A Bibliography of Publications in Communications of the ACM : 1990–1999

Total Page:16

File Type:pdf, Size:1020Kb

A Bibliography of Publications in Communications of the ACM : 1990–1999 A Bibliography of Publications in Communications of the ACM : 1990{1999 Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 20 March 2020 Version 2.87 Title word cross-reference 4 [439]. 400 [918]. 47s [1833]. 5 [582]. 50th [980]. '89 [26]. $150 [1852]. 3 [1862]. N [24]. O2 [226]. p × 64 [164]. '90s [1203]. '92 [39]. '95 [779]. '96 [965]. 9X [398, 399, 397]. -Fold [24]. = [1396, 186]. 1 [1302]. 12 [488]. 1989 [276]. 1989-1990 [275]. 1990s [444, 135, 214]. Abandoned [1385]. Above [834]. Abstract [1179]. abstracting [1442]. abstractions 2 [1187]. 20/20 [1581]. 2000 [1865]. abuses [1866]. academe [1488, 1476, 1309]. 20th [71]. 21st [1313, 1808]. Academic [241, 1661, 1239, 1421, 468, 1116]. 22nd [646, 262, 1459, 1846, 1549, 60]. [401]. Academic-Industry [262]. Acadia [1458]. acceleration [317]. acceptance [1490]. 3.0 [1650]. 3D [1689, 331, 458]. 1 2 Access Aggravation [348]. Aglets [1751]. agora [736, 1070, 1454, 1326, 234, 1459, 11, 1520, [1463]. agreed [1377]. agreed-upon [1377]. 1721, 1513, 1591, 1518, 205, 475, 826, 1146]. ahead [982, 1207, 1662]. AI Accessing [1512]. Accidental [222, 375]. [937, 593, 941, 625, 932, 49, 1344]. AI-based Accountability [958, 606]. accounting [49]. Aid [243]. Aids [992]. aim [88]. Air [1482]. Accreditation [259]. Accredited [622]. AK [1833]. AK-47s [1833]. Alan [55]. [1055, 259, 418, 673, 790]. ACE [457]. Alexandria [823]. Algol [519]. Algorithm achieve [1376]. achieved [1082]. [311, 1180, 146, 1182, 85, 1, 2, 357, 289, 1761]. achievements [231]. achieving [1620]. algorithm-based [1761]. Algorithms ACM [401, 71, 979, 323, 442, 962, 961, 983, [1187, 1012, 1949, 117, 76, 1129, 1306, 636]. 1056, 1094, 1088, 1207, 1294, 1366, 1418, All-optical [1821]. Allen [1412, 405]. 1413, 1205, 1296, 1292, 1369, 1412, 1373, alliance [663]. allocation [856]. Allowing 1209, 1295, 1367, 25, 1449, 1489, 1869, 322, [1377, 382]. along [650]. Alpha 831, 1328, 321, 404, 1299, 388, 278, 490, 1211, [435, 434, 433, 436]. Alphabets [45]. 241, 488, 1136, 232, 189, 1768, 34, 1826, 779]. Already [1282]. Alt [979]. Altair [554]. ACM/IEEE [189]. ACM/IEEE-CS [189]. Alternative [659, 62]. Alternatives [1001]. ACM's [980]. Acquisition alters [1377]. always [1581, 851]. Amazing [1078, 1437, 125, 574]. Across [951, 1456]. [1270]. Amazon [300]. Amdahl [1184]. Act [1832, 1255, 1093, 1696]. Action Amendment [183]. America [1654]. [1710, 1892, 604]. Active [1705]. Activities American [71, 241, 474]. Amoeba [127]. [234]. Activity [884, 288]. ADA Among [1891]. Amplifiers [431]. [321, 398, 392, 394, 395, 399, 396, 393, 397]. Amsterdam [616]. Analog [1779, 1907]. AdAM [1778]. Adaptability [1141]. analogy [305]. Analysis Adapting [1687]. Adaptive [190, 413, 361, 111, 24, 1054, 362, 1701, 848, [657, 1199, 1397, 1543]. added [984, 1697]. 1185, 1780, 333, 369, 286, 607, 383, 749, 886, Addendum [1870]. addictive [1505]. 642, 510, 839, 1264, 364, 384, 1448, 357, 596, Adding [1568, 616, 532]. Additional [289]. 