Michael Capewell 613-612-4797 [email protected]
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
MAGIC Summoning: Towards Automatic Suggesting and Testing of Gestures with Low Probability of False Positives During Use
JournalofMachineLearningResearch14(2013)209-242 Submitted 10/11; Revised 6/12; Published 1/13 MAGIC Summoning: Towards Automatic Suggesting and Testing of Gestures With Low Probability of False Positives During Use Daniel Kyu Hwa Kohlsdorf [email protected] Thad E. Starner [email protected] GVU & School of Interactive Computing Georgia Institute of Technology Atlanta, GA 30332 Editors: Isabelle Guyon and Vassilis Athitsos Abstract Gestures for interfaces should be short, pleasing, intuitive, and easily recognized by a computer. However, it is a challenge for interface designers to create gestures easily distinguishable from users’ normal movements. Our tool MAGIC Summoning addresses this problem. Given a specific platform and task, we gather a large database of unlabeled sensor data captured in the environments in which the system will be used (an “Everyday Gesture Library” or EGL). The EGL is quantized and indexed via multi-dimensional Symbolic Aggregate approXimation (SAX) to enable quick searching. MAGIC exploits the SAX representation of the EGL to suggest gestures with a low likelihood of false triggering. Suggested gestures are ordered according to brevity and simplicity, freeing the interface designer to focus on the user experience. Once a gesture is selected, MAGIC can output synthetic examples of the gesture to train a chosen classifier (for example, with a hidden Markov model). If the interface designer suggests his own gesture and provides several examples, MAGIC estimates how accurately that gesture can be recognized and estimates its false positive rate by comparing it against the natural movements in the EGL. We demonstrate MAGIC’s effectiveness in gesture selection and helpfulness in creating accurate gesture recognizers. -
Amigaos 3.2 FAQ 47.1 (09.04.2021) English
$VER: AmigaOS 3.2 FAQ 47.1 (09.04.2021) English Please note: This file contains a list of frequently asked questions along with answers, sorted by topics. Before trying to contact support, please read through this FAQ to determine whether or not it answers your question(s). Whilst this FAQ is focused on AmigaOS 3.2, it contains information regarding previous AmigaOS versions. Index of topics covered in this FAQ: 1. Installation 1.1 * What are the minimum hardware requirements for AmigaOS 3.2? 1.2 * Why won't AmigaOS 3.2 boot with 512 KB of RAM? 1.3 * Ok, I get it; 512 KB is not enough anymore, but can I get my way with less than 2 MB of RAM? 1.4 * How can I verify whether I correctly installed AmigaOS 3.2? 1.5 * Do you have any tips that can help me with 3.2 using my current hardware and software combination? 1.6 * The Help subsystem fails, it seems it is not available anymore. What happened? 1.7 * What are GlowIcons? Should I choose to install them? 1.8 * How can I verify the integrity of my AmigaOS 3.2 CD-ROM? 1.9 * My Greek/Russian/Polish/Turkish fonts are not being properly displayed. How can I fix this? 1.10 * When I boot from my AmigaOS 3.2 CD-ROM, I am being welcomed to the "AmigaOS Preinstallation Environment". What does this mean? 1.11 * What is the optimal ADF images/floppy disk ordering for a full AmigaOS 3.2 installation? 1.12 * LoadModule fails for some unknown reason when trying to update my ROM modules. -
Desktop Automation with Autohotkey
Unplug Your Mouse Workflow Automation with AutoHotKey Andrew Weidner Robert Wilson Mice make simple things easy and complex things impossible. Mice make simple things easy and complex things impossible. Mice are useful and fun, but they tend to slow down repetitive file management tasks. Do things faster with your keyboard. Keyboard Optimization: why type fifty-two keys when you can do the same thing with two? (Ctrl + 4) Overview • Keyboard Shortcuts • AutoHotkey Scripts • Tools & References • Demonstration Keyboard Shortcuts Windows Explorer Tab = cycle fields (add Shift to reverse) Alt + Tab = application switcher Enter = open selected file/folder Backspace = return to parent folder Alt + F + M = rename selected file/folder (also F2) Alt + F + W + F = create a new folder Home/End = go to first/last file Keyboard Shortcuts ACDSee Viewer Page Down = next image Page Up = previous image (NumPad) * = fit image to window (NumPad) + = zoom in (NumPad) - = zoom out Arrow Keys = move around the image Home/End = go to first/last image Keyboard Shortcuts Mozilla Firefox Ctrl + T = open new tab Ctrl + Tab = cycle tabs (add Shift to reverse) Alt + Left = go to previous page (also Backspace) Ctrl + L = focus on address bar Tab = cycle links (add Shift to reverse) Arrow Keys = scroll through the page Ctrl + B = show/hide bookmarks sidebar AutoHotkey Scripts Simple: another Enter key ; plain text file with .AHK extension ; comments begin with a semicolon ; define the hotkey: Alt + a !a:: ; define the action Send, {Enter} AutoHotkey Scripts Simple: type -
