Software > Blockchain > Augmented

Total Page:16

File Type:pdf, Size:1020Kb

Software > Blockchain > Augmented > Software > Blockchain > Augmented and Virtual Reality > Cyber-Physical Systems SEPTEMBER 2019 www.computer.org Keep Your Career Options Open Upload Your Resume Today! Whether your enjoy your current position or you are ready for change, the IEEE Computer Society Jobs Board is a valuable resource tool. Take advantage of these special resources for job seekers: JOB ALERTS TEMPLATES CAREER RESUMES VIEWED ADVICE BY TOP EMPLOYERS No matter your career WEBINARS level, the IEEE Computer Society Jobs Board keeps you connected to workplace trends and exciting new career prospects. www.computer.org/jobs IEEE COMPUTER SOCIETY computer.org • +1 714 821 8380 STAFF Editor Publications Portfolio Managers Cathy Martin Carrie Clark, Kimberly Sperka Publications Operations Project Specialist Publisher Christine Anthony Robin Baldwin Publications Marketing Project Specialist Meghan O’Dell Senior Advertising Coordinator Debbie Sims Production & Design Carmen Flores-Garvey Circulation: ComputingEdge (ISSN 2469-7087) is published monthly by the IEEE Computer Society. IEEE Headquarters, Three Park Avenue, 17th Floor, New York, NY 10016-5997; IEEE Computer Society Publications Office, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; voice +1 714 821 8380; fax +1 714 821 4010; IEEE Computer Society Headquarters, 2001 L Street NW, Suite 700, Washington, DC 20036. Postmaster: Send address changes to ComputingEdge-IEEE Membership Processing Dept., 445 Hoes Lane, Piscataway, NJ 08855. Periodicals Postage Paid at New York, New York, and at additional mailing offices. Printed in USA. Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, reflect the author’s or firm’s opinion. Inclusion in ComputingEdge does not necessarily constitute endorsement by the IEEE or the Computer Society. All submissions are subject to editing for style, clarity, and space. Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made for profit; 2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-party products or services. Authors and their companies are permitted to post the accepted version of IEEE-copyrighted material on their own Web servers without permission, provided that the IEEE copyright notice and a full citation to the original work appear on the first screen of the posted copy. An accepted manuscript is a version which has been revised by the author to incorporate review suggestions, but not the published version with copy-editing, proofreading, and formatting added by IEEE. For more information, please go to: http://www.ieee.org/publications_standards/publications/rights/paperversionpolicy.html. Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creating new collective works for resale or redistribution must be obtained from IEEE by writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane, Piscataway, NJ 08854-4141 or [email protected]. Copyright © 2019 IEEE. All rights reserved. Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons, provided the per- copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. Unsubscribe: If you no longer wish to receive this ComputingEdge mailing, please email IEEE Computer Society Customer Service at [email protected] and type “unsubscribe ComputingEdge” in your subject line. IEEE prohibits discrimination, harassment, and bullying. For more information, visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html. IEEE Computer Society Magazine Editors in Chief Computer IEEE Security & Privacy Computing in Science David Alan Grier (Interim), David Nicol, University of Illinois & Engineering Djaghe LLC at Urbana-Champaign Jim X. Chen, George Mason University IEEE Micro IEEE Software IEEE Intelligent Systems Lizy Kurian John, University of Ipek Ozkaya, Software V.S. Subrahmanian, Dartmouth Texas, Austin Engineering Institute College IEEE MultiMedia IEEE Internet Computing IEEE Computer Graphics Shu-Ching Chen, Florida George Pallis, University of and Applications International University Cyprus Torsten Möller, University of Vienna IEEE Annals of the History IT Professional of Computing Irena Bojanova, NIST IEEE Pervasive Computing Marc Langheinrich, University of Gerardo Con Diaz, University of Lugano California, Davis www.computer.org/computingedge 1 SEPTEMBER 2019 • VOLUME 5, NUMBER 9 THEME HERE 15 33 40 Flowcharting Compressing VR: Computer Templates Fitting Large Virtual Security as Environments within Civil Defense Limited Physical Space Software 8 The History of Software Engineering GRADY BOOCH 15 Flowcharting Templates PEGGY ALDRICH KIDWELL Blockchain 19 Blockchain and the Economics of Food Safety NIR KSHETRI 23 Silver Bullet Talks with Nick Weaver GARY MCGRAW Augmented and Virtual Reality 27 Co-creation and Risk-Taking—In Pursuit of New Technology for Human Augmentation: An