Relationship Analysis Between User's Contexts and Real Input Words

Total Page:16

File Type:pdf, Size:1020Kb

Relationship Analysis Between User's Contexts and Real Input Words Relationship Analysis between User’s Contexts and Real Input Words through Twitter Yutaka Arakawa, Shigeaki Tagashira and Akira Fukuda Graduate School of Information Science and Electrical Engineering, Kyushu University, Fukuoka, Japan 744, Motooka, Nishi-ku, Fukuoka, Fukuoka, JAPAN, 819-0395 Email: arakawa, shigeaki, [email protected] Abstract—In this paper, we propose a method to evaluate such as location, presence and time. We mainly focus on effectiveness of our proposed context-aware text entry by using how to make dictionary dynamically among above-mentioned Twitter. We focus on ”geo-tagged” public tweets because they three component of predictive transform in text entry. The include user’s important contexts, real location and time. We also focus on TV program listing because 50% traffic of iPhone reason is that the word not included in the dictionary cannot in Japan is generated from our home, in which I often tweets in be recommended, and we are not specialists of philolog- watching a TV. Cyclical collecting system based on Streaming API ical syntactic parsing. In our proposed system, based on and Search API of Twitter is proposed for gathering the target user’s current contexts, the dictionary in the mobile phone tweets efficiently. In order to find the relationship between user’s is updated periodically in cooperation with the dictionary contexts and really used words, we compare really-tweeted words with words obtained from Local Search API of Yahoo! Japan that creation server on the Internet, which generates user’s current is used for our context-aware text entry and words obtained from dictionary dynamically by using several public Web APIs. In TV program listing. We analyze 471274 tweets that have been our current prototype, “location” and “time” are adopted as collected from 15 December 2009 to 10 June 2010 for specifying a user’s context, and landmark names surrounding user are the relationship to landmark information and TV program. As a added based on user’s location, and TV programs’ title and result, we show that 5.1% of tweets include landmark words, and 9% of tweets include TV program words. Additionally, we bring performers’ name are added based on “time”. The reason why out that there are location dependent words and time dependent we use TV program is that 50% iPhone traffic in Japan is words. transmitted through home WiFi networks. As a result, if you input “H” at neighbor venue of Globecom2010, the system I. INTRODUCTION may suggest “Hyatt Regency Miami” as one of candidates. If In a recent research in Japan[1], it is turned out that over you input “J” or “K” in watching 24, the system may return fifty percent of Internet users access the Internet from mobile “Jack Bauer” or “Kiefer Sutherland” respectively. We have devices. And among them, over eighty percent users access already constructed the OpenWnn-based prototype system on the information by using not hierarchical menu in official site Android terminal[4]. We have already tried several system but search engines such as Google. Moreover, current mobile architectures, and have confirmed that one of them can achieve devices can use not only text messaging but also web-mail enough response time[5]. Also, we are evaluating our system such as Gmail. It indicates that one has an opportunity to through demonstration and questionnaire with some persons. input a long text. The increase of text input on mobile devices Although our system looks effective, there is an important drives the demand for improving a text input method. remaining issue. Since we started this research with the Recent mobile phones generally equip clever text entry assumption that such kind of system will be convenient for us, which have a function of predictive transform. This function there is no evidence or quantitative evaluation for representing consists of dictionaries, syntactic parsing, and learning. When the effectiveness. It is hard to gather large amount of results a user inputs “a”, it picks up the words which start with “a” through questionnaire-based evaluation. In addition, if we log from a dictionary, and recommends some candidate words really inputted sentences in a mobile phone, we must consider which seems appropriate according to syntactic parsing. In privacy protection in relation to personal data. addition, based on user’s input history, such as frequency or In this paper, we propose a method for evaluating context- time stamp of latest use, it sorts the order of the candidates. In aware text entry by using Twitter. Twitter is a micro blogging these days, iWnn[2], one of Japanese text entry adopted many service on the Internet, where a short message of up to 140 kinds of mobile phones, suggests more appropriate words characters, called tweet, can be posted. And these tweets are according to current seasons, time, body of