The Internet Encyclopedia (Volume 3)

(coco) #1

P1: IML


WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0


INDEX 941

Video compression,V1:398;V3:537–553,
558–559.See alsoVideo streaming
algorithms for,V3:559–560
application solutions,V3: 550
business models,V3:550 –551
digital,V3:539–542, 542–544
future of,V3: 551
principles of,V3: 543
standards for,V3:544 –550
Videoconferencing,V2: 110
academic community and,V2: 338
software,V2: 71
virtual teams and,V3: 603
Video Director,V2:657–658
Video-enabled commerce,V3: 551
Video frame time code,V3: 541
Video jam software,V2: 654
Video-On-Demand (VOD),V1:297, 705;
V3:550 –551
Video recorders, personal,V1: 701
Video reporting,V1: 299
Video servers,V3:560 –561
Video signal processing, color in,
V3:539–540
Video streaming,V2:502;V3:554 –566.
See alsoVideo compression
audio compression and,V3: 560
bandwidth and,V3:557–558
developments and trends in,V3:564 –565
networking and,V3: 555
producing,V3: 562
scaling and,V3: 558
technologies and systems associated
with,V3:555–556, 563–564
uses of,V3:562–563
video capture and digitization and,
V3: 556
video delivery and,V3:560 –561
video editing and,V3:556 –557
video receiving, decoding, and playing
and,V3:561–562
Views,V1: 377
View state,V1:7, 10
example of,V1:8–9
Violence, exposure to,V2: 106
Viral marketing,V1:605;V2:568–569, 580
Viral programs,V1: 249
Virtual Children’s Hospital,V1: 518
Virtual circuit networks,V1:182, 184
Virtual communities,V1:556, 559
as unregulated environments,V2: 275
real estate and,V3: 193
travel-related,V3: 467
Virtual company,V1:105.See alsoVirtual
enterprise entries
Virtual courts,V2:752–753
Virtual data,V2: 691
Virtual Enterprise Integration (VEI)
architecture,V1:211, 216
Virtual enterprise readiness assessment,
V1: 211
Virtual enterprises (VEs),V3:567–578.See
alsoQuasi-VEs; VE entries; Virtual
company
activities and phases in creating,
V3:576 –577
characteristics of,V3:568–569
computer architectures for,V3:571–575
creation of,V3:570 –577
data management services for,V1: 208

initiatives related to,V3:575–576
management of,V1:205, 209
types of,V3: 569
Virtual environments, 3D,V2: 210
Virtual Hospital,V1: 518
Virtual identity,V2: 316
documents with,V1: 499
Virtual Interface (VI) architecture,
V3:334 –335
Virtual inventory fulfillment,V2: 375
Virtual inventory management,
V2:374 –375
Virtual learning.SeeDistance learning
Virtual learning “spaces,”V1: 552
Virtual libraries,V2:485, 789–790
Virtual medicine,V2: 295
Virtual meetings, physicians’,
V2:589–590
Virtual merchant,V1: 603
Virtual OLAP,V2: 689
Virtual organization,V3: 438
Virtual Private Networks (VPNs),V1:107,
118, 290, 529;V2:257, 542, 542;
V3:167–168, 789.See alsoIP-based
virtual private networks
extranets and,V1:799–800
Virtual reality,V1:559;V3:591–599.See
alsoCollaborative virtual reality
Virtual reality exposure therapy,V2: 111
Virtual Reality Markup Language
(VRML),V2:121, 206
Virtual reference,V2: 480
Virtual Routers (VRs),V3: 587
virtual private networks with,V3: 587
Virtual shopping cart,V1: 7
Virtual teams,V3:600 –607
characteristics of,V3: 601
creating,V3:601–603
impact on organizations,V3:605–606
infrastructure needed for,V3:603–605
Virtual tours,V3:465– 466
Virtual value chains,V3:531–534
Virtual workplace,V2:71–72
Virtual world,V1: 300
Virus attack,V1: 242
Virus creation kits,V1: 254
Virus detection techniques,V1:257–258
Viruses,V1:328, 329, 335;V2: 451
defined,V1:249–250, 251–252
first-generation,V1:253–254
history of,V1:248–249
Internet relay chat and,V2: 317
non-PC platform,V1:258–259
prevention and protection techniques for,
V1: 258
protection software for,V1: 238
scanning for,V1: 832
second-generation,V1:254 –255
symptoms of,V1: 250
third-generation,V1:254 –255
warnings of,V1: 252
Virus hoaxes,V2: 278
Vision, e-business,V1:210 –211
Visual Basic,V3:608–619
data access in,V3:616 –617
evolution of,V3:608–609
language elements of,V3:614 –616
user interface in,V3:610 –614
Visual Basic Control Creation Edition,
V1:18–19

Visual Basic for Applications (VBA),
V3: 620
Visual Basic.NET,V3:617–619
Visual Basic Scripting Edition (VBScript),
V1:378, 379;V2:206, 412;
V3:620 –634
advanced features of,V3:630 –631
coding conventions in,V3:625–626
Internet and,V3: 621
language elements of,V3:624 –625
.NET framework and,V3:631–633
objects in,V3:626 –630
user-defined procedures in,V3: 625
variables, constants, and data typing in,
V3:622–624
Visual C++,V3:635–646
environment of,V3: 635
Microsoft Foundation Class library and,
V3:637–638
OLE, ActiveX, AND COM OLE in,
V3: 644
WinInet client programming and,
V3:643–644
WinSock programming and,
V3:638–643
Visual C++.NET,V3: 645
Visual programming,V3: 610
Vocabularies, controlled,V3:692–693
Vocational training, in developing nations,
V1: 437
Vocation communities, online,V2: 738
Vocoding,V3: 821
Voice.See alsoAudio entries; Sound
entries; Speech entries
coding,V3: 821
in e-mail,V1: 665
Voice Activity Detector (VAD),V3: 313
Voice-grade modems,V3: 169
Voice over Internet Protocol (VoIP),
V1:298, 302;V3:647–660
communications theory and,
V3:647–650
costs of,V3: 658
integrating into circuit-switched
telephony networks,V3:656 –657
quality of service of,V3:657–658
security of,V3:658–659
signaling in,V3:653–655
telephony network and,V3:650 –653
Voice portals,V2:308–309
Voice signals, transmission of,V3:648.
See alsoAudio
Voice telephony,V3: 838
circuit switching and,V1:179–180
VoiceXML,V1: 753
Voluntary Inter-industry Commerce
Standards (VICS) association,
V1: 206
Volunteerism, nonprofit,V2: 677
Voronoi diagram,V1: 391
Voting.SeeE-voting

W2K (Windows 2000) domains,
V3:792–793
W2K groups,V3:795–797
W2K installation,V3:800 –801
W2K privileges,V3: 797
W2K security,V3:792–804
level of,V3:799–803
operation of,V3:792–799
Free download pdf