Survey of Agent for Intelligent Information Retrieval

Total Page:16

File Type:pdf, Size:1020Kb

Survey of Agent for Intelligent Information Retrieval Vi DO ( o 600 Z_ mW'}¥$M(Otz!sb<7)3-l — R1H$ : R96002 &TI ?B% 8 f 9 J9 ws®a DISCLAJ laia Portions of this document may be illegible in electronic image products. Images are produced from the best available original document 1W»%9r C-RiE- f?--%ooa. *5 M “ *7 ■“ K : i - y x > f , Jd® 'f '/ ? 7 x - a, AZSn#, 7 h 7- >7 , 't'-’fx > v > A Survey of Agent for Intelligent Information Retrieval by T. Yazawa Abstract Intelligent Software Agent (in short ’Agent ’) is a new software paradigm that can process various services autonomously and cooperatively like a human. The survey of various software systems using agents leads to a conclusion that the autonomy and cooperativity of an agent are realized by the following five essential functions. The functions are: to express responsibility, belief, planning and human knowledge, to communicate with other agents, to plan with other agents cooperatively to solve given problems, to adapt to the current situations of users and other environments, and to behave as a more useful agent system that has been learned by experimenta ­ tion. By its autonomy and cooperativity, agent-based information retrieval system will effectively work on diversified and enormous information sources such as the Internet. STER (Communication and Information Research Laboratory, Rep. No. R96002) (¥-t&8^9 ft 2 0#cf.g) *i kTMmr iv-7* nmmM. OISIRIBltilON OF THIS DOCUMENT 18 tMUMITB) f?l5 -1 - v^6. ##e$Kttt*^^^m#L^^^mem#cem^76 c h # 6V7 h 7^7b M%BeKTv^6.CK(cj: 0,World Wide Web (WWW) Cft# S ft 6 g Af b - ^#f b L A##m CM7 6 i#sm ^ ##76 m#&9r##:^##yxTAem#"e#6"rme^&6o a « X-^x^h X-^x>h(7)##6g^##g^ ^m^#76 b#e. ^m##ie^76cK4)^###%e%m76o x-^x> he#AKge%mLA#m##$xxf AeM#r#6#mb, t,4##teM#LTvX^##m&%3W4::76o ±&'fi£$ 1. x-$>x > V 4r$HK#tt 6 5 0* cK^r^7Lf)Ma#ru^v^ m#$fLT Vy6Cb^^hA6b. x-^x>Hj:. ##e##e$fL:te$&ft4f76ft SAT^O. €'MeSbT#(7)J:-^a:yl'bmmL #ijeft$^mA6Cb^r#6y7h9j:7f^6b#16o CK^. x- ^ y h^##7^<###b LT. #1 e^7 5 ")e#mLAo 2. x-^x > h • '>XtA<OV 7 h 7 x7ii x-^x > h (i.#/?(T)AC:):e^M76 C b ^f±#b76^ >^-7^-x- x-^x> K 3-7/f ^-^.x-^x> l', WJ*#^be#fbLAe$e^^i7%7'X-yx >h#3^e<9#76Cb#^W:L^,, CfUcj:0. x-^x>h-S/XfA #60 3. x-^x> h • >x7-j±<Dm&we & v r##<* nt v amm -2- ##.