received e-mail, re- generally open for the public. The reason why we focus on lationships between superior and inferior. As another approach Twitter is 1) we can obtain huge amount of public strings of that differs from text entry, “Google Suggest” provides often- various users, 2) Geotagging API released at November 2009 used keyword combination for optimizing search terms and enables users to add geo code to each tweet. It means that reducing keystrokes. we can extensively and publicly collect real input sentences Meanwhile we have proposed context-aware text entry[3] that include users’ real location. Therefore, we think that to which can suggest useful words based on user’s context analyze collected data clears up the relationship between user’s Train Transit Application E-mail Application Map Application Internet I took a Yamanote train Departure Roppongi Hyatt Regency Miami Local device Internal server External server from Shinbashi. Soon, I Destination Tokyo will arrive Shibuya . Meet API access module GPS sensor Context Estimation Schedule API For estimation Route Search (XML parser) at Statue of Hachiko. Engine Local context Global context Presense API Acceleration Context sensor updater Dictionary is dynamically generated by using public APIs on the Internet Other sensors Location API Feedback Nearest station API Schedule/Calender API Landmark Info. API Asynchronous Yahoo API Shibuya, Shinjuku, Train, Go, Take, Ride, Bank of America, Hyatt, Input API access module Google API Roppongi, Tokyo, etc. Shinbashi, Hachiko James L. Knight Center Hiragana !"# Roman character For making dictionary Select & Sort Engine Japanese language (XML parser) Schedule API morphological Context-Aware (MeCab) Fig. 1. Typical Effective Examples of context-aware text entry analysis Amazon API IME Direct ATOK plugin Tabelog API contexts and real input words. As a result, it can show the GuruNavi API effectiveness of our proposed text entry quantitatively. Output "Personal Context mixture of Chinese characters and Dictionary" As a general dictionary First, we construct the tweet collecting system that obtains Japanese phonetic characters kana-kanji Japanese tweets with geocode, where we effectively combine conversion API two APIs of Twitter, Streaming API and Search API to gather huge amount of tweets. Our system has already gathered half- Fig. 2. The architecture of prototype system million tweets since 15 December 2009. Next, we analyze collected data by comparing with the data that obtained from other APIs. In this paper, we use “Yahoo! Local search processes cyclically, the words related to a certain place API[6]” for obtaining landmark information, and use “TV become suggested, and normal words will be suggested in program listing on the Internet” for obtaining TV programs’ other place. title and performers’ name. These APIs are the same as APIs for making dictionary in our context-aware text entry. In our A. System architecture relationship analysis, both data are separated into some words The architecture of prototype system is shown in Figure 2. by using “Yahoo! Japanese language morphological analysis It is composed of three parts, local device, our server on the API” and “Yahoo! Key phrase extraction API”. Internet, and general web services on the Internet. The local As a result, we show that 5.1% of tweets include land- device has various sensors such as GPS and acceleration. In mark words, and 9% of tweets include TV program words. our prototype system, we use a PC as local device and adopt Additionally, we bring out that there are location dependent the Google Maps API as GPS sensor for setting user’s location words and time dependent words. The rest of the paper is visually. organized as follows. We present our context-aware input The internal server in the center of Figure 2 is a main part of method editor proposed previously in Section 2. In section our proposed system. It collects information and estimates of 3, we explain about Twitter. And following section explains user’s context, creates the dynamic dictionary, and suggests the relationship analysis. Finally, results are shown in Section 5. words by utilizing user’s context. These functions are possible to construct on local device. However, we set it into the II. CONTEXT-AWARE TEXT ENTRY FOR MOBILE PHONE server over the global network because it is important not only Fig.1 shows a typical service examples in which our pro- accuracy of estimation algorithm but also processing speed. posed context-aware text entry will work effective. It indicates Besides, we architect it works asynchronously to collect sensor the importance of words varies with a location (i.e., user’s information by the system and to input text on local device. context). For example, nearby station name is used at stations, The dictionary is updated whenever location is varied. As landmark name is used at a new places, product name is a result, local device only searches pre-constructed database used at bookstores and electronic retail stores.
