Learning Ios Design Addison-Wesley Learning Series
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Providing Context for Twitter Analysis
International Journal of Computer and Information Technology (ISSN: 2279 – 0764) Volume 03 – Issue 06, November 2014 What are we tweeting about? Providing Context for Twitter Analysis Martin Ebner, Thomas Altmann Social Learning Graz University of Technology Graz, Austria Email: martin.ebner {at} tugraz.at Abstract— Twitter is a medium, which is primarily used for real- agreed to use #edmedia13 in their messages. Now any Twitter time communication. Due to the limitations of retrieving older user can search Twitter for such a keyword or hashtag, but the tweets, archiving them is necessary to enable users to access and results are limited and not usable for automated analysis. analyze old tweets. When analyzing tweet archives, more contexts Therefore we strongly propose that access to an Application can lead to better results. This research work aims to determine Programming Interface (API) is needed. Twitter itself provides the value of context for an analysis of tweet archives. First of all powerful APIs for developers to interact with. In general there the current state of the art of Twitter analysis research is are two different kinds of APIs: The REST API and the discussed. Afterwards a tool called TweetCollector is introduced, Streaming API. which provides archiving capabilities. Additionally, a further tool for Twitter analysis called TwitterStat is developed. Finally a The REST API enables a developer to make individual real-world use case is performed and discussed in depth. The requests for sending or retrieving data to and from Twitter. research study points out that providing this context leads to This extends to virtually all interactions possible with Twitter: better understanding of the analysis results. -
Social Media Stories. Event Detection in Heterogeneous Streams Of
Social Media Stories. Event detection in heterogeneous streams of documents applied to the study of information spreading across social and news media Béatrice Mazoyer To cite this version: Béatrice Mazoyer. Social Media Stories. Event detection in heterogeneous streams of documents applied to the study of information spreading across social and news media. Social and Information Networks [cs.SI]. Université Paris-Saclay, 2020. English. NNT : 2020UPASC009. tel-02987720 HAL Id: tel-02987720 https://tel.archives-ouvertes.fr/tel-02987720 Submitted on 4 Nov 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Social Media Stories Event detection in heterogeneous streams of documents applied to the study of information spreading across social and news media Thèse de doctorat de l’Université Paris-Saclay École doctorale n◦ 573 : approches interdisciplinaires, fondements, applications et innovation (Interfaces) Spécialité de doctorat : Informatique Unité de recherche : Université Paris-Saclay, CentraleSupélec, Mathématiques et Informatique pour la Complexité -
Open Innovation Opportunities and Business Benefits of Web Apis a Case Study of Finnish API Providers
Open Innovation Opportunities and Business Benefits of Web APIs A Case Study of Finnish API Providers MSc program in Information and Service Management Master's thesis Antti Hatvala 2016 Department of Information and Service Economy Aalto University School of Business Powered by TCPDF (www.tcpdf.org) Open Innovation Opportunities and Business Benefits of Web APIs A Case Study of Finnish API Providers Master’s Thesis Antti Hatvala 1 June 2016 Information and Service Economy Approved in the Department of Information and Service Economy __ / __ / 20__ and awarded the grade _______________________________________________________ Aalto University, P.O. BOX 11000, 00076 AALTO www.aalto.fi AbstraCt of master’s thesis Author Antti Hatvala Title of thesis Open Innovation Opportunities and Business Benefits of Web APIs - A Case Study of Finnish API Providers Degree Master of Science in Economics and Business Administration Degree programme Information and Service Economy Thesis advisor(s) Virpi Tuunainen Year of approval 2016 Number of pages 66 Language English AbstraCt APIs aka application programming interfaces have been around as long as there have been software applications, but rapid digitalization of business environment has brought up a new topic of discussion: What is the business value of APIs? This study focuses on innovation and business potential of web APIs. The study reviews existing literature about APIs and introduces concepts including API value chain and different approaches to API strategy. The study also investigates critically the concept of “API Economy” and the relationship between APIs and some current technological trends like mobile computing, Internet of Things and open data. The study employs the theory of open innovation, which was originally conceived by Henry Chesbrough. -
Titans and Trolls of the Open Source Arena