Interview with Pranav Mistry MARC LANGHEINRICH AND NIGEL DAVIES 33 Compressing VR: Fitting Large Virtual Environments within Limited Physical Space KHRYSTYNA VASYLEVSKA AND HANNES KAUFMANN Cyber-Physical Systems 40 Computer Security as Civil Defense MARILYN WOLF 45 Cyber-Physical Systems and Digital Twins in the Industrial Internet of Things CHRISTOS KOULAMAS AND ATHANASIOS KALOGERAS Departments 4 Magazine Roundup 7 Editor’s Note: Software’s Evolution 45 72 Conference Calendar Cyber-Physical Systems and Digital Twins in the Industrial Internet of Things Subscribe to ComputingEdge for free at www.computer.org/computingedge. CS FOCUS Magazine Roundup Science & Engineering, an active hunting stability scheme is proposed for high-speed trains based on frame lateral vibra- tion control. The stability of the vehicle is improved by exerting active control force on the front and rear frames of the bogie. First, a simplifi ed lateral vibra- tion model of a single bogie is he IEEE Computer in static images and videos. established to the control sys- Society’s lineup of 12 However, videos contain addi- tem design. The feedback gain T peer-reviewed techni- tional temporal information and matrix is obtained according cal magazines covers cutting- convey a storyline. The authors to the linear quadratic optimal edge topics ranging from soft- of this article from the May control theory. Then, the mul- ware design and computer 2019 issue of Computer explore tibody dynamics model of the graphics to Internet comput- whether eye movement pat- vehicle is built using SIMPACK, ing and security, from scien- terns refl ect frame importance and the linear stability and tifi c applications and machine during video viewing and facili- straight running performance intelligence to visualization and tate video summarization. are analyzed under diff erent microchip design. Here are working confi gurations. Finally, highlights from recent issues. Computing in Science & the active control eff ects are ver- Engineering ifi ed by a scaled roller rig. Computer Simulation and IEEE Annals of the Human Eye Movements Experimental Study on History of Computing Reveal Video Frame the Active Stability of High- Importance Speed Trains “The Offi cial Response Is Human eye movements indicate In this article from the May/ Never Enough” important spatial information June 2019 issue of Computing in The Rockefeller Foundation 4 September 2019 Published by the IEEE Computer Society 2469-7087/19 © 2019 IEEE shipped two Apple II computers extended discussion of its under- IEEE Internet Computing with VisiCalc to the Tunisian Min- lying concepts, and review and istry of Agriculture to address a compare two previous case stud- Bots Acting Like Humans: grain shortage in the early 1980s. ies where promising results were Understanding and The foundation believed that Visi- obtained in terms of user comfort, Preventing Harm Calc would enable the speedy and engagement, and usability. They Bots are algorithmically driven complex analytical modeling nec- also discuss fi ndings of a novel entities that act like humans in con- essary to improve the management study conducted with geovisual- versations via Twitter, Facebook, and, consequently, the production ization experts, pointing to direc- chats, or Q&A sites. This article of grain resources. The foundation tions for improvement and future from the March/April 2019 issue also argued that VisiCalc would research. of IEEE Internet Computing stud- empower individuals in the Minis- ies how they can aff ect online con- try of Agriculture, improving their IEEE Intelligent Systems versations, provides a taxonomy own analytical thinking as they of harm that can be caused, and became more familiar with the Robust Authentication Using discusses how to prevent harm by modeling capabilities of the soft- Dorsal Hand Vein Images studying when abuses occur. ware. Even with the use of Visi- This article from the March/April Calc, Tunisia experienced violent 2019 issue of IEEE Intelligent Sys- IEEE Micro riots due to high bread prices after tems presents a robust dorsal the government’s removal of grain hand vein authentication system. A Hardware Accelerator for subsidies. This article from the A new method is proposed for the Tracing Garbage Collection January–March 2019 issue of IEEE region of interest
Recommended publications
  • Women in Computing History
