Section Title Here Smartphones
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Building Blocks for Tomorrow's Mobile App Store
Building Blocks for Tomorrow’s Mobile App Store by Justin G. Manweiler Department of Computer Science Duke University Date: Approved: Romit Roy Choudhury, Supervisor Jeffrey S. Chase Landon P. Cox Victor Bahl Dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2012 Abstract (0984) Building Blocks for Tomorrow’s Mobile App Store by Justin G. Manweiler Department of Computer Science Duke University Date: Approved: Romit Roy Choudhury, Supervisor Jeffrey S. Chase Landon P. Cox Victor Bahl An abstract of a dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2012 Copyright c 2012 by Justin G. Manweiler All rights reserved Abstract In our homes and in the enterprise, in our leisure and in our professions, mobile computing is no longer merely “exciting;” it is becoming an essential, ubiquitous tool of the modern world. New and innovative mobile applications continue to inform, entertain, and surprise users. But, to make the daily use of mobile technologies more gratifying and worthwhile, we must move forward with new levels of sophistication. The Mobile App Stores of the future must be built on stronger foundations. This dissertation considers a broad view of the challenges and intuitions behind a diverse selection of such new primitives. Some of these primitives will mitigate exist- ing and fundamental challenges of mobile computing, especially relating to wireless communication. Others will take an application-driven approach, being designed to serve a novel purpose, and be adapted to the unique and varied challenges from their disparate domains. -
Toward Building a Safe, Secure, and Easy-To-Use Internet of Things
IOT CONNECTION Toward Building a Safe, Secure, and Easy-to-Use Sal glances at the display near her office door and sees that her next meeting is in 10 Internet of Things minutes. One participant is out of town and the other two people are running late, but the meeting room is still occupied Infrastructure by several people. The display also suggests it might be a Yuvraj Agarwal and Anind K. Dey, Carnegie Mellon University good time to get coffee because the lines are short at the cafe downstairs. Her good friend Joe Carnegie Mellon University is leading a happens to be at the cafe, too. multi-institutional effort to build an open Sal checks an app she recently built and sees that the coffee is infrastructure to support the Internet of Things. freshly brewed. “That simplifies things,” she thinks to herself as she heads toward the cafe. safe and secure world enabled by the Inter- This is the unique promise of a successful IoT, and is net of Things (IoT) promises to lead to truly what we are aiming for with GIoTTO, the IoT program connected environments, where people and at Carnegie Mellon University (CMU) named after the things collaborate to improve the overall famous Renaissance painter. qualityA of life. The IoT will give us actionable informa- tion at our fingertips, without us having to ask for it or NEED FOR AN OPEN INFRASTRUCTURE even recognizing that it might be needed. Consider this Although numerous commercial and academic programs example that combines many simple uses of the IoT to cu- focus on building IoT systems, it’s clear that for any IoT mulatively form an omnipotent assistant: stack to be widely adopted, it must be open—without a 40 COMPUTER PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-9162/16/$33.00 © 2016 IEEE EDITOR ROY WANT Google; [email protected] singular organization claiming own- ership. -
Passing the Torch