363, 549, 1527, 643, 1761]. Analyst [1010]. address [1605]. addressing [698, 1782]. Anchoring [1162]. Andrew [1188, 1189]. adds [1587, 1418]. Adequacy [262]. Animal [565]. Animation adopting [1139]. adoption [253, 304, 1711]. [1858, 1046, 1101, 458]. anniversary [980]. Advanced [440, 1501, 461]. Advancement annotations [560]. Announcing [763]. [1023, 772]. Advances [643]. Advantage Annual [274, 80, 71, 52, 401]. Anonymity [949, 1920]. Adventure [238]. [1177]. Anonymous [1719, 1721]. Answer advertisements [1861]. advertising [1500]. [1112]. Answers [1183, 912, 467]. Anti advice [497]. Africa [612, 951, 432]. After [1103]. Anti-Mac [1103]. anticipate [1191, 1394]. Aftermath [1343]. again [1656, 1377]. anticircumvention [1871]. [1534, 1566]. Against [804, 1375, 264, 1414]. antiquities [1513]. Antivirus [1195]. Age [1059, 1285, 1811, 279, 1606, 636]. Anytime [1341]. anyway [1508]. Agency [898]. Agenda [27, 263, 72]. Agent Anywhere [1341]. Apache [1772]. [685, 842, 1753]. agent-based [1753]. Apartness [612]. Application Agents [498, 54, 1426, 880, 1897, 1395]. [1744, 688, 1736, 1741, 1745, 678, 945, 1746, Applications 412, 689, 1737, 679, 680, 686, 690, 691, 1748, [1160, 939, 937, 940, 943, 795, 938, 270, 1301, 677, 1503, 682, 676, 687, 1743, 681, 1749]. 926, 634, 1383, 627, 1595, 875, 890, 1567, 1402, 3 134, 628, 1777, 630, 163, 1708, 1619, 1841]. [653, 713, 1747]. Automatic applicative [379]. Applied [110]. [726, 1554, 620, 332, 383]. Automatically Applying [32]. Automating [301, 410]. Automation [798, 1349, 1262, 957, 364, 1139, 613]. [1303]. Autonomous [945, 1556, 1822]. appraising [1839]. appreciation [819]. Availability [1031]. available [1082]. Apprenticing [838]. Approach Average [155]. Aviation [610]. avoid [1031, 380, 73, 381, 880, 592, 286, 1801, 509, [1502]. avoidance [860]. Avoiding [419]. 1316, 252, 564, 508, 1922, 652, 656, 49, 668]. AWAC S [1896]. Award Approaches [1292, 1052, 724, 426, 1053, 741, 1412]. [959, 349, 1254, 704, 1553, 1529]. approved Awards [1292]. Aware [524]. Awareness [1902]. Approximate [1183]. apps [1912]. [1358]. awesome [463]. AXP [435, 434]. Arcade [1345]. Architecting [409]. Architecture B [178]. Babbage [1607, 290]. Back [424, 814, 1665, 434, 1201, 1629, 415, 1138, [520, 1435]. backbone [1818, 699]. 1881, 664, 617, 203, 687, 1843]. Backpropagation [1182]. backtracks architectures [1759]. Backup [1007]. backward [1545]. [1897, 1689, 1922, 1651, 1754, 783]. Archives Bad [1266, 1732]. Badge [1095]. Balance [963]. Area [812, 249]. Argument [1764]. [1764, 1297]. Balanced [62]. Bandwagon arm [1679]. Armchair [1764]. Arms [804]. [1001]. bandwidth [1785, 75]. Bank [1654]. array [357]. Arrays [1179, 1776, 871]. Art Barney [708]. Base [335]. Base/Database [193, 1132, 1407, 1548, 28]. Arthur [122]. [335]. Based articulator [318]. articulator-based [318]. [1260, 599, 626, 1363, 996, 846, 1019, 627, Artificial [404, 945, 1196, 1855, 349]. Arts 1552, 286, 1183, 176, 269, 683, 526, 1617, 1914, [1175]. Asia [984]. Asian [756, 492]. Ask 1753, 1653, 815, 1782, 19, 370, 22, 1894, 657, [1293]. Asleep [1227]. Aspects [1141, 1475]. 586, 7, 847, 240, 1499, 318, 656, 49, 619, 200, assess [391]. Assessing [1537, 1482]. 