    Women in Computing History Denise Gfirer ACM-W0) Co-Chair EMD Consulting Scotts Valley, California 95066 USA <[email protected]> Introduction Exciting inventions, innovative technology, human interac- tion, and intriguing politics fill computing history. However, the recorded history is mainly composed of male achieve- ments and involvements, even though women have played substantial roles. This situation is not unusual. Most science fields are notorious for excluding, undervaluing, or over- looking the accomplishments of their female scientists [1, 16, 17, 22]. As J.A.N. Lee points out, it is up to the histori- ans and others to remedy this imbalance (see this issue [14]). Some steps have been taken towards this goal through pub- lishing biographies on women in technology [2, 5, 6, 8, 10, 12, 13, 18, 20, 21, 23, 24], also see this issue [7], and through honoring the pioneers with various awards such as the GHC'97 Pioneering Awards(z) (Figure 1), the WITI Hall of Fame(3), and the AWC Lovelace Award(n). A few online sites Figure 1: Computer Science Pioneer Celebration, at the Grace Hopper contain biographies of women in technology, shown in Table Celebration of Women in Computing '97. Left to right: (Fran Allen, Ruzena Bajcsy, Adele Mildred Koss, Denise Gtirer, Anita Borg, Jean 1 below. However, even with these resources, many women Jennings Bartik, Judy Levenson Clapp, Thelma Estrin, Joyce Currie Little who have contributed significantly to computer science are (Courtesy Institute for Women in Technology, Palo Alto, California) still to be discovered. preprogrammed software for needed tasks (in particular word processing, email, and database access).
    [Show full text]
  • Patterns Senior Member of Technical Staff and Pattern Languages Knowledge Systems Corp
    Kyle Brown An Introduction to Patterns Senior Member of Technical Staff and Pattern Languages Knowledge Systems Corp. 4001 Weston Parkway CSC591O Cary, North Carolina 27513-2303 April 7-9, 1997 919-481-4000 Raleigh, NC [email protected] http://www.ksccary.com Copyright (C) 1996, Kyle Brown, Bobby Woolf, and 1 2 Knowledge Systems Corp. All rights reserved. Overview Bobby Woolf Senior Member of Technical Staff O Patterns Knowledge Systems Corp. O Software Patterns 4001 Weston Parkway O Design Patterns Cary, North Carolina 27513-2303 O Architectural Patterns 919-481-4000 O Pattern Catalogs [email protected] O Pattern Languages http://www.ksccary.com 3 4 Patterns -- Why? Patterns -- Why? !@#$ O Learning software development is hard » Lots of new concepts O Must be some way to » Hard to distinguish good communicate better ideas from bad ones » Allow us to concentrate O Languages and on the problem frameworks are very O Patterns can provide the complex answer » Too much to explain » Much of their structure is incidental to our problem 5 6 Patterns -- What? Patterns -- Parts O Patterns are made up of four main parts O What is a pattern? » Title -- the name of the pattern » A solution to a problem in a context » Problem -- a statement of what the pattern solves » A structured way of representing design » Context -- a discussion of the constraints and information in prose and diagrams forces on the problem »A way of communicating design information from an expert to a novice » Solution -- a description of how to solve the problem » Generative:
    [Show full text]
  • Iot Design Patterns: Computational Constructs to Design, Build and Engineer Edge Applications
    2016 IEEE First International Conference on Internet-of-Things Design and Implementation IoT Design Patterns: Computational Constructs to Design, Build and Engineer Edge Applications Soheil Qanbari∗, Samim Pezeshki†, Rozita Raisi †, Samira Mahdizadeh∗, Rabee Rahimzadeh†, Negar Behinaein†, Fada Mahmoudi†, Shiva Ayoubzadeh †, Parham Fazlali†, Keyvan Roshani†, Azalia Yaghini†, Mozhdeh Amiri†, Ashkan Farivarmoheb†, Arash Zamani†, and Schahram Dustdar∗ ∗Distributed Systems Group, Vienna University of Technology, Vienna, Austria {qanbari, dustdar}@dsg.tuwien.ac.at †Baha’i Institute for Higher Education (BIHE) {firstname.lastname}@bihe.org Abstract—The objective of design patterns is to make design wiring approach of Hanmer [7]. This articulates the benefits robust and to abstract reusable solutions behind expressive of applying patterns by showing how each piece can fit into interfaces, independent of a concrete platform. They are ab- one integrated solution. stracted away from the complexity of underlying and enabling technologies. The connected things in IoT tend to be diverse With this motivation in mind, the paper continues in Sec- in terms of supported protocols, communication methods and tion II, with a brief review of how IoT design patterns are capabilities, computational power and storage. This motivates documented. Next, we introduce the diversity of our proposed us to look for more cost-effective and less resource-intensive patterns and how they are related to the edge applications IoT microservice models. We have identified a wide range of life-cycle in Section III. With some definitive clues on the design disciplines involved in creating IoT systems, that act as a seamless interface for collaborating heterogeneous things, and pattern language convention, we propose an edge provisioning suitable to be implemented on resource-constrained devices.
