{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:20Z","timestamp":1750306940683,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,6]],"date-time":"2013-10-06T00:00:00Z","timestamp":1381017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,6]]},"DOI":"10.1145\/2503713.2503746","type":"proceedings-article","created":{"date-parts":[[2013,9,17]],"date-time":"2013-09-17T19:57:05Z","timestamp":1379447825000},"page":"209-214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Distorted shadow mapping"],"prefix":"10.1145","author":[{"given":"Nixiang","family":"Jia","sequence":"first","affiliation":[{"name":"Sichuan University, China"}]},{"given":"Dening","family":"Luo","sequence":"additional","affiliation":[{"name":"Sichuan University, China"}]},{"given":"Yanci","family":"Zhang","sequence":"additional","affiliation":[{"name":"Sichuan University, China"}]}],"member":"320","published-online":{"date-parts":[[2013,10,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/10867651.2002.10487567"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/965141.563901"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/383259.383302"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1187112.1187153"},{"key":"e_1_3_2_1_5_1","unstructured":"Johnson G. S. Mark W. R. and Burns C. A. 2004. The irregular z-buffer and its application to shadow mapping. Tech. rep. University of Texas Department of Computer Sciences Technical Report.  Johnson G. S. Mark W. R. and Burns C. A. 2004. The irregular z-buffer and its application to shadow mapping. Tech. rep. University of Texas Department of Computer Sciences Technical Report."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095878.1095889"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1944745.1944761"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1187112.1187126"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1289603.1289611"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409625.1409628"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2009.01571.x"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2010.01841.x"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/882262.882301"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1058129.1058139"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/566654.566616"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/965139.807402"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2383533.2383553"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/38.62693"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128923.1128975"}],"event":{"name":"VRST'13: The 19th ACM Symposium on Virtual Reality Software and Technology","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","VRSJ","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Singapore","acronym":"VRST'13"},"container-title":["Proceedings of the 19th ACM Symposium on Virtual Reality Software and Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2503713.2503746","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2503713.2503746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:50Z","timestamp":1750235750000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2503713.2503746"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,6]]},"references-count":19,"alternative-id":["10.1145\/2503713.2503746","10.1145\/2503713"],"URL":"https:\/\/doi.org\/10.1145\/2503713.2503746","relation":{},"subject":[],"published":{"date-parts":[[2013,10,6]]},"assertion":[{"value":"2013-10-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}