1754, 1631, 1761, 1519, 1749, 1594, 617, 615]. Assessment basic [633]. battle [1744, 1611, 1698]. [1432, 484, 865, 33, 302, 1686, 53, 843, 21, 121]. Bayesian [798, 796, 795]. Be assignment [655, 1678]. assignments [1873, 1115, 1368, 1082, 76, 1624]. beam [1716]. assistant [684]. Assistive [315]. [1862]. Bearing [757]. beasts [1315]. beat Assumptions [829]. Assurance [1198]. [1839]. Become [1233, 170]. Becomes Asymmetries [1164]. Asynchronous [1052]. Becoming [116]. Been [1035, 1378]. Atlantic [1061]. ATLAS [223, 137, 1804]. beer [867]. Before [1931]. ATM [351, 554]. begin [1209]. begins [984]. [789, 787, 784, 788, 786, 785, 783, 782]. Behavior [1388, 527, 1934, 363]. Behind attained [1545]. Attention [1351]. [1132]. believable [689]. Bell [1061]. attitudes [946]. attributes [596]. Auction belong [583]. Beltway [1249]. [856]. auctions [1594]. Audio Benchmarking [1572]. benefits [421, 915, 332, 1544]. augmentative [316]. [1546, 501, 1653, 92, 1875]. Berkeley [822]. Augmented [1350, 520, 525, 526]. Best [1224, 1002, 1546, 1436, 158, 1884]. Augmenting [876, 532]. Australian [946]. Better [1225, 1662, 1546, 282]. Between authentication [19]. author [962]. [1150, 1220, 1222, 1099, 1551, 514]. Beware authoring [893]. Authors [757]. Beyond [1228, 1612, 1307, 1291]. bias [1203, 1013, 1036, 1564]. Automated [853]. bibliographic [1517]. Big 4 [1312, 1074]. Bilingual [47, 1771]. Bill [445]. Capital [1336]. CAPS [243]. Care binaries [1446]. Binary [438, 2]. Binding [1361, 1633, 1359, 1346]. career [802]. [1652]. Biological [237, 517]. Biologically Careers [646]. carrying [1082]. [1254]. Biology [237]. biometrics [1866]. Cartwheeling [1105]. Carver [1412]. Case Biosphere [219]. Birth [1245]. Bit [627, 1552, 985, 1386, 1724, 1936, 1466, 128, [336, 1756]. Bit-rot [1756]. Bit-Tree [336]. 1147, 1618, 1846, 178, 298, 1504, 1654, 304, BITNET [128]. BITS [738]. Blacksburg 1618, 301, 306, 308, 773]. Case-based [1173]. Blinn [1946]. Bloom [1208]. blue [627, 1552]. cash [1064]. causes [1899]. [1919, 1086, 1343, 1344]. Board [18]. Body Cautionary [1298]. CAVE [332]. CD [1213, 1356]. Body-Image [1356]. Books [816, 1089, 166]. CD-I [166]. CD-ROM [1274, 983, 1295, 1520]. Bookshelf [1038]. [816, 1089]. CDA [1325, 1375]. ceiling [767]. Boosting [876]. Bootstraps [1074]. Both Celebration [1368, 766, 948]. Cells [1181]. [1325, 1884]. bottlenecks [1124]. Bottom Celtic [1245]. Censorship [1068, 1146]. [691, 1620]. bottom-line [1620]. center [1522, 810]. Centered Bottom-up [691]. Boundaries [913]. [1333, 817, 1028, 1330, 576, 1618, 1018]. Bounding [6]. Bowl [80]. Brain centers [60]. centralization [195]. centric [1282, 1343]. Brazilian [300]. Breach [387]. [1815, 1843]. Century breakdown [1771]. Breaks [1284]. bridge [1239, 468, 1661, 1421, 1116]. CEO [1863]. [1563]. bridging [82]. Brief [494, 493]. CEOs [182]. ceremony [1292]. CERT Bringing [421, 1071]. British [861, 826]. [705]. Certification [1831]. Certifying broadband [422]. Broadening [430]. [147]. Challenges Brock [1375]. Brokerages [1065]. brokers [996, 1043, 505, 608, 722, 784, 640, 782]. [1651]. Brother [1074]. browser [1516]. challenging [1835]. Champagne [867]. Budget [66, 867, 304]. Bug [1279]. build Champion [235]. championship [1708]. Building [1818, 465,