    [Show full text]
  • Structured Patterns Metamodel Standardtm Publication
    An OMG® Structured Patterns Metamodel StandardTM Publication OBJECT MANAGEMENT GROUP Structured Patterns Metamodel StandardTM V1.1 _______________________________________________ OMG Document Number: formal/2017-04-05 Release Date: July 2017 Standard document URL: http://www.omg.org/spec/SPMS/1.1 Normative Machine Consumable File(s): http://www.omg.org/spec/ SPMS /201 60301 /SPMS.xmi http://www.omg.org/spec/ SPMS/20160301/PHORML.xml http://www.omg.org/spec/ SPMS /201 60301 /APML.xmi _________________________________________________ Copyright © 2017, Object Management Group, Inc. Copyright © 2014, The Software Revolution, Inc. Copyright © 2014, CAST Copyright © 2014, KDM Analytics Copyright © 2014, Benchmark Consulting Copyright © 2014, eCube Systems Copyright © 2014, MITRE Copyright © 2014, University of North Carolina at Chapel Hill Copyright © 2014, École Polytechnique de Montréal USE OF SPECIFICATION – TERMS, CONDITIONS & NOTICES The material in this document details an Object Management Group specification in accordance with the terms, conditions and notices set forth below. This document does not represent a commitment to implement any portion of this specification in any company's products. The information contained in this document is subject to change without notice. LICENSES The companies listed above have granted to the Object Management Group, Inc. (OMG) a nonexclusive, royalty-free, paid up, worldwide license to copy and distribute this document and to modify this document and distribute copies of the modified version. Each of the copyright holders listed above has agreed that no person shall be deemed to have infringed the copyright in the included material of any such copyright holder by reason of having used the specification set forth herein or having conformed any computer software to the specification.
    [Show full text]
  • Download The
    LEADING THE FUTURE OF TECHNOLOGY 2016 ANNUAL REPORT TABLE OF CONTENTS 1 MESSAGE FROM THE IEEE PRESIDENT AND THE EXECUTIVE DIRECTOR 3 LEADING THE FUTURE OF TECHNOLOGY 5 GROWING GLOBAL AND INDUSTRY PARTNERSHIPS 11 ADVANCING TECHNOLOGY 17 INCREASING AWARENESS 23 AWARDING EXCELLENCE 29 EXPANSION AND OUTREACH 33 ELEVATING ENGAGEMENT 37 MESSAGE FROM THE TREASURER AND REPORT OF INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS 39 CONSOLIDATED FINANCIAL STATEMENTS Barry L. Shoop 2016 IEEE President and CEO IEEE Xplore® Digital Library to enable personalized importantly, we must be willing to rise again, learn experiences based on second-generation analytics. from our experiences, and advance. As our members drive ever-faster technological revolutions, each of us MESSAGE FROM As IEEE’s membership continues to grow must play a role in guaranteeing that our professional internationally, we have expanded our global presence society remains relevant, that it is as innovative as our THE IEEE PRESIDENT AND and engagement by opening offices in key geographic members are, and that it continues to evolve to meet locations around the world. In 2016, IEEE opened a the challenges of the ever-changing world around us. second office in China, due to growth in the country THE EXECUTIVE DIRECTOR and to better support engineers in Shenzhen, China’s From Big Data and Cloud Computing to Smart Grid, Silicon Valley. We expanded our office in Bangalore, Cybersecurity and our Brain Initiative, IEEE members India, and are preparing for the opening of a new IEEE are working across varied disciplines, pursuing Technology continues to be a transformative power We continue to make great strides in our efforts to office in Vienna, Austria.