^s/xfA(z#6^Tv.6^ m#- # 4. ®tff<7)y--m>'>>izmM$tixi'zmm x-^^y h^5#^$"^#yXf (c^ 2:^)^ ^160 www±^m#<^f— ae#W'?):%Tmmr# ^ j:r/i %m"$r IT A 6 a%cd#8d j: &####^^$ fLT v% & ^ u %###&%?) mma?m ^ ^ « 1 x- v x y h mrnuz 5 <»mmt, emmets %# SE wm#©its$?A' t#m#7o 7 mmm# o at, t-fie-rngBcmmu-c# ^a« a0 ai%, #0ft@Ao* ^SSEC-nSC Lfc-y —fx > &# o /c o m# LTmm-^a yycm#LT##"c#ao X it®** m^-cao fx>y>^#tRL, irflCA X m # t>#-c##mia&mm-a## ^fF^T#ao %u, s ^©rosi&A&^B R AA®##^ 6##^#®A fK5&&aa^3E-#-ao m ^ommm^^EmuTgFm #### X o#eftfao ^%^fkT^ao SE: Search Engine, O: BE#SE(:^##ei|&t), A: X: #%##!# L 3- 1 UC A C 5 2 5 2.1 v mEH................................................................................................................ 5 2.2 ................................................................................................ 6 2.3 7 3 8 3.1 8 3.2 s 3.3 b h • '>Xf-A(7)y7 b ^ j-TSjit......................... 9 4 th-10 4.1 j. > y > coSM^<7)#E;............................................................................................... 10 4.2 12 5 £ t£> 13 is Mm - is A JZ-yjz^t'ya-rAO^WJ 18 A.i ig A. 2 20 B. l 24 B.2 'J > . .................................................................................. 25 -4- i ud &ic ^##Ai:^%LTvX^&##7XTAO 7 h 7 j:71:(i$y 2 I-y'i >Vt\t h^-c&&7 2.1 I-y'i>h^i 7 K7j:7k L%\ $fAZAl## X V^ 6 o %*^,\/4i77 h 7 j:7%##%Oim@^^ h (±, #-*&#@T#4'&3:/'r 7^ h Tv^6V^6#^oA.@v^%#^j&0 1. <3^iT0[^^fiTv^[i]o d'OT#A 2. MEil 5 it AMgW£o i#tto h I' vXfAy-A) % #, #r,b <, it LT\ #Ofo%#fiA& t V) t^Cx.6 [2]o 2^j3 ^ 1: Ld#f$ L ^rv^$o 77^7^7 TV* 6 [6]o b t) „ zl— 'J jc. > b i± f ib ‘j-x. LtitzIf (t#&TLA77 b mmm # m#, ^f#y ? > % 7i7) <D—o b LX x.-'Jju> h ZK(ig#%$r#-3Aty^j:7hk<) @x_, tyvjL7l'j#|6]07d'T70%## 7 7 h 7^70%^tA# < &OT& h%x.&ca^T#&o &[3, 4, 5]o %cT, %&0<77-%ybO 3-79^7 b b aotamii, # #%%#%!: Z CU WorldwideWeb(WWW) #I±^^#"70*»0K#L. ##fbLA^7 b 7- 0$lJBfTW^%imLTv^<AT2lb'6o ^7 7±<0lf$?®tit L> ziybsL-t "WiM: y^7 HaW&6g;Rdf&c)A%, -efit: #o#pmT^^v^r< emoA^^r<# St’fi$iM:£%‘L A v b v^ , f^'S A X t A & {K-A6 6c 6tihzMLXJz-y xy h ii, ofcK^Iffl 04^%^ t-7 LTv^6## (#A) 0, ^%Cf6CT g ^o#f^(f-c# 2 & ^-^^7 h yX^AO 2^i>,o*#^^K@y6c -eo±T, ^ — 'sx> h L J-— yx>]'^ ^-fX7- LA####A x 7 A &a*)o ^-7^> h WWWA<7%#oy fi, ##OW$:AO%A(a:#) - 5 - J:- y 7 b ^ (b 7 7 b 7i7- /< ±#6&V', M#7%b^^a, V%TA ?y 'f ^"(0 j: ^ 1:#%T &a^tv^ AK^LT* &&& ^WT?)Z XT, X 9 L^^MAK^-fa#^t LT, iKttZ, [3, 4, 5, 1, 2]0 @#%K, 1. ^vb7-7T^^ft^mmi:77t (fe#e#m77b 7^7^*a%.-v %'C#'5m#gP#^ALoo*^g e, f c-cre#l-& (##f a) xt >1 (D<£ *5 hz^-— v'i> b %M/E~t'aMftcii, ^"C#a77 b 7i7&%mT&a ztii "T-E'-f L $> $j#t*i± & v>0 2. 