Recommended publications
  • HCI, Music and Art: an Interview with Wendy Mackay Marcelo Wanderley, Wendy Mackay
    HCI, Music and Art: An Interview with Wendy Mackay Marcelo Wanderley, Wendy Mackay To cite this version: Marcelo Wanderley, Wendy Mackay. HCI, Music and Art: An Interview with Wendy Mackay. Simon Holland; Tom Mudd; Katie Wilkie-McKenna; Andrew McPherson; Marcelo M. Wanderley. New Directions in Music and Human-Computer Interaction, Springer, pp.1-22, 2019, Springer Series on Cultural Computing, 978-3-319-92068-9. 10.1007/978-3-319-92069-6_7. hal-02426818 HAL Id: hal-02426818 https://hal.inria.fr/hal-02426818 Submitted on 7 Jan 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Chapter 7 HCI, Music and Art: An Interview with Wendy Mackay Marcelo M. Wanderley and Wendy E. Mackay Abstract Wendy E. Mackay is a Research Director at Inria Saclay—Île-de-France where she founded and directs the ExSitu research group in Human-Computer Interaction. She is a former chair of CHI. Her research interests include multi- disciplinary, participatory design methods, tangible computing, interactive paper, and situated interaction. In this interview, Mackay discusses working with artists, designers and scientists to build tools for highly creative people to support exploration, execution and sparking ideas without the tools getting in their way.
    [Show full text]
  • Digital Humans on the Big Screen
    news Technology | DOI:10.1145/3403972 Don Monroe Digital Humans on the Big Screen Motion pictures are using new techniques in computer-generated imagery to create feature-length performances by convincingly “de-aged” actors. RTIFICIAL IMAGES HAVE been around almost as long as movies. As com- puting power has grown and digital photography Ahas become commonplace, special ef- fects have increasingly been created digitally, and have become much more realistic as a result. ACM’s Turing Award for 2019 to Patrick M. Hanrahan and Edwin E. Cat- mull reflected in part their contribu- tions to computer-generated imagery (CGI), notably at the pioneering anima- tion company Pixar. CGI is best known in science fic- tion or other fantastic settings, where audiences presumably already have suspended their disbelief. Similarly, exotic creatures can be compelling In Ang Lee’s 2019 action movie Gemini Man, Will Smith (right) is confronted by a younger when they display even primitive hu- clone of himself (left). This filmmakers went through a complicated process to “de-age” man facial expressions. Increasingly, Smith for the younger role. however, CGI is used to save money on time, extras, or sets in even mun- actors. Artificial intelligence also in- “In many ways it felt less about a visual dane scenes for dramatic movies. creasingly will augment the labor-inten- effect and more like we were creating a re- To represent principal characters, sive effects-generation process, allowing ality and aiming to work out exactly how however, filmmakers must contend filmmakers to tell new types of stories. the human face works, operates, but also with our fine-tuned sensitivity to facial how it ages over time,” added Stuart Ad- expressions.