Summary Double Your Typing Speed
Summary Double Your Typing Speed.............................................................1 Stenography Benefits......................................................................1 Speed...........................................................................................................................................1 Fluency Of Thought....................................................................................................................2 Ergonomy....................................................................................................................................3 Mobile/Wearable Computing and Augmented Reality...............................................................3 Memorable Customizable Macros..............................................................................................4 Stenography Is Cool, But................................................................5 Open Source Stenography: Who Is Using It...................................5 Then I Saw The Light.....................................................................6 My Contributions............................................................................7 Stenography Is The Way.................................................................8 Machine stenography costs too much.........................................................................................8 Proprietary steno software might be better..................................................................................9 Learning takes too much -
Understanding and Mitigating the Security Risks of Apple Zeroconf
2016 IEEE Symposium on Security and Privacy Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf Xiaolong Bai*,1, Luyi Xing*,2, Nan Zhang2, XiaoFeng Wang2, Xiaojing Liao3, Tongxin Li4, Shi-Min Hu1 1TNList, Tsinghua University, Beijing, 2Indiana University Bloomington, 3Georgia Institute of Technology, 4Peking University [email protected], {luyixing, nz3, xw7}@indiana.edu, [email protected], [email protected], [email protected] Abstract—With the popularity of today’s usability-oriented tend to build their systems in a “plug-and-play” fashion, designs, dubbed Zero Configuration or ZeroConf, unclear are using techniques dubbed zero-configuration (ZeroConf ). For the security implications of these automatic service discovery, example, the AirDrop service on iPhone, once activated, “plug-and-play” techniques. In this paper, we report the first systematic study on this issue, focusing on the security features automatically detects another Apple device nearby running of the systems related to Apple, the major proponent of the service to transfer documents. Such ZeroConf services ZeroConf techniques. Our research brings to light a disturb- are characterized by automatic IP selection, host name ing lack of security consideration in these systems’ designs: resolving and target service discovery. Prominent examples major ZeroConf frameworks on the Apple platforms, includ- include Apple’s Bonjour [3], and the Link-Local Multicast ing the Core Bluetooth Framework, Multipeer Connectivity and -
New Elevation Powertoys for Windows Vista
Security At a glance: Run as Administrator for third-party scripting tools Run as Another User Prompt Here as System for CMD and Windows PowerShell Drag-and-drop Elevation Gadget New Elevation PowerToys for Windows Vista Michael Murgolo of my favourite third-party scripting tools, Welcome to another demonstrate how you can replace a nice edition of the Elevation Windows XP feature that was removed from Windows Vista, and look at some of the han- PowerToys for dy tools that are included in Elevation Pow- erToys. Windows Vista. I took Run as Administrator for additional a close look at this in scripting tools One topic I discussed in the previous article the June 2007 issue (available at http://technet.microsoft.com/ magazine/cc162321.aspx) was enabling the of TechNet Magazine. Run as Administrator option for the native Windows scripting tools. For this article, I’ve Here we are a year created Run as Administrator PowerToys for some third-party scripting tools: later. This time around, • AutoIt v3 (www.hiddensoft.com) • AutoHotkey (www.autohotkey.com) I want to show you • ActivePerl (www.activestate.com) how I expanded the • KiXtart 2010 (www.kixtart.org) The code for each of these is included in Run as Administrator the download for this article, which you can find at http://technetmagazine.com. The ac- functionality to some tual files are named ElevateAutoIt3.inf, El- 58 To get your FREE copy of TechNet Magazine subscribe at: www.microsoft.com/uk/technetmagazine 58_62_Elevatio_des7.indd 58 13/8/08 16:05:49 evateAutoHotKey.inf, ElevatePerlScript.inf, domain he is on. -
Cooper ( Interaction Design