51^0 77 b 7 i TiMu * "J b 7 - ^fLTV^^-Vi7 b $fLTv^c^$-$^Aaa, %.-vi7i' ^ mm# &v'9 77 h 7^7U^z ^ K^mr&ao ^,yn4z%^#:^^OA#T J.-'7'i7 b fi, Slu^$lt$iL7tft# m<D#x.T#m-e&6 a^m, T^/^77 b 7i7<"^-^<D% li, g ^ %m (Mm) fat*?)## T#(o^-vi7 b tWsmLtftifb, m • ^fo &## (7° 7 "J b 7 — -U) <D ttazht < #$:)#Aa^k^T&a77b7i7 &&*##;%&#C)77 b 7i7$r^mT #&o 2.2 x-Vi >h «4$a#ctzmm 3. 77b7i7<0Mm%^&B%hL #@5"?, b h V^9 77 b 7i7 ^77 b 7jL7<^^uoil:(ty^-;i/ib) c&w-c a^At:^^#@B(Panctlon) h L T\ < »ach^*ao mmmm. mmm, gtaammm, O^O'tya- ft/ i - -/E<7 $ h ^ o/cffc. mmmm, ###m J:-Vi7 b h LT##&-C O5o^^a^ah#x.i>,fiao xe6$r &6o a^, 4. AR-^a4;vbh<Z)<7^7i-%(i, mil t & /b{a& (belief), mS (responsi ­ jbP&f&Lwd\ JL-vj:7 b (i-fi bility), mmi?# ^ e # K m f a ^ $r%#r#apr##^*ao me, mMl:mmLT (^#8<X:%mLT) m - 6 - [&%##] -3 — '/i / b ®SSEb (ACL:Agent Communication Language, $1X. ii Telescript2) ) £ fljffl ~t -B & b*<7) A V A V & &## tic [l+B3£SSIg] I'iL^Wxx.- yxy b — 3~—Vx-'s b £>"f\ % #AV7 b 7^7<07'yt-yfa# M <b C> PeIJ <7) API(Agent-Program In­ terface) B> 'E'^^5> & i§ □" B$OL. i> <h%> » Aflfci^yxy b h(7)f|<D3 i@LT#mL, SA&SrQfcS-x & -J:-y^ybAf7^hLTxA ##Lx #6## fF^^toity-Bx t t, P-x-v y • 3 y bfn. — ^ • 'f yA 7? y 3 2.3 %-yx > s z&mttn5mg#m y (Human-Computer Interaction: m Ed)3E#?)#:#[±MT&&dix ##Tx xL-y^y b 5C<0 Ax * x:-y^y b [AS -%-$m#^T##^-y^yHi: - Ai###;&# (%n#8r<-:%x SB [9,ll]x */&V)(±X.-^j:y ^ ^) d?x #### (#±# b ^#&m< LA%^ vyK#m A3 X- — y X y b ft? fnj a §# (Agent- ####, y^y^y/, oriented Programming Language; cf ( ## (EBL:Explanation-based AOPL)[12, 44] £M-t£&^C9 Learning) A: t') OiS/fj, . ^-y^yhR(om#A^& [m## § [15] #, A%m] m±AJ:9t:x ^-yj:>b%m^A^x - % A L T]g#T - dr T ^ f-^(Fed- Afal-X-yx / b fmj<D 3 < xX^r- y 3 eration Architecture) [13, 10]1), 't y h □ v-(Ofljffl [14] & < 61) 7 <^7 &%V ^A^xL-^ocy 62) URL=http://www. genmagic . com/Telescript/ b v index.html - 7 - 3 X-vx>b • yXxACDH^ . M : CAD helper##^ ?)#a mm 3.1 n — 'J-j-)\, • Zl $ O.->r-^ #f@A<7)tf3 &7X v y-vV xo##id:w< #7 -2) (D'C&a#[7], • -Wfl : Magic Cap (A 7 <D#R(D r [8]o o--X(7)5:j$) cfL^yyvy-^axi, 3.2 firusm# h h, ^4.^-'yji> V, s<— Vt)V • 7 5 a.-tf — [7, 8]o *##:TL, yXf • ##!) : Knowbots(##i##)i#^6 ^(D^K'k^tz DB, 7-1V, -zl- Active Mail(# '> X t ^ X(D7-f 71/^ V <0#f$ h V *"), SIFT(NetNews <D scheduier(^mm&, i-y i>hii'< K fiJM^ry V 7- '> 3 > Irfij/fl'f- h UpCOfUfP 5: ^#"7 6 • m : Wizard(MicroSoffc %#7 7° V±T##7 a if < K), Apple Guide( ^7 — K) m#ikx-v%>h #m#^77v7- .