    [Show full text]
  • System Safety Engineering: Back to the Future
    System Safety Engineering: Back To The Future Nancy G. Leveson Aeronautics and Astronautics Massachusetts Institute of Technology c Copyright by the author June 2002. All rights reserved. Copying without fee is permitted provided that the copies are not made or distributed for direct commercial advantage and provided that credit to the source is given. Abstracting with credit is permitted. i We pretend that technology, our technology, is something of a life force, a will, and a thrust of its own, on which we can blame all, with which we can explain all, and in the end by means of which we can excuse ourselves. — T. Cuyler Young ManinNature DEDICATION: To all the great engineers who taught me system safety engineering, particularly Grady Lee who believed in me, and to C.O. Miller who started us all down this path. Also to Jens Rasmussen, whose pioneering work in Europe on applying systems thinking to engineering for safety, in parallel with the system safety movement in the United States, started a revolution. ACKNOWLEDGEMENT: The research that resulted in this book was partially supported by research grants from the NSF ITR program, the NASA Ames Design For Safety (Engineering for Complex Systems) program, the NASA Human-Centered Computing, and the NASA Langley System Archi- tecture Program (Dave Eckhart). program. Preface I began my adventure in system safety after completing graduate studies in computer science and joining the faculty of a computer science department. In the first week at my new job, I received a call from Marion Moon, a system safety engineer at what was then Ground Systems Division of Hughes Aircraft Company.
    [Show full text]
  • Project-Team IN-SITU
    IN PARTNERSHIP WITH: CNRS Université Paris-Sud (Paris 11) Activity Report 2012 Project-Team IN-SITU Situated interaction IN COLLABORATION WITH: Laboratoire de recherche en informatique (LRI) RESEARCH CENTER Saclay - Île-de-France THEME Interaction and Visualization Table of contents 1. Members :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 2. Overall Objectives :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 2.1. Objectives 1 2.2. Research Themes2 2.3. Highlights of the Year3 3. Scientific Foundations :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::3 4. Application Domains ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::4 5. Software ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 4 5.1. jBricks 4 5.2. The Zoomable Visual Transformation Machine4 5.3. The SwingStates Toolkit6 5.4. The FlowStates Toolkit7 5.5. TouchStone 8 5.6. Metisse 9 5.7. Wmtrace 10 5.8. The Substance Middleware 10 5.9. Scotty 11 6. New Results ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 12 6.1. Interaction Techniques 12 6.2. Research Methods 18 6.3. Engineering of interactive systems 19 7. Partnerships and Cooperations ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 19 7.1. Regional Initiatives 19 7.2. National Initiatives 20 7.3. European Initiatives 20 7.4. International Initiatives 21 7.4.1. Inria Associate Teams 21 7.4.2. Participation In International Programs 21 7.5. International Research Visitors 21 7.5.1. Internships 21 7.5.2. Visits to International Teams 22 8. Dissemination ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 22 8.1. Scientific Animation 22 8.1.1. Keynote addresses and Invited Lectures 22 8.1.2. Journal editorial board 23 8.1.3. Journal reviewing 23 8.1.4. Conference organization 23 8.1.5. Conference reviewing 24 8.1.6. Scientific associations 24 8.1.7. Evaluation committees and invited expertise 25 8.1.8. Awards 25 8.2. Teaching - Supervision - Juries 25 8.2.1.