Cooper ( Interaction Design Inspiration The Myth of Metaphor Cooper books by Alan Cooper, Chairman & Founder Articles June 1995 Newsletter Originally Published in Visual Basic Programmer's Journal Concept projects Book reviews Software designers often speak of "finding the right metaphor" upon which to base their interface design. They imagine that rendering their user interface in images of familiar objects from the real world will provide a pipeline to automatic learning by their users. So they render their user interface as an office filled with desks, file cabinets, telephones and address books, or as a pad of paper or a street of buildings in the hope of creating a program with breakthrough ease-of- learning. And if you search for that magic metaphor, you will be in august company. Some of the best and brightest designers in the interface world put metaphor selection as one of their first and most important tasks. But by searching for that magic metaphor you will be making one of the biggest mistakes in user interface design. Searching for that guiding metaphor is like searching for the correct steam engine to power your airplane, or searching for a good dinosaur on which to ride to work. I think basing a user interface design on a metaphor is not only unhelpful but can often be quite harmful. The idea that good user interface design is based on metaphors is one of the most insidious of the many myths that permeate the software community. Metaphors offer a tiny boost in learnability to first time users at http://www.cooper.com/articles/art_myth_of_metaphor.htm (1 of 8) [1/16/2002 2:21:34 PM] Cooper ( Interaction Design tremendous cost. -
UC Santa Cruz UC Santa Cruz Electronic Theses and Dissertations
UC Santa Cruz UC Santa Cruz Electronic Theses and Dissertations Title Efficient Bug Prediction and Fix Suggestions Permalink https://escholarship.org/uc/item/47x1t79s Author Shivaji, Shivkumar Publication Date 2013 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA SANTA CRUZ EFFICIENT BUG PREDICTION AND FIX SUGGESTIONS A dissertation submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in COMPUTER SCIENCE by Shivkumar Shivaji March 2013 The Dissertation of Shivkumar Shivaji is approved: Professor Jim Whitehead, Chair Professor Jose Renau Professor Cormac Flanagan Tyrus Miller Vice Provost and Dean of Graduate Studies Copyright c by Shivkumar Shivaji 2013 Table of Contents List of Figures vi List of Tables vii Abstract viii Acknowledgments x Dedication xi 1 Introduction 1 1.1 Motivation . .1 1.2 Bug Prediction Workflow . .9 1.3 Bug Prognosticator . 10 1.4 Fix Suggester . 11 1.5 Human Feedback . 11 1.6 Contributions and Research Questions . 12 2 Related Work 15 2.1 Defect Prediction . 15 2.1.1 Totally Ordered Program Units . 16 2.1.2 Partially Ordered Program Units . 18 2.1.3 Prediction on a Given Software Unit . 19 2.2 Predictions of Bug Introducing Activities . 20 2.3 Predictions of Bug Characteristics . 21 2.4 Feature Selection . 24 2.5 Fix Suggestion . 25 2.5.1 Static Analysis Techniques . 25 2.5.2 Fix Content Prediction without Static Analysis . 26 2.6 Human Feedback . 28 iii 3 Change Classification 30 3.1 Workflow . 30 3.2 Finding Buggy and Clean Changes . -
11279 Keyboard Comparison
11279 Keyboard Comparison After spending several weeks typing using the right-handed Dvorak keyboard layout, the coach (in- troduced in the previous problem) started to wonder if it really is any better. He decided to devise a method to verify this. The coach would like to compare typing on the right-handed Dvorak keyboard against using a QWERTY keyboard with two hands and with one hand. A crude, but effective way to compare keyboard layouts is to measure the total distance the typing fingers must travel in order to type a certain passage of text. Can you write a program to help the coach perform this experiment? The distance travelled by a finger will be measured from the centre of its home key to the centreof the target key and back. In order to simplify the computations, we pretend that every key is a perfect square with unit length sides, and that all keys are laid out on a perfect grid (even though in reality they are usually staggered). The diagrams below show the straightened keyboards; see the previous problem for shift-modified diagrams. The QWERTY and right!handed Dvorak keyboard layouts arranged on perfect grids. On the QWERTY keyboard, the home keys are “ASDFJKL;” for two hands and “FGHJ” for one hand. On the Dvorak keyboard, the home keys are “EHTD”. A key is always struck by the finger from the nearest home key. For example, the distances for ‘S’ would be 0, 4, and 2 for the two-hand QWERTY, one-hand QWERTY, and Dvorak keyboards, respectively. Likewise, the distances for ‘C’ would be 2, 2.828427…, and 2, respectively. -
Automatic Program Repair Using Genetic Programming