From the Editor in Chief Editor in Chief: M. Satyanarayanan ■ Carnegie Mellon University ■ [email protected] Passing the Torch M. Satyanarayanan his issue marks the end of my sec- a highly portable information appliance LOOKING BACK, T ond two-year term as editor in that transforms nearby displays and LOOKING FORWARD chief. I am delighted to introduce my input devices into a transient personal- In August 2001, 10 years after the successor, Roy Want of Intel Research, computing environment. Roy has pub- publication of Mark Weiser’s seminal who will begin his term on 1 January lished extensively over his research career paper introducing the concept of ubiq- 2006. I will continue to serve as active and has over 50 patents to his credit. uitous computing,1 I summarized the editor in chief until that time and will It is hard to imagine a person more field’s progress and reflected on the work closely with Roy to ensure a qualified than Roy to be the next editor challenges ahead in a paper entitled smooth and efficient transition. My in chief of IEEE Pervasive Computing. “Pervasive Computing: Vision and involvement with this publication will In 2001, he was part of the founding edi- Challenges.”2 Looking back, it is grat- continue even after I step down, as I will torial board that created this publication ifying to see how much progress has remain on the editorial board. occurred in just four short years. Many forces have converged to make IN GOOD HANDS It is hard to this progress possible, one of which was Roy received his PhD from Cambridge imagine a substantial industry investment in prod- University in 1988, under the supervision person more uct development relevant to mobile and of Roger Needham. -
Professional Skills in Computer Science Lecture 3: Historical Aspects of Computing
Professional Skills in Computer Science Lecture 3: Historical Aspects of Computing Ullrich Hustadt Department of Computer Science School of Electrical Engineering, Electronics, and Computer Science University of Liverpool Ullrich Hustadt COMP110 Professional Skills in Computer Science L3 { 1 Further milestones The Future Contents 1 Further milestones 2 The Future Fundamental questions Model-View-Controller Relevant learning outcome: 1 Ability to describe and discuss economic, historic, organisational, research, and social aspects of computing as a discipline and computing in practice; Ullrich Hustadt COMP110 Professional Skills in Computer Science L3 { 2 Further milestones The Future What have computers been used for? (Summary) • 1600 { now: Calculation Manipulation of numbers • 1960 { now: Information Processing Manipulation of numbers, text, images, audio, video • 1960 { now: Cognition (Reasoning) Manipulation of knowledge via reasoning / inference • 1970 { now: Interaction Allowing people to communicate, cooperate, compete • 1970 { now: Automation Computer-controlled machines and robots Hypotheses: • The wave of innovation in the 60s and 70s is due to the increased availability of computing resources to more and more researchers • Leadership is mostly due to early exposure to state-of-the-art systems and due to hard work Ullrich Hustadt COMP110 Professional Skills in Computer Science L3 { 3 Further milestones The Future What have computers been used for? What important milestones in the development and use of computers were not covered -
Curriculum Vitae: Roy Want
Curriculum Vitae: Roy Want E-mail: roywant AT google.com ; roywant AT acm.org Google Inc, Mail-Stop: US-MTV-B43 1600 Amphitheatre Parkway Mountain View, CA 94043, USA Office/Cell: (650) 691 3600 Date: January, 2019 Up-to-date CV: http://www.roywant.com/cv/vita.htm Research Interests Mobile & ubiquitous computing, location & context-aware systems, electronic tagging(RFID/NFC/BLE), hardware design, electronic commerce, smart cards, distributed systems, multimedia systems, cellular automata, novel UI, and MEMS. Professional ACM Fellow: 2005, and ACM (Association of Computer Machinery) member since 1996. IEEE Fellow: 2005 and IEEE (Institute for Electrical and Electronic Engineers) member since 1991. Lillian Gilbreth lectureship, National Academy of Engineering (NAE), Washington DC, Oct 12th, 2003 Education Ph.D. Cambridge University UK, Churchill College, Computer Science, Advisor: Roger Needham, 1983-88 o Thesis title: "Reliable Management of Voice in a Distributed System" BA hons. Cambridge University UK, Churchill College, Nat. Science/Computer Science, Tutor: Frank King, 1980-83 o Dissertation title: “A Local Area Network (LAN) Based on the Domestic Mains Supply” High School: William Ellis Grammar School, London UK, 1972-79 Experience Google Inc. (2011-present) o Senior Research Scientist: Google Research and Android Location & Context Team Intel Corporation (2001-2011) o Senior Principal Engineer (SPE) 2008-2011 -Assoc. Director: ILSC (2009-10) & Director (NPL) 2010-11 o Principal Engineer (PE) 2000-2007 Xerox - Palo Alto Research Center (PARC). Computer Science Laboratory (CSL). 1991 - 2001 (reporting to Mark Weiser, Laboratory Manager for CSL; CTO) o Principal Scientist 2000-2001 o Area Manager for Embedded Systems Area 1992-1999 o Member of Research Staff II 1991-1992. -