    [Show full text]
  • Prototyping Tools and Techniques
    52 PROTOTYPING TOOLS AND TECHNIQUES Michel Beaudouin-Lafon Universite Paris—Sud Wendy Mackay Institut National de Recherche en Informatique et en Automatique (INRIA) Introduction 1007 What Is a Prototype? 1007 Prototypes As Design Artifacts 1007 Representation 1007 Michel Beaudouin-Lafon and Wendy Mackay (2003). Prototyping Tools And Techniques In: J. A. Jacko and A. Sears (Eds) The Human-Computer Interaction Handbook. © 2003 by Lawrence Erlbaum Associates. Prototyping Strategies 1013 Precision 1008 Rapid Prototypes 1014 Interactivity 1008 Offline Rapid Prototyping Techniques 1014 Evolution 1009 Online Rapid Prototyping Techniques 1017 Prototypes and the Design Process 1009 Iterative Prototypes 1021 User-Centered Design 1009 Software Tools 1022 Participatory Design 1010 Software Environments 1025 Exploring the Design Space 1010 Evolutionary Prototypes 1026 Expanding the Design Space: Generating Ideas 1011 Software Architectures 1026 Contracting the Design Space: Selecting Alternatives ... 101 iin 2 Design Patterns 1028 Summariny in 1029 References 1029 1006 52. Prototyping Tools and Techniques • 1007 Human-computer interaction (HCI) is a multidisciplinary INTRODUCTION field that combines elements of science, engineering, and design (Dykstra-Erickson, Mackay, & Arnowitz, 2001; Mackay & Fayard, "A good design is better than you think." 1997). Prototyping is primarily a design activity, although we use —RexHeftman, cited by Raskin, 2000, p. 143. software engineering to ensure that software prototypes evolve into technically sound working systems and we use scientific Design is about making choices. In many fields that require cre- methods to study the effectiveness of particular designs. ativity and engineering skill, such as architecture or automobile design, prototypes both inform the design process and help de- signers select the best solution.
    [Show full text]
  • Manuscript Instructions/Template
    INCOSE Working Group Addresses System and Software Interfaces Sarah Sheard, Ph.D. Rita Creel CMU Software Engineering Institute CMU Software Engineering Institute (412) 268-7612 (703) 247-1378 [email protected] [email protected] John Cadigan Joseph Marvin Prime Solutions Group, Inc. Prime Solutions Group, Inc. (623) 853-0829 (623) 853-0829 [email protected] [email protected] Leung Chim Michael E. Pafford Defence Science & Technology Group Johns Hopkins University +61 (0) 8 7389 7908 (301) 935-5280 [email protected] [email protected] Copyright © 2018 by the authors. Published and used by INCOSE with permission. Abstract. In the 21st century, when any sophisticated system has significant software content, it is increasingly critical to articulate and improve the interface between systems engineering and software engineering, i.e., the relationships between systems and software engineering technical and management processes, products, tools, and outcomes. Although systems engineers and software engineers perform similar activities and use similar processes, their primary responsibilities and concerns differ. Systems engineers focus on the global aspects of a system. Their responsibilities span the lifecycle and involve ensuring the various elements of a system—e.g., hardware, software, firmware, engineering environments, and operational environments—work together to deliver capability. Software engineers also have responsibilities that span the lifecycle, but their focus is on activities to ensure the software satisfies software-relevant system requirements and constraints. Software engineers must maintain sufficient knowledge of the non-software elements of the systems that will execute their software, as well as the systems their software must interface with.