Recommended publications
  • IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011)
    IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011) November 13, 2011 Shangri-La Hotel Chiang Mai, Thailand IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011) November 13, 2011 Chiang Mai, Thailand We wish to thank our sponsors Gold Sponsors www.google.com www.baidu.com The Office of Naval Research (ONR) Department of Systems Engineering and The Asian Office of Aerospace Research and Devel- Engineering Managment, The Chinese Uni- opment (AOARD) versity of Hong Kong Silver Sponsors Microsoft Corporation Bronze Sponsors Chinese and Oriental Languages Information Processing Society (COLIPS) Supporter Thailand Convention and Exhibition Bureau (TCEB) We wish to thank our sponsors Organizers Asian Federation of Natural Language National Electronics and Computer Technolo- Processing (AFNLP) gy Center (NECTEC), Thailand Sirindhorn International Institute of Technology Rajamangala University of Technology Lanna (SIIT), Thailand (RMUTL), Thailand Chiang Mai University (CMU), Thailand Maejo University, Thailand c 2011 Asian Federation of Natural Language Proceesing vii Preface Welcome to the IJCNLP Workshop on Advances in Text Input Methods (WTIM 2011)! Methods of text input have entered a new era. The number of people who have access to computers and mobile devices is skyrocketing in regions where people do not have a convenient method of inputting their native language. It has also become commonplace to input text not through a keyboard but through different modes such as voice and handwriting recognition. Even when people input text using a keyboard, it is done differently from only a few years ago – adaptive software keyboards, word auto- completion and prediction, and spell correction are just a few examples of such recent changes in text input experience.
    [Show full text]
  • Proceedings of the Second Workshop on Advances in Text Input Methods (WTIM 2)
    COLING 2012 24th International Conference on Computational Linguistics Proceedings of the Second Workshop on Advances in Text Input Methods (WTIM 2) Workshop chairs: Kalika Bali, Monojit Choudhury and Yoh Okuno 15 December 2012 Mumbai, India Diamond sponsors Tata Consultancy Services Linguistic Data Consortium for Indian Languages (LDC-IL) Gold Sponsors Microsoft Research Beijing Baidu Netcon Science Technology Co. Ltd. Silver sponsors IBM, India Private Limited Crimson Interactive Pvt. Ltd. Yahoo Easy Transcription & Software Pvt. Ltd. Proceedings of the Second Workshop on Advances in Text Input Methods (WTIM 2) Kalika Bali, Monojit Choudhury and Yoh Okuno (eds.) Revised preprint edition, 2012 Published by The COLING 2012 Organizing Committee Indian Institute of Technology Bombay, Powai, Mumbai-400076 India Phone: 91-22-25764729 Fax: 91-22-2572 0022 Email: [email protected] This volume c 2012 The COLING 2012 Organizing Committee. Licensed under the Creative Commons Attribution-Noncommercial-Share Alike 3.0 Nonported license. http://creativecommons.org/licenses/by-nc-sa/3.0/ Some rights reserved. Contributed content copyright the contributing authors. Used with permission. Also available online in the ACL Anthology at http://aclweb.org ii Preface It is our great pleasure to present the proceedings of the Second Workshop on Advances in Text Input Methods (WTIM-2) held in conjunction with Coling 2012, on 15th December 2012, in Mumbai, India. This workshop is a sequel to the first WTIM which was held in conjunction with IJCNLP 2011 in November 2011, Chiang Mai, Thailand. The aim of the current workshop remains the same as the previous one that is to bring together the researchers and developers of text input technologies around the world, and share their innovations, research findings and issues across different applications, devices, modes and languages.
    [Show full text]
  • Locale Database
    International Language Environments Guide Part No: 817–2521–11 November 2010 Copyright © 2005, 2010, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related software documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are “commercial computer software” or “commercial technical data” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms setforth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065.