    [Show full text]
  • Oral History of Captain Grace Hopper
    Oral History of Captain Grace Hopper Interviewed by: Angeline Pantages Recorded: December, 1980 Naval Data Automation Command, Maryland CHM Reference number: X5142.2009 © 1980 Computer History Museum Table of Contents BACKGROUND HISTORY ...........................................................................................................3 1943-1949: MARK I, II, AND III COMPUTERS AT HARVARD....................................................6 1949-1964: ECKERT AND MAUCHLY, UNIVAC, AND THE ONE-PASS COMPILER ................7 The Need for User-Friendly Languages ..................................................................................10 DEMANDS FOR THE FUTURE..................................................................................................12 Application Processors, Database Machines, Distributed Processing ....................................12 Demand for Programmers and System Analysts ....................................................................14 The Value and Cost of Information..........................................................................................14 The Navy’s Dilemma: Micros and Software Creation..............................................................15 The Murray Siblings: Brilliant Communicators.........................................................................18 Common Sense and Distributed Computing ...........................................................................19 BACK TO 1943-1949: HOWARD AIKEN....................................................................................21
    [Show full text]
  • Research Challenges in Nextgen Service Orchestration
    Research Challenges in Nextgen Service Orchestration Luis M. Vaquero1, Felix Cuadrado2, Yehia Elkhatib3, Jorge Bernal-Bernabe4, Satish N. Srirama5, and Mohamed Faten Zhani6 1Faculty of Engineering, University of Bristol, UK Corresponding author: [email protected] 2EECS, Queen Mary University of London, UK 3MetaLab, SCC, Lancaster University, UK 4DIIC, University of Murcia, Spain 5Institute of Computer Science, University of Tartu, Estonia 6École de Technologie Supérieure, Montréal Abstract Fog/edge computing, function as a service, and programmable infrastructures, like software-defined networking or network function virtualisation, are becoming ubiquitously used in modern Information Technology infrastructures. These technologies change the characteristics and capabilities of the underlying computational substrate where services run (e.g. higher volatility, scarcer computational power, or programmability). As a consequence, the nature of the services that can be run on them changes too (smaller codebases, more fragmented state, etc.). These changes bring new requirements for service orchestrators, which need to evolve so as to support new scenarios where a close interaction between service and infrastructure becomes essential to deliver a seamless user experience. Here, we present the challenges brought forward by this new breed of technologies and where current orchestration techniques stand with regards to the new challenges. We also present a set of promising technologies that can help tame this brave new world. Keywords: NVM; SDN; NFV; orchestration; large scale; serverless; FaaS; churn; edge; fog. 1. Introduction arXiv:1806.00764v2 [cs.DC] 7 Jun 2018 There is a new breed of technologies that are becoming mainstream in current Information Technology (IT) infrastructures. Fog computing aims to partially move services from core cloud data centres into the edge of the network [159].