Titans and Trolls Enter the Open-Source Arena * by DEBRA BRUBAKER BURNS I. Introduction .................................................................................... 34 II. Legal Theories for Open Source Software License Enforcement ................................................................................... 38 A. OSS Licensing .......................................................................... 38 B. Legal Theories and Remedies for OSS Claims .................... 40 1. Legal Protections for OSS under Copyright and Contract Law ..................................................................... 40 Stronger Protections for OSS License under Copyright Law ................................................................... 40 2. Copyright-Ownership Challenges in OSS ....................... 42 3. Potential Legal Minefields for OSS under Patent Law ...................................................................................... 45 4. Added Legal Protection for OSS under Trademark Law ...................................................................................... 46 5. ITC 337 Action as Uncommon Legal Protection for OSS ..................................................................................... 49 III. Enforcement Within the OSS Community .................................. 49 A. Software Freedom Law Center Enforces OSS Licenses .... 50 B. Federal Circuit Finds OSS License Enforceable Under Copyright Law ......................................................................... 53 C. Commercial OSS -
Challenges and Directions for Dependable Computing”
Workshop “Challenges and Directions for Dependable Computing” 41st Meeting of IFIP WG 10.4 — Saint John, US VI — January 4-8, 2002 — — — 01. From Fault Injection Experiments to Dependability Benchmarking Jean Arlat (LAAS-CNRS, Toulouse, France) 02. Building a Hierarchical Defense: An Immune System Paradigm for Fault-Tolerant System Design Algirdas Avizˇienis (University of California at Los Angeles, USA) 03. Dependable Computer Networks Dimiter R. Avresky (Northeastern University, Boston, MA, USA) 04. Interactions and Tradeoffs between Software Quality Attributes Mario Barbacci and Charles B. Weinstock (SEI-CMU, Pittsburgh, PA, USA) 05. Production Process of Dependable Systems / Human Factors / Emerging Applications / Middleware Platforms Andrea Bondavalli (University of Florence, Italy), Felicita Di Giandomenico (IEI-CNR, Pisa, Italy) and Luca Simoncini (CNUCE-CNR and University of Pisa, Italy) 06. Creating Robust Software Interfaces: Fast, Cheap, Good — Now You Can Get All Three John DeVale and Philip Koopman (Carnegie Mellon University, Pittsburgh, PA, USA) 07. Pervasive Dependability: Moving Dependable Computing Towards Mainstream Systems Cristof Fetzer and Richard D. Schlichting (AT&T Labs–Research, Florham Park, NJ, USA) 08. Dependability Challenges in Model-Centered Software Development David P. Gluch (Embry-Riddle Aeronautical University, Daytona Beach, FL, USA) 09. Report Correlation for Improved Intrusion Detection and Fault Diagnostics Walter L. Heimerdinger (Honeywell Technology Center, Minneapolis, MN, USA) 10. Future Automotive Scenarios and R&D Challenges Günter Heiner (DaimlerChrysler AG, Berlin, Germany) 11. Dependability Challenges in Pushed-based Systems Yennun Huang (PreCache Inc., Bridgewater, NJ, USA) 12. Dependability Challenges in the Field of Embedded Systems Hermann Kopetz (Vienna University of Technology, Austria) 13. Dependability: Information Assurance Research Agenda Jaynarayan H. -
Assessing Asymmetric Fault-Tolerant Software
Assessing asymmetric fault-tolerant software Peter Popov, Lorenzo Strigini Centre for Software Reliability City University London United Kingdom [email protected], [email protected] Abstract — The most popular forms of fault tolerance against components in these systems. But this research has been design faults use "asymmetric" architectures in which a mostly limited to “symmetric” architectures: “multiple "primary" part performs the computation and a "secondary" version software” and similar schemes, in which two or part is in charge of detecting errors and performing some kind more diverse, redundant components perform equivalent of error processing and recovery. In contrast, the most studied functions and their outputs are “adjudicated” (by voting or forms of software fault tolerance are "symmetric" ones, e.g. N- some other algorithm, built into the computer system or the version programming. The latter are often controversial, the physical controlled systems) to decide which values will be former are not. We discuss how to assess the dependability output to the controlled system. Such architectures are gains achieved by these methods. Substantial difficulties have important for some highly critical applications, but also been shown to exist for symmetric schemes, but we show that expensive and relatively rare. In most systems, fault the same difficulties affect asymmetric schemes. Indeed, the latter present somewhat subtler problems. In both cases, to tolerance against design faults takes the form of predict the dependability of the fault-tolerant system it is not “asymmetric” architectures, in which a “primary” enough to know the dependability of the individual component (we will often use the term “primary” alone for components. -
Green Tweets