    [Show full text]
  • Basic Manual
    Basic Manual Basic Manual Contents Getting Ready Basic operation Character input Initial settings Internet / Google Talk Mail For inquiries, call: au Customer Service Center Phone For general information and charges (toll free) From fixed-line phones: From au cell phones: Overseas usage area code not required Application PRESSING ZERO WILL CONNECT YOU TO AN OPERATOR AFTER CALLING 157 ON YOUR au CELL PHONE Data management For loss, theft or damage and operation information Wireless LAN (toll free) From fixed-line phones: From au cell phones: Function settings Cell phone and PHS operators collect and recycle unused area code not required telephones, batteries and battery chargers at stores bearing the logo regardless of brand and manufacturer Remote Lock to protect the environment and reuse valuable resources. In case above numbers are not available, (toll free) Appendix/Index (except Okinawa) January 2011 Edition (Okinawa) Sales: KDDI CORPORATION • OKINAWA CELLULAR TELEPHONE COMPANY Manufactured by: FUJITSU TOSHIBA MOBAIL COMUNICATION CORPORATION Preface Before Using IS04 Thank you for purchasing the IS04. • You cannot receive or make calls in a location where the Before using your IS04, be sure to read the IS04 Basic signal cannot be received, even within the service area. Manual (this PDF manual) to ensure correct usage. After you Calling may not be available in a location where the signal have finished reading this manual, store this PDF manual and is weak. If you move to a location where the signal is weak the printed manuals in safe places so you can retrieve them during a call, the call may be interrupted.
    [Show full text]
  • Slides on XFY and Model-Based UI
    Relevant work at JustSystems Dave Raggett, W3C/JustSystems ISTI, Pisa, 23 July 2008 Contact: [email protected] 1 JustSystems ● Japanese software developer – Headquarters in Tokushima – Founded in 1979 ● In Japan – ATOK Japanese input method – Ichitaro, word processor, drawing tools, etc. – Full member of Unicode Consortium ● XML software – XMetaL XML-based authoring tool – XFY XML data fusion and app development 2 XFY ● The document is the application ● XFY client – Written in Java – View and edit compound documents ● XHTML, SVG, MathML, Chemical ML ● UI markup (a kind of concrete UI) ● Vocabulary components for charts, pie diagrams – Extends XSLT for dynamic bindings ● Source markup kept in sync with UI ● XFY server – XML repository and interfaces to databases, etc. 3 What is a Vocabulary Component? xfy Client XML data Vocabulary Component <XHTML> XHTML Component <sgv> Input Output </svg> SVG Component VC <math> MathML Component Reflect Edit </math> </XHTML> Other What is VC (Vocabulary Connection)? XML Web browser document Display XSLT Hello World! xfy Enterprise Client XML document Display VC mechanism (XVCD) Update Edit Multi-view Vocabulary Component Vocabulary Component A vocabulary component defines how to display and edit XML documents How to create vocabulary components: • View Designer • XVCD • JAVA XVCD ● Extended version of XSLT that allows you to define event handlers – Update source and target DOM trees in response to use input and application events ● xvcd:action element and event attribute – Commands to modify a DOM tree ● xvcd:delete,
    [Show full text]
  • INSTRUCTION MANUAL ’11.6 Introduction ⿟⿟Please Keep a Separate Record of the Information (E.G., Contacts) You Have Saved in Thank You for Your Purchase of "N-06C"
    N-06C INSTRUCTION MANUAL ’11.6 Introduction ⿟ Please keep a separate record of the information (e.g., Contacts) you have saved in Thank you for your purchase of "N-06C". your FOMA terminal. Even if the data may be For proper use of the N-06C, read this lost as a result of malfunction, repair, changing, manual before and while you use the N-06C. or other handling of the FOMA terminal, under no condition will DOCOMO be held liable for Before using the FOMA terminal any lost data saved in the FOMA terminal. ⿟ The N-06C supports W-CDMA, GSM/GPRS, ⿟ It is recommended that you save your and wireless LAN connectivity. important data into microSD cards. ⿟ Because a FOMA terminal operates using radio ⿟ Your FOMA terminal is the same as a PC. frequencies, it cannot be used inside a tunnel, Depending on the applications or other items underground, in a building or other locations that you install, the operation of your FOMA where radio waves do not reach the FOMA terminal may become unstable and your location terminal, in locations with weak radio wave or personal information saved on the FOMA condition, or outside of the FOMA's service terminal may be disseminated on the Internet area. The FOMA services may not be available and used improperly. You should therefore on high upper floors of high-rise apartments thoroughly check the provider and operation or buildings, even if you can see no status of an application before using it. obstructions around you. On occasion, your ⿟ Operation of your FOMA terminal may calls may become disconnected even in areas become unstable if original product with strong signal, even if you are not moving, information contained in it is altered or or even if all four antenna icons are displayed.