    [Show full text]
  • The Influence of Mixed Reality on Satisfaction and Brand Loyalty: a Brand Equity Perspective
    Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 31 January 2020 doi:10.20944/preprints202001.0384.v1 Peer-reviewed version available at Sustainability 2020, 12, 2956; doi:10.3390/su12072956 The Influence of Mixed Reality on Satisfaction and Brand Loyalty: A Brand Equity Perspective Sujin Bae, Ph.D. Candidate School of Management, Kyung Hee University Kyung Hee Dae Ro 26, Dong Dae Mun Gu Seoul 02447, Korea Tel: +82 2 961 9491, E-Mail: [email protected] Timothy Hyungsoo Jung, Ph.D. Director of Creative AR & VR Hub Faculty of Business and Law Manchester Metropolitan University, Righton Building, Cavendish Street, Manchester M15 6BG, UK Tel: +44 161-247-2701, Email: [email protected] Natasha Moorhouse, Ph.D. Research Associate Faculty of Business and Law Manchester Metropolitan University All Saints Building, All Saints, Manchester M15 6BH, UK E-Mail: [email protected] Minjeong Suh, Ph.D. Adjunct Professor Graduate school of international tourism, Hanyang University 222, Wangsimni-ro, Seongdong-gu Seoul 04763, Korea Tel: +82 (0)10 5444 4706, E-Mail: [email protected] Ohbyung Kwon,* Ph.D. School of Management, Kyung Hee University Kyung Hee Dae Ro 26, Dong Dae Mun Gu Seoul 02447, Korea Tel: +82 2 961 2148, E-Mail: [email protected] * Corresponding author. © 2020 by the author(s). Distributed under a Creative Commons CC BY license. Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 31 January 2020 doi:10.20944/preprints202001.0384.v1 Peer-reviewed version available at Sustainability 2020, 12, 2956; doi:10.3390/su12072956 The Influence of Mixed Reality on Satisfaction and Brand Loyalty: A Brand Equity Perspective Abstract Mixed reality technology is being increasingly used in cultural heritage attractions to enhance visitors’ experience.
    [Show full text]
  • Diana Marculescu
    DIANA MARCULESCU Carnegie Mellon University Phone: (412) 268-1167 Dept. of ECE, 5000 Forbes Ave E-mail: [email protected] Pittsburgh, PA 15213-3890 URL: http://users.ece.cmu.edu/~dianam David Edward Schramm Professor of Electrical and Computer Engineering Founding Director, Center for Faculty Success, College of Engineering RESEARCH INTERESTS Sustainability- and energy-aware computer system modeling and optimization Energy-aware machine learning; Fast and accurate power modeling, estimation, optimization for multi- core systems; Modeling and optimization for sustainability in computing and renewable energy Reliability- and variability-aware system design Modeling, analysis, and optimization of soft-error rate in large digital circuits; Microarchitecture to system level design variability modeling and mitigation; 3D integration and impact of process variations Discrete modeling and analysis of non-silicon networks Logical models and hardware emulation for efficient nonlinear system analysis; Efficient models for computational biology; Electronic textiles and smart fabrics EDUCATION Ph.D. in Computer Engineering, University of Southern California - August 1998 Dissertation: Information-theoretic and Probabilistic Measures for Power Analysis of Digital Circuits Advisor: Prof. Massoud Pedram M.S. in Computer Science (Eng. Dipl.), Polytechnic Institute of Bucharest, Romania - June 1991 Dissertation: Fault-tolerant Database System Design Advisor: Prof. Irina Athanasiu PROFESSIONAL EXPERIENCE David Edward Schramm Professor, Dept. of ECE, Carnegie Mellon University, Oct. 2016 – Present Founding Director, Center for Faculty Success, College of Engineering, Carnegie Mellon University, Nov. 2014 – present Founded and led the only CMU center focused on faculty development and support. Developed and ran programs for faculty recruiting, mentoring, development, and diversity/inclusion awareness for over 600 faculty, staff, and students at CMU and other institutions.
    [Show full text]
  • Introduction to Minitrack: Mixed, Augmented and Virtual Reality: Co- Designed Services and Applications
    Proceedings of the 52nd Hawaii International Conference on System Sciences | 2019 Introduction to Minitrack: Mixed, Augmented and Virtual Reality: Co- designed Services and Applications Petri Parvinen, Minitrack Chair Juho Hamari Essi Pöyry University of Helsinki University of Tampere University of Helsinki [email protected] [email protected] [email protected] Virtual reality (VR) refers to computer safety, privacy and confidentiality and immersive technologies that use software to generate the experiences [1, 2, 4, 5, 8, 12]. A co-created realistic images, sounds and other sensations that envisioning of an immersive experience also elevates represent an immersive environment and simulate a institutions of agreement, commonly coined as a user’s physical presence in this environment [10]. feeling of win-win. From this point of view, the Mixed reality (MR) refers to combining real and major challenge for both VR and AR technologies is virtual contents with the aid of digital devices [3]. to convince users that the added value is high enough Mixed reality is seen to consist of both augmented to compete with the current systems and offerings in reality (i.e., virtual 3D objects in immersive reality), desktops, notebooks, tablets, smartphones and related and augmented virtuality (i.e., captured features of video and game-like applications. reality in immersive virtual 3D environments) [7]. The minitrack encouraged submissions from both All these technologies have recently peaked in terms cutting edge technology and practical applications. of media attention as they are expected to disturb The minitrack showcases research on: existing markets like PCs and smartphones did when · Realistic virtual humans in immersive they were introduced to the markets.