Automatic Program Repair Using Genetic Programming A Dissertation Presented to the Faculty of the School of Engineering and Applied Science University of Virginia In Partial Fulfillment of the requirements for the Degree Doctor of Philosophy (Computer Science) by Claire Le Goues May 2013 c 2013 Claire Le Goues Abstract Software quality is an urgent problem. There are so many bugs in industrial program source code that mature software projects are known to ship with both known and unknown bugs [1], and the number of outstanding defects typically exceeds the resources available to address them [2]. This has become a pressing economic problem whose costs in the United States can be measured in the billions of dollars annually [3]. A dominant reason that software defects are so expensive is that fixing them remains a manual process. The process of identifying, triaging, reproducing, and localizing a particular bug, coupled with the task of understanding the underlying error, identifying a set of code changes that address it correctly, and then verifying those changes, costs both time [4] and money. Moreover, the cost of repairing a defect can increase by orders of magnitude as development progresses [5]. As a result, many defects, including critical security defects [6], remain unaddressed for long periods of time [7]. Moreover, humans are error-prone, and many human fixes are imperfect, in that they are either incorrect or lead to crashes, hangs, corruption, or security problems [8]. As a result, defect repair has become a major component of software maintenance, which in turn consumes up to 90% of the total lifecycle cost of a given piece of software [9]. -
Alphasmart Manager 2
AlphaSmart Manager 2 User’s Guide AlphaSmart Sales and Technical Support For AlphaSmart sales and technical support contact information, see page 81 or visit the AlphaSmart web site at www.alphasmart.com (United States) www.alphasmart.co.uk (United Kingdom) www.alphasmart.com/international (all other countries) Nothing in this manual may be reproduced in any manner, either wholly or in part, for any purpose whatsoever without written permission from AlphaSmart, Inc. © 2004, AlphaSmart, Inc. All rights reserved. AlphaSmart and SmartApplet are registered trademarks, and AlphaWord is a trademark of AlphaSmart, Inc. Macintosh is a registered trademark of Apple Computer, Inc. Windows is a registered trademark of Microsoft Corporation. Contents Chapter 1 Introduction ....................................................................................1 System requirements........................................................................... 2 AlphaHub considerations ............................................................ 2 Upgrading from AlphaSmart Manager 1.0 ......................................... 3 Installing AlphaSmart Manager.......................................................... 4 Chapter 2 Basics .............................................................................................7 Using AlphaSmart Manager in group settings .................................. 7 Starting AlphaSmart Manager ............................................................ 9 Moving around in AlphaSmart Manager......................................... -
The Dvorak Keyboard Layout and Possibilities of Its Regional Adaptation
373 The Dvorak Keyboard Layout and Possibilities of its Regional Adaptation Tomislav NakiC-AlfireviC, Marijan Durek Faculty of Electrical Engineering and Computing, University of Zagreb tomisluv.nakic-alfirevic@,kr. hr: marl:ian.diurek@,fer. hr Abstract. During the last several decades, the 2. The Dvorak layout keyboard has proved to be the most important The Dvorak layout was constructed to computer input device. It was inherited @om the [1][2][3][4] be the optimal layout where "optimal" simply means mechanical typewriter from whom computer "fastest". There are a number of factors that have keyboards inherited a suboptimal key layout. Better some impact on typing speed and comfort: letter solutions have been kept out use by economic of frequencies, key reachability, human hand anatomy, pressure. An arguably optimal layout for the certain regularities found in any text in any English language is the Dvorak layout. This article language, and one or two others. discusses the possibility of applying the same guidelines and ideas that shaped the Dvorak layout on keyboards used in other languages. Some of the questions answered are how good the Dvorak layout is in EngIish. how good is it in other languages and how a language specific version would look like. Keywords. Dvorak, layout, keyboard, left handed, right handed, frequency, regional, national, language Obviously, not all letters occur with the same frequency: vowels are a good example of very 1. Introduction frequent letters. Knowing that it takes a certain amount of time to reach any key on the keyboard A machine with a complicated system of levers and and knowing that some keys can be reached faster weights called the typewriter was invented around than others an optimization problem arises: how 1870.