    [Show full text]
  • Infrastructure (Resilience-Oriented) Modelling Language: I®ML
    Infrastructure (Resilience-oriented) Modelling Language: I®ML A proposal for modelling infrastructures and their interconnections Andrés Silva, Roberto Filippini EUR 24727 EN - 2011 The mission of the JRC-IPSC is to provide research results and to support EU policy-makers in their effort towards global security and towards protection of European citizens from accidents, deliberate attacks, fraud and illegal actions against EU policies. European Commission Joint Research Centre Institute for the Protection and Security of the Citizen Contact information Address: TP 210, EC JRC Ispra, Ispra (Va) Italy E-mail: [email protected] Tel.: +39 0332 789936 Fax: http://ipsc.jrc.ec.europa.eu/ http://www.jrc.ec.europa.eu/ Legal Notice Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of this publication. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) Certain mobile telephone operators do not allow access to 00 800 numbers or these calls may be billed. A great deal of additional information on the European Union is available on the Internet. It can be accessed through the Europa server http://europa.eu/ JRC 63302 EUR 24727 EN ISBN 978-92-79-19324-8 ISSN 1018-5593 doi:10.2788/54708 Luxembourg: Publications Office of the European Union © European Union, 2011 Reproduction is authorised provided the source is acknowledged Printed in Italy Infrastructure (Resilience-oriented) Modelling Language: I®ML A proposal for modelling infrastructures and their connections Andrés Silva1 Roberto Filippini Universidad Politécnica de Madrid JRC of the European Commission Abstract The modelling of critical infrastructures (CIs) is an important issue that needs to be properly addressed, for several reasons.
    [Show full text]
  • Phd, Human-Computer Interaction Date of Birth: 23/06/1992
    Philip Tchernavskij B [email protected] Í tcher.tech Nationality: Danish PhD, Human-Computer Interaction Date of Birth: 23/06/1992 Publications Full papers 2020 Escaping the Prison of Style, PROGRAMMING 2020, with Antranig basman, https://tcher.tech/publications/CCS2020_EscapingThePrisonOfStyle. pdf. Workshop paper 2018 What Lies in the Path of the Revolution, PPIG 2018, with Antranig basman, http://www.ppig.org/library/paper/what-lies-path-revolution. Workshop paper 2018 An Anatomy of Interaction: Co-occurrences and Entanglements, PROGRAM- MING 2018, with Antranig Basman, Simon Bates, and Michel Beaudouin-Lafon, https://doi.org/10.1145/3191697.3214328. Peer-reviewed workshop paper 2017 Beyond Grids: Interactive Graphical Substrates to Structure Digital Layout, CHI 2017, with Nolwenn Maudet, Ghita Jalal, Michel Beaudouin-Lafon, and Wendy Mackay., https://doi.org/10.1145/3025453.3025718. Peer-reviewed conference paper 2017 What Can Software Learn From Hypermedia?, PROGRAMMING 2017, with Clemens Nylandsted Klokmose, and Michel Beaudouin-Lafon, https://doi.org/ 10.1145/3079368.3079408. Peer-reviewed workshop paper Short papers 2017 Substrates for Supporting Narrative in Tabletop Role-Playing Games, CHI Play 2017 (Augmented Tabletop Games workshop), with Andrew Webb. Position paper 2017 Decomposing Interactive Systems, CHI 2017 (HCI.Tools workshop). Position paper Critiques 2018 Critique of ‘Files as Directories: Some Thoughts on Accessing Structured Data Within Files’ (1), Salon des Refusés workshop at PROGRAMMING 2018, https://doi.org/10.1145/3191697.3214324. Critique 1/4 2017 Critique of ‘Tracing a Path for Externalization – Avatars and the GPII Nexus’, Salon des Refusés workshop at PROGRAMMING 2017. Critique Employment 2021–2023 Postdoctoral research fellow, Computer-Mediated Activity group, Aarhus (expected) University.