Introduction to Smartphones Beginners Guide TOPIC INTRODUCTION to SMARTPHONES
Tech Savvy Seniors Introduction to Smartphones Beginners Guide TOPIC INTRODUCTION TO SMARTPHONES OVERVIEW Phones used to be all about making calls, but now your mobile can do so much more. The range of new touchscreen smartphones allows you to access the internet, use social media, get live news updates, play music and video, and much more. They almost universally use touchscreens for control, however, which can be a challenge for people new to the technology. WHO IS THIS Maybe you’ve never owned a mobile and are curious WORKSHOP FOR? about why you’d choose a smartphone. Perhaps you want a mobile phone that does more than your current keypad-style handset, or are looking to learn more about the smartphone you already own. This workshop has something to satisfy each of you. WHAT YOU’LL An internet-connected smartphone; either your NEED own or supplied by the workshop organisers. You may need to share a smartphone with others in the workshop. An existing Apple account (or Apple ID), for downloading apps to an iPhone smartphone. An existing Google account (or Google ID), for downloading apps to an Android smartphone. WHAT YOU’LL In this workshop, you will learn the basics of how LEARN to navigate your way around a smartphone with a touchscreen. You will learn how to turn the phone on and off, make and receive calls, add a contact and look up a contact, and change the volume on the phone. You will also learn briefly about apps, what they are, how to download them, and the costs associated with them. -
SOUL: an Edge-Cloud System for Mobile Applications in a Sensor-Rich World
2016 IEEE/ACM Symposium on Edge Computing SOUL: An Edge-cloud System for Mobile Applications in a Sensor-rich World Minsung Jang∗, HyunJong Lee†, Karsten Schwan‡, Ketan Bhardwaj‡ ∗AT&T Labs - Research, [email protected] †University of Michigan, [email protected] ‡Georgia Institute of Technology, {karsten, ketanbj}@gatech.edu Abstract—With the Internet of Things, sensors are becoming In order for such apps to efficiently interact with and ever more ubiquitous, but interacting with them continues manage the dynamic sets of currently accessible sensors with to present numerous challenges, particularly for applications the associated actuators and software services, SOUL (Sensors running on resource-constrained devices like smartphones. The Of Ubiquitous Life) SOUL abstractions in this paper address two issues faced • by such applications: (1) access to sensors with the levels of externalizes sensor & actuator interactions and process- convenience needed for their ubiquitous, dynamic use, and only ing from the resource-constrained device to edge- and by parties authorized to do so, and (2) scalability in sensor remote-cloud resources, to leverage their computational and access, given today’s multitude of sensors. Toward this end, storage abilities for running the complex sensor processing SOUL, first, introduces a new abstraction for the applications to functionality; transparently and uniformly access both on-device and ambient • sensors with associated actuators. Second, potentially expensive automates reconfiguration of these interactions when sensor-related processing needs not just occur on smartphones, better-matched sensors and actuators become physically but can also leverage edge- and remote-cloud resources. Finally, available; SOUL provides access control methods that permit users to easily • supports existing sensor-based applications allowing define access permissions for sensors, which leverages users’ social ties and captures the context in which access requests them to use SOUL’s capabilities without requiring modi- are made. -
The Ways Young Adults Access Digital Information Cydney Lauren Palmer Louisiana State University and Agricultural and Mechanical College, [email protected]
Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2011 There's an app for that: the ways young adults access digital information Cydney Lauren Palmer Louisiana State University and Agricultural and Mechanical College, [email protected] Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_theses Part of the Mass Communication Commons Recommended Citation Palmer, Cydney Lauren, "There's an app for that: the ways young adults access digital information" (2011). LSU Master's Theses. 711. https://digitalcommons.lsu.edu/gradschool_theses/711 This Thesis is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Master's Theses by an authorized graduate school editor of LSU Digital Commons. For more information, please contact [email protected]. THERE’S AN APP FOR THAT: THE WAYS YOUNG ADULTS ACCESS DIGITAL INFORMATION A Thesis Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Master in Mass Communication in The Manship School of Mass Communication by Cydney Lauren Palmer B.A., Louisiana State University, 2008 December 2011 ACKOWLEDGMENTS First, I would like to thank my parents, Allan and Karin Palmer, for their support and encouragement while pursuing my master’s degree. I would also like to thank Dr. Yongick Jeong for his continuous guidance and support throughout the tedious development of this academic research project. Finally, I would like to thank my additional thesis committee members, Dr. Lance Porter and Dr. -
Running IBM Websphere Application Server on System P and AIX: Optimization and Best Practices
Front cover Running IBM WebSphere Application Server on System p and AIX: Optimization and Best Practices System p and AIX configuration strategies for WebSphere Application Server How JVM runtime and WebSphere Application Server interact with AIX Implementation scenarios Lutz Werner Denefleh Anderson de Sousa Ribeiro Dias Simon Kapadia Monty Poppe Colin Renouf Kwan-Ming Wan ibm.com/redbooks International Technical Support Organization Running IBM WebSphere Application Server on System p and AIX: Optimizaton and Best Practices September 2008 SG24-7347-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition September 2008 This edition applies to IBM WebSphere Application Server Version 6.1, IBM AIX Version 5.3, and IBM AIX Version 6.1. © Copyright International Business Machines Corporation 2008. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . x Preface . xi The team that wrote this book . xi Acknowledgements . xiii Become a published author . xiii Comments welcome. xiv Chapter 1. Introduction to running WebSphere Application Server on System p and AIX . 1 1.1 The whole system view: WebSphere, JVM, AIX, and System p . 2 1.1.1 Points of view . 2 1.1.2 A holistic system approach . 3 1.2 System layers and points of view . 3 1.2.1 Points of view and terminology . 4 1.3 The remainder of this book . 5 Chapter 2. WebSphere on System p and AIX 5 strategies . 7 2.1 Scalability considerations . -
Die Meilensteine Der Computer-, Elek
Das Poster der digitalen Evolution – Die Meilensteine der Computer-, Elektronik- und Telekommunikations-Geschichte bis 1977 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 und ... Von den Anfängen bis zu den Geburtswehen des PCs PC-Geburt Evolution einer neuen Industrie Business-Start PC-Etablierungsphase Benutzerfreundlichkeit wird gross geschrieben Durchbruch in der Geschäftswelt Das Zeitalter der Fensterdarstellung Online-Zeitalter Internet-Hype Wireless-Zeitalter Web 2.0/Start Cloud Computing Start des Tablet-Zeitalters AI (CC, Deep- und Machine-Learning), Internet der Dinge (IoT) und Augmented Reality (AR) Zukunftsvisionen Phasen aber A. Bowyer Cloud Wichtig Zählhilfsmittel der Frühzeit Logarithmische Rechenhilfsmittel Einzelanfertigungen von Rechenmaschinen Start der EDV Die 2. Computergeneration setzte ab 1955 auf die revolutionäre Transistor-Technik Der PC kommt Jobs mel- All-in-One- NAS-Konzept OLPC-Projekt: Dass Computer und Bausteine immer kleiner, det sich Konzepte Start der entwickelt Computing für die AI- schneller, billiger und energieoptimierter werden, Hardware Hände und Finger sind die ersten Wichtige "PC-Vorläufer" finden wir mit dem werden Massenpro- den ersten Akzeptanz: ist bekannt. Bei diesen Visionen geht es um die Symbole für die Mengendarstel- schon sehr früh bei Lernsystemen. iMac und inter- duktion des Open Source Unterstüt- möglichen zukünftigen Anwendungen, die mit 3D-Drucker zung und lung. Ägyptische Illustration des Beispiele sind: Berkley Enterprice mit neuem essant: XO-1-Laptops: neuen Technologien und Konzepte ermöglicht Veriton RepRap nicht Ersatz werden. -
