion representation method in which a small set of motion vectors are generated for each frame by(More)
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network concepts,(More)
In this paper we propose a model to predict the performance of synchronous discrete event simulation. The model considers parameters including the number of active objects per cycle, event execution granularity and communication cost. We derive a single formula that predicts the performance of synchronous simulation.We have benchmarked several VHDL circuits(More)
Computer visualization and animation have been used in computer science education to help students better understand the concepts. This paper presents an animated simulator for packet sniffer and its use in a network security course. The animated packet sniffer simulator was designed to demonstrate graphically the security concept packet sniffer and related(More)
Wikipedia, a User Innovation Community (UIC), is becoming increasingly influential source of knowledge. The knowledge in Wikipedia is produced and processed collaboratively by UIC. The results of this collaboration process present various seemingly complex patterns demonstrated by update history of different articles in Wikipedia. Agent simulation is a(More)
Visualization and animation have been used to aid teaching in many areas of education. In this paper, we present animated visual software that demonstrates network attacks on Local Area Networks. This tool is targeted to assist instructors who teach college level network security and computer networks. We did extensive survey on various attack methods and(More)
Current collaborative tagging systems do not allow community members to easily view available data related to their communities. In this paper, we present our study on community formation centered around common interests, utilizing data from del.icio.us. We propose an approach to clustering tags and users based on their similarity. We also report some(More)