    [Show full text]
  • IS2018 Book of Abstract
    th Annual INCOSE 28 international symposium Washington, DC, USA July 7 - 12, 2018 Delivering Systems in the Age of Globalization Status as of May 15 th , 2018 Book of Abstract Table of contents keynotes ............................................................................................................................................................................... p. 7 keynotes#Keynote#2: The Big Shift: Innovation and Systems Engineering ................................................................ p. 7 Papers .................................................................................................................................................................................. p. 8 Papers#107: A Framework for Concept and its Testing on Patents ............................................................................ p. 8 Papers#75: A Framework for Testability Analysis from System Architecture Perspective .......................................... p. 9 Papers#128: A Framework for Understanding Systems Principles and Methods .......................................................p. 10 Papers#31: A fresh look at Systems Engineering - what is it, how should it work? .....................................................p. 11 Papers#35: A Hybrid Liver-Candidate Transportation System to Improve Accessibility and Extend Organ Life in L ..p. 12 Papers#55: A Novel “Resilience Viewpoint” to aid in Engineering Resilience in Systems of Systems (SoS) .............p. 13 Papers#97: A successful use of systems approaches in
    [Show full text]
  • July 18, 2012 Chairman Julius Genachowski Federal Communications Commission 445 12Th Street SW Washington, DC 20554 Re
    July 18, 2012 Chairman Julius Genachowski Federal Communications Commission 445 12th Street SW Washington, DC 20554 Re: Letter, CG Docket No. 09-158, CC Docket No. 98-170, WC Docket No. 04-36 Dear Chairman Genachowski, Open data and an independent, transparent measurement framework must be the cornerstones of any scientifically credible broadband Internet access measurement program. The undersigned members of the academic and research communities therefore respectfully ask the Commission to remain committed to the principles of openness and transparency and to allow the scientific process to serve as the foundation of the broadband measurement program. Measuring network performance is complex. Even among those of us who focus on this topic as our life’s work, there are disagreements. The scientific process happens best in the sunlight and that can only happen when as many eyes as possible are able to look at a shared set of data, work to replicate results, and assess its meaning and impact. This ensures the conclusions from the broadband measurement allow for meaningful, data-driven policy making. Since the inception of the broadband measurement program, those of us who work on Internet research have lauded its precedent-setting commitment to open-data and transparency. Many of us have engaged with this program, advising on network transparency and measurement methodology and using the openly-released raw data as a part of our research. However, we understand that some participants in the program have proposed significant changes that would transform an open measurement process into a closed one. Specifically, that the Federal Communications Commission (FCC) is considering a proposal to replace the Measurement Lab server infrastructure with closed infrastructure, run by the participating Internet service providers (ISPs) whose own speeds are being measured.
    [Show full text]
  • Model for Safety Case Modeling and Documentation
    SAFE – an ITEA2 project D3.1.3 Contract number: ITEA2 – 10039 Safe Automotive soFtware architEcture (SAFE) ITEA Roadmap application domains: Major: Services, Systems & Software Creation Minor: Society ITEA Roadmap technology categories: Major: Systems Engineering & Software Engineering Minor 1: Engineering Process Support WP3 Deliverable D3.1.3: Proposal for extension of Meta- model for safety case modeling and documentation Due date of deliverable: 31/03/2013 Actual submission date: 28/03/2013 Start date of the project: 01/07/2011 Duration: 36 months Project coordinator name: Stefan Voget Organization name of lead contractor for this deliverable: fortiss Editor: Maged Khalil (fortiss GmbH) Contributors: Maged Khalil (fortiss GmbH), Eduard Metzker (Vector Informatik GmbH) Reviewers: Eduard Metzker (Vector Informatik GmbH) 2013 The SAFE Consortium 1 (50) SAFE – an ITEA2 project D3.1.3 Revision chart and history log Version Date Reason 0.1 2012-09-19 Initialization of document 0.2 2012-10-18 Input to Introduction Section 4 0.3 2012-11-07 Input to Overview on ISO Section 5 0.4 2012-11-16 Input to EAST-ADL Overview Section 7 0.5 2012-11-16 Input to Overview on ISO Section 5 0.6 2012-11-23 Input to Methodology Section 6 0.7 2012-11-29 Further Input to Methodology Section 6 0.8 2012-12-20 Editing and Input in various sections 0.9 2013-02-13 Input to SAFE Meta-model Contribution Section 8 0.10 2013-02-15 Introduction of Patterns Section 6.3 0.11 2013-03-08 Editing and Input in various sections 0.12 2013-03-24 First version ready for review 0.13 2013-03-26 Incorporation of first review comments 0.14 2013-03-27 Updated version reviewed.
    [Show full text]
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]