Recommended publications
  • The Origins of the Underline As Visual Representation of the Hyperlink on the Web: a Case Study in Skeuomorphism
    The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Romano, John J. 2016. The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism. Master's thesis, Harvard Extension School. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33797379 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism John J Romano A Thesis in the Field of Visual Arts for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2016 Abstract This thesis investigates the process by which the underline came to be used as the default signifier of hyperlinks on the World Wide Web. Created in 1990 by Tim Berners- Lee, the web quickly became the most used hypertext system in the world, and most browsers default to indicating hyperlinks with an underline. To answer the question of why the underline was chosen over competing demarcation techniques, the thesis applies the methods of history of technology and sociology of technology. Before the invention of the web, the underline–also known as the vinculum–was used in many contexts in writing systems; collecting entities together to form a whole and ascribing additional meaning to the content.
    [Show full text]
  • Web Browser a C-Class Article from Wikipedia, the Free Encyclopedia
    Web browser A C-class article from Wikipedia, the free encyclopedia A web browser or Internet browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI) and may be a web page, image, video, or other piece of content.[1] Hyperlinks present in resources enable users to easily navigate their browsers to related resources. Although browsers are primarily intended to access the World Wide Web, they can also be used to access information provided by Web servers in private networks or files in file systems. Some browsers can also be used to save information resources to file systems. Contents 1 History 2 Function 3 Features 3.1 User interface 3.2 Privacy and security 3.3 Standards support 4 See also 5 References 6 External links History Main article: History of the web browser The history of the Web browser dates back in to the late 1980s, when a variety of technologies laid the foundation for the first Web browser, WorldWideWeb, by Tim Berners-Lee in 1991. That browser brought together a variety of existing and new software and hardware technologies. Ted Nelson and Douglas Engelbart developed the concept of hypertext long before Berners-Lee and CERN. It became the core of the World Wide Web. Berners-Lee does acknowledge Engelbart's contribution. The introduction of the NCSA Mosaic Web browser in 1993 – one of the first graphical Web browsers – led to an explosion in Web use. Marc Andreessen, the leader of the Mosaic team at NCSA, soon started his own company, named Netscape, and released the Mosaic-influenced Netscape Navigator in 1994, which quickly became the world's most popular browser, accounting for 90% of all Web use at its peak (see usage share of web browsers).
    [Show full text]
  • How to Choose a Search Engine Or Directory
    How to Choose a Search Engine or Directory Fields & File Types If you want to search for... Choose... Audio/Music AllTheWeb | AltaVista | Dogpile | Fazzle | FindSounds.com | Lycos Music Downloads | Lycos Multimedia Search | Singingfish Date last modified AllTheWeb Advanced Search | AltaVista Advanced Web Search | Exalead Advanced Search | Google Advanced Search | HotBot Advanced Search | Teoma Advanced Search | Yahoo Advanced Web Search Domain/Site/URL AllTheWeb Advanced Search | AltaVista Advanced Web Search | AOL Advanced Search | Google Advanced Search | Lycos Advanced Search | MSN Search Search Builder | SearchEdu.com | Teoma Advanced Search | Yahoo Advanced Web Search File Format AllTheWeb Advanced Web Search | AltaVista Advanced Web Search | AOL Advanced Search | Exalead Advanced Search | Yahoo Advanced Web Search Geographic location Exalead Advanced Search | HotBot Advanced Search | Lycos Advanced Search | MSN Search Search Builder | Teoma Advanced Search | Yahoo Advanced Web Search Images AllTheWeb | AltaVista | The Amazing Picture Machine | Ditto | Dogpile | Fazzle | Google Image Search | IceRocket | Ixquick | Mamma | Picsearch Language AllTheWeb Advanced Web Search | AOL Advanced Search | Exalead Advanced Search | Google Language Tools | HotBot Advanced Search | iBoogie Advanced Web Search | Lycos Advanced Search | MSN Search Search Builder | Teoma Advanced Search | Yahoo Advanced Web Search Multimedia & video All TheWeb | AltaVista | Dogpile | Fazzle | IceRocket | Singingfish | Yahoo Video Search Page Title/URL AOL Advanced
    [Show full text]
  • Rights Reserved. Permission to Make Digital Or Hard Copies of All Or Part Of
    Copyright © 1994, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 ELECTRONICS RESEARCH LABORATORY College ofEngineering University ofCalifornia, Berkeley 94720 MICROSOFT WINDOWS NT AND THE COMPETITION FOR DESKTOP COMPUTING by Brad Peters, William R. Bush, and A. Richard Newton Memorandum No. UCB/ERL M94/3 31 January 1994 ELECTRONICS RESEARCH LABORATORY College ofEngineering University ofCalifornia, Berkeley 94720 Microsoft Windows NT And The Competition for Desktop Computing January 1994 Department ofElectrical Engineering and Computer Sciences University ofCalifornia Berkeley, California 94720 Abstract This report contains two papers, An Introduction to Microsoft Windows NT And Its Competitors, and The Status ofWindows NT and Its Competitors At The End of1993. The first paper, written in April 1993,presents an overview of the technology of Windows NT, and analyzes the competitors and competitive factors in the desktop operating system race.