twitter_praise_page Page i Thursday, March 12, 2009 12:35 PM Praise for Twitter API: Up and Running “Twitter API: Up and Running is a friendly, accessible introduction to the Twitter API. Even beginning web developers can have a working Twitter project before they know it. Sit down with this book for a weekend and you’re on your way to Twitter API mastery.” — Alex Payne, Twitter API lead “This book rocks! I would have loved to have had this kind of support when I initially created TwitDir.” — Laurent Pantanacce, creator of TwitDir “Twitter API: Up and Running is a very comprehensive and useful resource—any developer will feel the urge to code a Twitter-related application right after finishing the book!” — The Lollicode team, creators of Twitscoop “A truly comprehensive resource for anyone who wants to get started with developing applications around the Twitter platform.” — David Troy, developer of Twittervision “An exceptionally detailed look at Twitter from the developer’s perspective, including useful and functional sample code!” — Damon Cortesi, creator of TweetStats, TweepSearch, and TweetSum “This book is more than just a great technical resource for the Twitter API. It also provides a ton of insight into the Twitter culture and the current landscape of apps. It’s perfect for anyone looking to start building web applications that integrate with Twitter.” — Matt Gillooly, lead developer of Twalala “A wonderful account of the rich ecosystem surrounding Twitter’s API. This book gives you the insight and techniques needed to craft your own tools for this rapidly expanding social network.” — Craig Hockenberry, developer of Twitterrific twitter_praise_page Page ii Thursday, March 12, 2009 12:35 PM Twitter API: Up and Running Twitter API: Up and Running Kevin Makice Beijing • Cambridge • Farnham • Köln • Sebastopol • Taipei • Tokyo Twitter API: Up and Running by Kevin Makice Copyright © 2009 Kevin Makice. -
[Dense, Subtropical, Sustainable] the Liveable Multi-Storey Apartment Building
[DENSE, SUBTROPICAL, SUSTAINABLE] THE LIVEABLE MULTI-STOREY APARTMENT BUILDING Rosemary Kennedy BDesSt. BArch(Hons) UQld GradCert(EnvMan) UQld Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy Centre for Subtropical Design Creative Industries Faculty Queensland University of Technology June 2015 Keywords Architecture, apartments, apartment buildings, acoustics, air quality, air- conditioning, balconies, charrette, climate, climate-responsive design, crisis, daylight, density, dwelling, energy, energy efficiency, housing, greenhouse gas emissions, liveability, multi-storey apartment building, neighbourhood, noise, post- occupancy evaluation, privacy, private open space, renewable energy technology, residents, resident perceptions, residential environment, resilience, satisfaction, satisficing, subtropical, sustainability, thermal comfort, typology, urban consolidation, ventilation [Dense, subtropical, sustainable] The liveable multi-storey apartment building i Abstract This study positions private-sector multi-storey apartment buildings (MSABs) in Australia’s subtropical cities within the context of urban sustainability and identifies the conundrums associated with the suitability and acceptance of apartment buildings as a housing type in this mix. Not only is the MSAB inherently energy-intensive, but Australian residents have expressed a reluctance to transition permanently to apartment living. Unless apartment living becomes a far more attractive proposition for residents, and apartment buildings far less CO2 intensive, then apartment developments will remain incongruous elements of the 21st Century city. While many researchers have investigated the relationship between urban consolidation, density and housing form in terms of overall urban energy consumption of the contemporary Australian city, relatively little is known about the social, cultural, economic and environmental “fit” of MSABs, and particularly the dwellings within them, with the lifestyle expectations of residents of Australia’s subtropical humid settlements. -
Nrc Technical Basis for Evaluation of Its Position on Protection Against Common Cause Failure in Digital Systems Used in Nuclear Power Plants
NRC TECHNICAL BASIS FOR EVALUATION OF ITS POSITION ON PROTECTION AGAINST COMMON CAUSE FAILURE IN DIGITAL SYSTEMS USED IN NUCLEAR POWER PLANTS Steven A. Arndt, Rossnyev Alvarado, Bernard Dittman and Kenneth Mott1 U.S. Nuclear Regulatory Commission Washington, D.C. 20555 [email protected]; [email protected]; [email protected]; [email protected] Richard Wood Department of Nuclear Engineering University of Tennessee Knoxville, TN 37996 [email protected] ABSTRACT Digital technology has advantages over analog systems, including automated monitoring and alerts for standby safety functions, and predictive algorithms to maintain critical safety systems. Additionally, digital technology generally has higher reliability and can be designed to reduce single point vulnerabilities. For these reasons many nuclear plants have applied digital technology to safety and non-safety related applications, including reactor protection system, feedwater and turbine controls, etc. with a corresponding significant improvement in trip reduction. Nonetheless, digital instrumentation and control (I&C) systems also present potential new vulnerabilities that need to be assessed, including potential failures due to increased complexity of digital systems, the introduction of unique failure modes due to software (including software common cause failure (CCF)), and limited operating history of digital systems in nuclear safety related applications compared to analog systems. The fact that software is intangible means that common methods, such as analysis or testing, used for detecting CCF may not be effective when applied to software. Consequently, digital technology is perceived to pose a potential risk from the introduction of undetected systematic faults that could result in CCF. Despite the I&C system upgrades and modifications performed to date, the U.S. -