    [Show full text]
  • Women in Computing
    History of Computing CSE P590A (UW) PP190/290-3 (UCB) CSE 290 291 (D00) Women in Computing Katherine Deibel University of Washington [email protected] 1 An Amazing Photo Philadelphia Inquirer, "Your Neighbors" article, 8/13/1957 2 Diversity Crisis in Computer Science Percentage of CS/IS Bachelor Degrees Awarded to Women National Center for Education Statistics, 2001 3 Goals of this talk ! Highlight the many accomplishments made by women in the computing field ! Learn their stories, both good and bad 4 Augusta Ada King, Countess of Lovelace ! Translated and extended Menabrea’s article on Babbage’s Analytical Engine ! Predicted computers could be used for music and graphics ! Wrote the first algorithm— how to compute Bernoulli numbers ! Developed notions of looping and subroutines 5 Garbage In, Garbage Out The Analytical Engine has no pretensions whatever to originate anything. It can do whatever we know how to order it to perform. It can follow analysis; but it has no power of anticipating any analytical relations or truths. — Ada Lovelace, Note G 6 On her genius and insight If you are as fastidious about the acts of your friendship as you are about those of your pen, I much fear I shall equally lose your friendship and your Notes. I am very reluctant to return your admirable & philosophic 'Note A.' Pray do not alter it… All this was impossible for you to know by intuition and the more I read your notes the more surprised I am at them and regret not having earlier explored so rich a vein of the noblest metal.
    [Show full text]
  • Virtual and Mixed Prototyping Techniques and Technologies for Consumer Product Design Within a Blended Learning Design Environment
    INTERNATIONAL DESIGN CONFERENCE - DESIGN 2018 https://doi.org/10.21278/idc.2018.0428 VIRTUAL AND MIXED PROTOTYPING TECHNIQUES AND TECHNOLOGIES FOR CONSUMER PRODUCT DESIGN WITHIN A BLENDED LEARNING DESIGN ENVIRONMENT M. Bordegoni, F. Ferrise, R. Wendrich and S. Barone Abstract Both physical and virtual prototyping are core elements of the design and engineering process. In this paper, we present an industrial case-study in conjunction with a collaborative agile design engineering process and “methodology.” Four groups of heterogeneous Post-doc and Ph.D. students from various domains were assembled and instructed to fulfill a multi-disciplinary design task based on a real-world industry use-case. We present findings, evaluation, and results of this study. Keywords: virtual prototyping, virtual reality (VR), augmented reality (AR), engineering design, collaborative design 1. Introduction Virtual and mixed prototyping within a collaborative blended learning environment is considered an enabling design support technique that allows designers to gain first-hand appreciation of existing or near-future conditions through active engagement with a wide variety in prototyping techniques and prototypes. The product design process (PDP) follows a dual approach and method based on a combination of a blended learning environment (Boelens et al., 2017) and interactive affective experience prototyping (Buchenau and Suri, 2000). The virtual prototyping summer school (VRPT-SS) facilitates this combinatorial collaborative setting to immerse learners in the externalization and representation of their ideas quickly, exploring and communicating their ideas with others. During the course of the week a series of evaluations on the prototyping progressions are made. The spectrum of virtual and mixed prototyping is quite extensive and has multiple definitions and meanings according to literature (see Wang, 2002, and Zorriassatine et al., 2003).
    [Show full text]