    [Show full text]
  • Oracle Solaris 10 910 Patch List
    Oracle® Solaris 10 9/10 Patch List Part No: 821–2170 September 2010 Copyright © 2000, 2011, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms setforth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle USA, Inc., 500 Oracle Parkway, Redwood City, CA 94065.
    [Show full text]
  • Basic Manual
    Introduction Contents Getting Ready Learning the Basics Basic Manual Character Input Phone Contacts For inquiries, call: Customer Center Mail For general information and charges Internet (toll free) Basic Manual From fixed-line phones: From au cell phones: Multimedia area code not required PRESSING ZERO WILL CONNECT YOU TO AN OPERATOR Cell phone and PHS operators collect and recycle unused Applications telephones, batteries and battery chargers at stores AFTER CALLING 157 ON YOUR au CELL PHONE. bearing the logo regardless of brand and manufacturer to protect the environment and reuse valuable resources. For loss, theft or damage and operation Settings of IS11CA information (toll free) From fixed-line phones: From au cell phones: Overseas Usage area code not required In case above numbers are not available, July 2011, 1st Edition Appendix/Index Sales: KDDI CORPORATION • - 77- (except Okinawa) 0120 9 033 OKINAWA CELLULAR TELEPHONE COMPANY 0120-977-699 (Okinawa) Manufactured by: CASIO COMPUTER CO., LTD. Preface Before Using an au Phone Thank you for purchasing the IS11CA. • You cannot receive or make calls in a location where the signal Before using your IS11CA, be sure to read the Basic Manual (this cannot be received, even within the service area. Calling may PDF manual) to ensure correct usage. After you have finished not be available in a location where the signal is weak. If you reading this manual, store this PDF manual and the printed move to a location where the signal is weak during a call, the manuals in safe places so you can retrieve them whenever you call may be interrupted.
    [Show full text]
  • One Finger, 10 Keys and 6000 Characters
    Publications: One Finger, 10 Keys and 6,000 Characters Carl Kay Globalization Insider ­ March 19, 2004 http://www.lisa.org/archive_domain/newsletters/2004/1.3/kay.html?access=manioca The Dilemma for Japanese Cell Phone Users Gangster movies notwithstanding, most Japanese still have ten fingers. But when using a cell phone moving around in Tokyo, nine of those fingers are otherwise occupied holding the device itself (four of ‘em) and the strap one clings to for life (the other five) in the sardine­can packed subway. That leaves people with one finger and ten keys to deal with 6,000 characters! Carl Kay explains how cell phone manufacturers (and users) are rising to the challenge. The Japanese have gone from typing 6,000 characters with ten fingers on 100 keys to doing it with just one finger and only ten keys. According to Naruhito Tanaka of Omron Software, “In Japan, about 10 million people touch­type on PC keyboards, while over 30 million send mail from their cell phones. So the cell phone keyboard is the defacto standard now.” (2002, Japanese). When I wrote “Japanese Software Wars” for Language International (9.3:10–11, 47) back in 1997 about the linguistic and technical issues of inputting Japanese text using a PC keyboard, and the related battle between Microsoft and Japan’s Justsystem to dominate the Japanese PC desktop, I never imagined the reality of 2002 described by Tanaka. Having once tried to explain the challenges of typing 6,000 characters with only ten fingers and the 100 keys of the PC keyboard, here I’d like to describe the emerging technical, business and cultural trends related to the challenge of typing the same 6,000 characters with just one finger and only ten keys.