    [Show full text]
  • How Well-Insulated Are Software Developers from Copying of Their Programs' Visual Displays
    Missouri Law Review Volume 61 Issue 1 Winter 1996 Article 14 Winter 1996 Thermal Windows: How Well-Insulated Are Software Developers from Copying of Their Programs' Visual Displays Doug Neville Follow this and additional works at: https://scholarship.law.missouri.edu/mlr Part of the Law Commons Recommended Citation Doug Neville, Thermal Windows: How Well-Insulated Are Software Developers from Copying of Their Programs' Visual Displays, 61 MO. L. REV. (1996) Available at: https://scholarship.law.missouri.edu/mlr/vol61/iss1/14 This Note is brought to you for free and open access by the Law Journals at University of Missouri School of Law Scholarship Repository. It has been accepted for inclusion in Missouri Law Review by an authorized editor of University of Missouri School of Law Scholarship Repository. For more information, please contact [email protected]. Neville: Neville: Thermal Windows: Thermal Windows: How Well-Insulated Are Software Developers from Copying of Their Programs' Visual Displays? Apple Computer, Inc. v. Microsoft Corp.' I. INTRODUCTION Throughout the relatively short history of the computer industry, many disputes have arisen over unauthorized copying of computer programs.2 However, in most of the earlier cases, the disputed copyright protected the actual program code as a literary work rather than the visual display of the program as an artistic work. In Apple Computer, Inc. v. Microsoft Corp., the Ninth Circuit Court of Appeals confronted an alleged copyright violation resulting from copied visual displays Because the disputed copyright protected the displays as artistic works rather than the program code as a literary work, the court was forced to apply established principles in copyright law to an area in which the law is not completely clear.
    [Show full text]
  • The Library for System Solutions End User Interface Reference
    The Library for System Solutions End User Interface Reference Document Number GG24-4107-00 July 1994 International Technical Support Organization Boca Raton Center Take Note! Before using this information and the product it supports, be sure to read the general information under “Special Notices” on page xi. First Edition (July 1994) This edition applies to IBM and non-IBM products for End User Interface development. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address given below. An ITSO Technical Bulletin Evaluation Form for reader′s feedback appears facing Chapter 1. If the form has been removed, comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. 91J Building 235-2 Internal Zip 4423 901 NW 51st Street Boca Raton, Florida 33431-1328 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1994. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Abstract This document is part of the Library for Systems Solutions, which is intended for professionals involved in defining solutions in the heterogeneous computing environments. The library consists of three types of documents: • Computing Technology • Function Reference • Technology Reference This document is the Function Reference book regarding End User Interface. The book consists of two parts.