Getmobile MOBILE COMPUTING & COMMUNICATIONS REVIEW
GetMobile MOBILE COMPUTING & COMMUNICATIONS REVIEW Volume 21, Issue 2 • June 2017 CONTENTS 3 Message from the Editor-in-Chief 16 22 (ALMOST) UNPUBLISHABLE HIGHLIGHTS 5 RESULTS 22 EmotionCheck: A Wearable Device 16 Experiences Deploying an to Regulate Anxiety through False EXPERIMENTAL METHODS Always-On Farm Network Heart Rate Feedback 5 How Do You Know If 85% Accuracy Is Good Enough for Your Application? 26 9 31 26 HemaApp: Noninvasive Blood Screening of Hemoglobin Using Smartphone Cameras MOBILE PLATFORMS 9 Beyond Reality: Head-Mounted 31 Who Are the Smartphone Users? Displays for Mobile Systems Identifying User Groups with Researchers Apps Usage Behaviors 35 Interpretable Machine Learning for Mobile Notification Management: An Overview of PrefMiner 35 2 GetMobile June 2017 | Volume 21, Issue 2 MESSAGE FROM THE EDITOR-IN-CHIEF CONTRIBUTORS EDITOR-IN-CHIEF IN THIS ISSUE, we highlight four papers Eyal de Lara, University of Toronto from ACM UbiComp 2016. MANAGING EDITOR Donna Paris “EmotionCheck: A Wearable Device DESIGNER JoAnn McHardy to Regulate Anxiety through False Heart SENIOR ADVISORS (Past Editors-in-Chief) Rate Feedback,” by Jean Costa, Alexander Paramvir Bahl, Microsoft Research T. Adams, Malte F. Jung, François Suman Banerjee, University of Wisconsin, Madison Guimbretière, and Tanzeem Choudhury, Srikanth Krishnamurthy, University of California, Riverside describes a device that generates subtle Jason Redi, BBN Technologies vibrations on the wrist to resemble a pulse, Mani Srivastava, University of California, Los Angeles which helps users regulate their anxiety Eyal de Lara Nitin Vaidya, University of Illinois, Urbana-Champaign through false feedback of a slow heart rate. SECTION EDITORS In “HemaApp: Noninvasive Blood Screening of Hemoglobin Ardalan Amiri Sami, University of California, Irvine Using Smartphone Cameras,” Edward Jay Wang, William Li, Doug Aruna Balasubramanian, Stony Brook University Nilanjan Banerjee, University of Maryland, Hawkins, Terry Gernsheimer, Colette Norby-Slycord, and Shwetak N. -
A Study of the Growth and Evolution of Personal Computer Devices Throughout the Pc Age
A STUDY OF THE GROWTH AND EVOLUTION OF PERSONAL COMPUTER DEVICES THROUGHOUT THE PC AGE A dissertation submitted in partial fulfilment of the requirements for the degree of Bachelor of Science (Honours) in Software Engineering Ryan Abbott ST20074068 Supervisor: Paul Angel Department of Computing & Information Systems Cardiff School of Management Cardiff Metropolitan University April 2017 Declaration I hereby declare that this dissertation entitled A Study of the Growth and Evolution of Personal Computer Devices Throughout the PC Age is entirely my own work, and it has never been submitted nor is it currently being submitted for any other degree. Candidate: Ryan Abbott Signature: Date: 14/04/2017 Supervisor: Paul Angel Signature: Date: 2 Table of Contents Declaration .................................................................................................................................. 2 List of Figures ............................................................................................................................... 4 1. ABSTRACT ............................................................................................................................ 5 2. INTRODUCTION .................................................................................................................... 6 3. METHODOLOGY.................................................................................................................... 8 4. LITERATURE REVIEW ............................................................................................................