    [Show full text]
  • International Language Environments Guide for Oracle® Solaris 11.3
    International Language Environments ® Guide for Oracle Solaris 11.3 Part No: E54757 December 2018 International Language Environments Guide for Oracle Solaris 11.3 Part No: E54757 Copyright © 2011, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • IME As a Possible Keylogger
    IME as a Possible Keylogger Masaki Suenaga SecuritySymantec Response, Tokyo Originally published bypublished Originally Virus Bulletin, November by 2005.held Virus Bulletin, Copyright Ltd., but is made bycharge of free permissionavailable of Virus Bulletin. For more information on Virus Bulletin, please visit http://virusbtn.com/ WHITE PAPER: SYMANTEC SECURITY RESPONSE White Paper: Symantec Security Response IME as a Possible Keylogger Contents Abstract.......................................................................................................................................4 Introduction................................................................................................................................ 4 An IME Is Loaded In Every Process ........................................................................................... 9 An IME Can Be Added ................................................................................................................ 9 IMEs Capture Every Keystroke Without Hooking ..................................................................... 10 IMEs Are Loaded In Safe Mode ..................................................................................................11 More Harmful Actions ................................................................................................................11 Details Of The IME Interface ..................................................................................................... 11 DllMain ......................................................................................................................................
    [Show full text]
  • Macos X Workshop — an Apt-Rpm System on Macos X — 10.6-1 for I386/X86 64
    MacOS X WorkShop | an apt-rpm system on MacOS X | 10.6-1 for i386/x86 64 KOBAYASHI Taizo 2011/08/24 CocoaEmacs を入れ、TeXLive を入れ、、、 ghostscript を入れ、gnuplot を入れ、、、、 ドットファイル群を設定して、、、、 でも、LaTeXiT が動かなかったりする。。。。 web 上の掲示板でしばしば目にする光景です。 みんな殆ど同じ事をするのに、 ひとり一人が、或は一台一台大変な作業を繰り返すのは 開発者か趣味でもない限り大いなる無駄!! だと思いませんか? MacOS X で LaTeX や emacs 等の環境を整えられてきた 先人達の成果を集積したものと、 Vine Linux の行き届いた環境を融合させたもの、 それが MacOS X WorkShop です。 MacOS X WorkShop を利用すれば、 定評のある Vine Linux の TeX 環境が一発で構築でき、 すぐさま仕事に入れます。 1 ただし、このプロジェクトの成果物を利用して不具合が生じても、 プロジェクトとしてもプロジェクトに関係する如何なる人間も 一切責任を負わないものとします。 また、バグ報告やパッケージングの要望は歓迎しますが 迅速な対応は期待しないでください。 と云うよりも、要望をお持ちでしたら、 是非、要望を実現した姉妹 apt-rpm tree を作ってください!! 最後に、 我々は企業のサポート窓口ではありません! こちらで不具合を再現出来る程度の情報がバグ報告に無い限り、 返事も対応も無いと考えてください。 Copyright ⃝c 2004-2011 KOBAYASHI Taizo All rights reserved. 2 目 次 1 はじめに 5 1.1 何故 apt-rpm か? :::::::::::::::::::::::::::::::::::::::: 5 1.2 プロジェクトのポリシー ::::::::::::::::::::::::::::::::::::: 8 1.3 派生プロジェクトの歓迎 ::::::::::::::::::::::::::::::::::::: 9 1.4 連絡先とメンバー ::::::::::::::::::::::::::::::::::::::::: 9 1.5 ライセンス :::::::::::::::::::::::::::::::::::::::::::: 10 2 姉妹 trees !! 11 3 MacOS X WorkShop をインストールする 12 3.1 インストールする前に… ::::::::::::::::::::::::::::::::::::: 12 3.2 ターミナルの設定 ::::::::::::::::::::::::::::::::::::::::: 12 3.3 Install ::::::::::::::::::::::::::::::::::::::::::::::: 13 3.4 Remote Install :::::::::::::::::::::::::::::::::::::::::: 15 3.5 SnowLeopard 以前の版からの Upgrade ::::::::::::::::::::::::::::: 15 3.6 Uninstall ::::::::::::::::::::::::::::::::::::::::::::: 15 4 MacOS X WorkShop の使い方 17 4.1 apt の「いろは」
    [Show full text]