About This Particular Macintosh 6.03
Cover ATPM About This Particular Macintosh™ 6.03: About the personal computing experience™ Volume 6, Number 3 March 1, 2000 Sign up for free subscriptions at: http://www.atpm.com/subscribe or send email to: [email protected] ATPM 6.03 ←→1 Cover Cover Art Copyright © 2000 David Knopfler david@knopfler.com http://www.knopfler.com We need new cover art every month! Write to us! Contributors Eric Blair Daniel Chvatik Paul Fatula Scott Feldstein Matthew Glidden Edward Goss Lisa Haller Tom Iov ino Nick Kratz Robert Paul Leitao William Lovett Colin Mansfield Jamie McCornack Grant Osborne David Ozab David Spencer Michael Tsai Christopher Turner Macintosh users like you Please write for ATPM! Check out the FAQ. Editorial Staff Publisher/Editor-in-Chief - Michael Tsai Managing Editor - Daniel Chvatik Associate Editor/Reviews - Paul Fatula ATPM 6.03 ←→2 Cover Associate Editor/Shareware Reviews - William Lovett Copy Editors - Raena Armitage Johann Campbell Paul Fatula Brooke Smith Adam Zaner Publicity Manager - Christopher Turner Contributing Editor/Welcome - Robert Paul Leitao Contributing Editors/Opinion - Tom Iovino Scott Feldstein Contributing Editors/Reviews - Eric Blair Evan Trent Vac a nt Contributing Editor/How To’s & Reviews - Jamie McCornack Contributing Editor/Trivia - Edward Goss Contibuting Editor/Music - David Ozab Contributing Editor/Networking - Matthew Glidden Contributing Editor/Web - David Spencer Help Jedi - Christopher Turner Hollywood Guy - Mike Shields Webmaster - Michael Tsai Assistant Webmaster - A. Lee Bennett Interviews -
Compact Electronic Newsletter, July 2011, Issue 40
Apps for Actuaries ISSUE 40 | JULY 2011 Table of Contents Letter from the Chair APPS FOR ACTUARIES by Kevin Pledge and Eddie Smith Editor's Notes The Technology Section is sponsoring a series of meeting sessions Excel Formula Rogue's titled 'Apps for Actuaries'; the first of these took place at the Life and Gallery Annuity Symposium in New Orleans and is being repeated at the The Microsoft Excel Health Meeting and Annual Meeting. The session in New Orleans OFFSET Function was so well received that we thought that a series of articles covering apps would be interesting to our members. Each article will Apps for Actuaries review three or four apps that typically run on smart phones such as the iPhone, Android phones, Blackberry, and Windows 7 Phone, as In Praise of well as the iPad and Android tablets. We may also cover Chrome Approximations OS; more about this in future articles. Apps, Actuaries and Other Technology at the Surprisingly, a show of hands at the New Orleans meeting showed SEAC and Beyond that only half the attendees at that session had a smart phone or tablet device. Maybe these articles will show you the value in these Number Puzzle devices if you don't yet have one. Another reason to consider these Solution devices is that all future meetings will have Wi-Fi in the meeting rooms and there will be meeting apps—appropriately enough the Articles Needed first app we review will be the SOA Meeting App. SOA News Today Has a SOA Meeting App (Kevin) New Look! Improved The specific meeting app we are reviewing is for the 2011 Health Navigation Meeting. -
A FAULT TOLERANT INTEGRATED Cl RCUIT MEMORY Thesis By
A FAULT TOLERANT INTEGRATED Cl RCUIT MEMORY Thesis by Anthony Francis Barton In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy California Institute of Technology Pasadena, California 1980 (Submitted April 14, 1980) - i i - ACKNOWLEDGEMENTS First would like to thank my parents whose support and encouragement have been unfailing over the past 26 years. Their early teaching and later guidance have been the most important influences in my life. At Caltech my chief mentor was Chuck Seitz, my advisor; I am grateful to him for suggesting the topic for this research and for his help with and interest in the project. Useful contribu tions were also made by Lennart Johnsson, Jim Kajiya, Carver Mead and I van Sutherland. have a lso benefited from working, talking and relaxing with other members of the Caltech community too numerous to mention individually. Acknowledgements for financial support go to the North Atlantic Treaty Organisation (studentship 8/76/ 3003) and the Defence Advanced Research Projects Agency (contracts N00123-78-C-0806 and N00014-79-C-0597). - iii - ABSTRACT Most commercially produced integrated circuits are incapable of tolerating manufacturing defects. The area and function of the circuits is thus limited by the probability of faults occurring within the circuit. This thesis examines techniques for using redundancy in memory circuits to provide fault tolerance and to increase storage capacity. A hierarchical memory architecture using multiple Hamming codes is introduced and analysed to determine its resistance to manufacturing defects. The results of the analysis indicate that substantial yield improvement is possible with relatively modest increases in circuit area.