    [Show full text]
  • Web Browsing and Communication Notes
    digital literacy movement e - learning building modern society ITdesk.info – project of computer e-education with open access human rights to e - inclusion education and information open access Web Browsing and Communication Notes Main title: ITdesk.info – project of computer e-education with open access Subtitle: Web Browsing and Communication, notes Expert reviwer: Supreet Kaur Translator: Gorana Celebic Proofreading: Ana Dzaja Cover: Silvija Bunic Publisher: Open Society for Idea Exchange (ODRAZI), Zagreb ISBN: 978-953-7908-18-8 Place and year of publication: Zagreb, 2011. Copyright: Feel free to copy, print, and further distribute this publication entirely or partly, including to the purpose of organized education, whether in public or private educational organizations, but exclusively for noncommercial purposes (i.e. free of charge to end users using this publication) and with attribution of the source (source: www.ITdesk.info - project of computer e-education with open access). Derivative works without prior approval of the copyright holder (NGO Open Society for Idea Exchange) are not permitted. Permission may be granted through the following email address: [email protected] ITdesk.info – project of computer e-education with open access Preface Today’s society is shaped by sudden growth and development of the information technology (IT) resulting with its great dependency on the knowledge and competence of individuals from the IT area. Although this dependency is growing day by day, the human right to education and information is not extended to the IT area. Problems that are affecting society as a whole are emerging, creating gaps and distancing people from the main reason and motivation for advancement-opportunity.
    [Show full text]
  • Analysis and Suggestions Regarding NSI Domain Name Trademark Dispute Policy
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Fordham University School of Law Fordham Intellectual Property, Media and Entertainment Law Journal Volume 7 Volume VII Number 1 Volume VII Book 1 Article 7 1996 Analysis and Suggestions Regarding NSI Domain Name Trademark Dispute Policy Carl Oppedahl Oppedahl & Larson Follow this and additional works at: https://ir.lawnet.fordham.edu/iplj Part of the Entertainment, Arts, and Sports Law Commons, and the Intellectual Property Law Commons Recommended Citation Carl Oppedahl, Analysis and Suggestions Regarding NSI Domain Name Trademark Dispute Policy, 7 Fordham Intell. Prop. Media & Ent. L.J. 73 (1996). Available at: https://ir.lawnet.fordham.edu/iplj/vol7/iss1/7 This Article is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Intellectual Property, Media and Entertainment Law Journal by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. Analysis and Suggestions Regarding NSI Domain Name Trademark Dispute Policy Carl Oppedahl* In Luna in 2075 phone numbers were punched in, not voice-coded, and numbers were Roman alphabet. Pay for it and have your firm name in ten letters—good advertising. Pay smaller bonus and get a spell sound, easy to remember. Pay minimum and you got arbi- trary string of letters. I asked Mike for such a . number. ‘It’s a shame we can’t list you as ‘Mike.’’ ‘In service,’ he answered.
    [Show full text]
  • Web Browsers
    WEB BROWSERS Page 1 INTRODUCTION • A Web browser acts as an interface between the user and Web server • Software application that resides on a computer and is used to locate and display Web pages. • Web user access information from web servers, through a client program called browser. • A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web Page 2 FEATURES • All major web browsers allow the user to open multiple information resources at the same time, either in different browser windows or in different tabs of the same window • A refresh and stop buttons for refreshing and stopping the loading of current documents • Home button that gets you to your home page • Major browsers also include pop-up blockers to prevent unwanted windows from "popping up" without the user's consent Page 3 COMPONENTS OF WEB BROWSER 1. User Interface • this includes the address bar, back/forward button , bookmarking menu etc 1. Rendering Engine • Rendering, that is display of the requested contents on the browser screen. • By default the rendering engine can display HTML and XML documents and images Page 4 HISTROY • The history of the Web browser dates back in to the late 1980s, when a variety of technologies laid the foundation for the first Web browser, WorldWideWeb, by Tim Berners-Lee in 1991. • Microsoft responded with its browser Internet Explorer in 1995 initiating the industry's first browser war • Opera first appeared in 1996; although it have only 2% browser usage share as of April 2010, it has a substantial share of the fast-growing mobile phone Web browser market, being preinstalled on over 40 million phones.
    [Show full text]
  • Computer Associates V. Altai and Apple V. Microsoft: Two Steps Back from Whelan? Audrey F
    Santa Clara High Technology Law Journal Volume 9 | Issue 1 Article 10 January 1993 Computer Associates v. Altai and Apple v. Microsoft: Two Steps Back from Whelan? Audrey F. Dickey Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Audrey F. Dickey, Computer Associates v. Altai and Apple v. Microsoft: wT o Steps Back from Whelan?, 9 Santa Clara High Tech. L.J. 379 (1993). Available at: http://digitalcommons.law.scu.edu/chtlj/vol9/iss1/10 This Case Note is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. CASE NOTES Computer Associates v. Altai and Apple v. Microsoft: Two Steps Back From Whelan? Computer Associates International,Inc. v. Altai, Inc., 23 U.S.P.Q.2d (BNA) 1241, (2d Cir. 1992). Apple Computer, Inc. v. Microsoft Corp., 799 F.Supp. 1006, (N.D. Cal. 1992). Audrey F. Dickey* In 1986, the Third Circuit, in Whelan Associates v. Jaslow Den- tal Laboratory,1 defined a test f6r copyright infringement of com- puter programs that went beyond simply looking for literal copying of the elements. The court laid the foundation for what has become known as the "look and feel" analysis to determine substantial simi- larity by comparing not only the literal elements, but the sequence, structure and organization of a program.
    [Show full text]
  • Why Websites Can Change Without Warning
    Why Websites Can Change Without Warning WHY WOULD MY WEBSITE LOOK DIFFERENT WITHOUT NOTICE? HISTORY: Your website is a series of files & databases. Websites used to be “static” because ​ there were only a few ways to view them. Now we have a complex system, and telling your webmaster what device, operating system and browser is crucial, here’s why: TERMINOLOGY: You have a desktop or mobile “device”. Desktop computers and mobile ​ ​ ​ devices have “operating systems” which are software. To see your website, you’ll pull up a ​ ​ ​ ​ “browser” which is also software, to surf the Internet. Your website is a series of files that ​ ​ needs to be 100% compatible with all devices, operating systems and browsers. Your website is built on WordPress and gets a weekly check up (sometimes more often) to ​ ​ ​ see if any changes have occured. Your site could also be attacked with bad files, links, spam, comments and other annoying internet pests! Or other components will suddenly need updating which is nothing out of the ordinary. WHAT DOES IT LOOK LIKE IF SOMETHING HAS CHANGED? Any update to the following can make your website look differently: There are 85 operating ​ systems (OS) that can update (without warning). And any of the most popular roughly 7 ​ ​ ​ browsers also update regularly which can affect your site visually and other ways. (Lists below) ​ Now, with an OS or browser update, your site’s 18 website components likely will need ​ ​ updating too. Once website updates are implemented, there are currently about 21 mobile ​ devices, and 141 desktop devices that need to be viewed for compatibility.
    [Show full text]
  • Analysis by Page and Keyword Report Search Positions For
    Analysis by Page and Keyword Report Search Positions for www.one.net Report created Thursday, June 21, 2001 at 12:46 AM Brought to you by US Net - URLocated [Back To Menu] AOL Web Sites May 23rd, 2001: AOL no longer has separate sections for Web Sites and Web Pages. All results appear to be merged together now. Therefore, separate reporting for AOL Web Pages has been removed. Lycos Note: Recently Lycos appears to be returning different search results depending on the hour of the day the search is being done. Therefore, your rankings may fluctuate often. Analysis by Page and Keyword Report Keyword Position Page Last Position Change Search Engine Page:http://www.one.net cincinnati isp 2 1 NA NA AltaVista cincinnati internet solutions provider 53 6 NA NA AltaVista cincinnati dsl 9 1 NA NA AltaVista onenet 1 1 1 0 AltaVista cincinnati #1 isp 2 1 NA NA AltaVista Page:http://www.one.net/home cincinnati isp 3 1 NA NA AltaVista cincinnati #1 isp 3 1 NA NA AltaVista Page:http://www.one.net/services/dedicated dedicated access cincinnati 8 1 NA NA AltaVista Page:http://www.one.net/services/dsl cincinnati dsl 10 1 NA NA AltaVista Page:www.one.net cincinnati isp 6 1 NA NA Fast/All The Web cincinnati internet solutions provider 3 1 NA NA Fast/All The Web cincinnati dsl 6 1 NA NA Fast/All The Web cincinnati dsl 15 2 NA NA Fast/All The Web onenet 3 1 4 +1 Fast/All The Web cincinnati #1 isp 3 1 NA NA Fast/All The Web dedicated access cincinnati 4 1 NA NA Fast/All The Web tri-state internet solutions provider 2 1 NA NA Fast/All The Web cincinnati web site
    [Show full text]