Middleware Based User Interface Migration: Implementation and Evaluation

Size: px
Start display at page:

Download "Middleware Based User Interface Migration: Implementation and Evaluation"

Transcription

1 Middleware Based User Interface Migration: Implementation and Evaluation Timo Salminen, Simo Hosio & Jukka Riekki Department of Electrical and Information Engineering, University of Oulu, Finland Abstract User interface can be seen as one of the greatest challenges in mobile computing. One promising approach to make interaction with mobile devices more efficient and pleasant is utilizing UI devices in the user s environment, such as, public displays. However, it is not clear to what extent the user is able to benefit from using external UI devices. Clearly, it also depends on the user s current task. In this paper, we present a middleware based approach that enables migration of user interface from a mobile phone to a device with better UI capabilities, such as, to a desktop computer. We quantitatively and qualitatively evaluate the benefits of such an UI migration to the user with two use cases that are common to mobile phone users; SMS or writing and establishing a phone call. The evaluation bears evidence that the method greatly increases the performance, and especially the enjoyability, compared to the mobile device s own interface when typing messages. Users prefer our approach because it provides faster and more convenient way to e.g. write a long SMS message. On the other hand for simple tasks, such as selecting a receiver when establishing a phone call or typing a very simplified message, the UI migration was found to be highly undesirable. Categories and Subject Descriptors C2.4. [Distributed Systems]: Distributed applications; H.1.2 [User/Machine Systems]: Human factors General Terms Experimentation, Human Factors Keywords UI migration, ubiquitous middleware, user evaluation 1. Introduction Whilst performance of mobile devices has been continuously increasing, physical size of the devices has become very small. This trend sets strict limits to the user interfaces of mobile terminals which typically include a simple, often rather small, keypad for input and a small display and loudspeakers for output. Research has been done for finding solutions to improve user interaction in mobile devices. One promising approach, especially from the ubiquitous computing point of view, is utilization of public displays and other devices in the user s environment. This enables application to temporally transfer its user interface, for instance, to a larger and more suitable display as requested by the user. In the same manner, the user could utilize a standard keyboard as an input device instead of the small keypad of a mobile device. In both scenarios the application would run securely on the user s mobile device whilst the user interface of the application would physically reside somewhere else. The public display and keyboard approach may be highly useful especially if the user is willing to sacrifice his mobility for finishing his task more efficiently with better but stationary user interface. However, from the application developer s point of view, the described user interface migration is very complex and case specific. Instead of using standard UI libraries the developers must now take into account the challenges of distributed computing, such as, communication failures, UI event handling, security and more. Application developer s overload can be considerably relieved by providing developers with services and necessary APIs that facilitate development of applications with UI migration support. This can be achieved, for example, with a middleware that masks the complexity of networks and distributed systems and thereby allow developers to focus on application-specific issues [Bernstein 1996]. Middleware has been successfully utilized in many pervasive computing systems, including [Chetan et al. 2005], [Messer et al. 2006] and [Han et al. 2004]. In the solution described in this paper, the same approach has been taken to facilitate development of applications that support migrating user interfaces. In addition to providing support for the developers, objective of our work is to evaluate benefits of UI migration in a mobile phone from the user s point of view. We have built a prototype system along with applications that demonstrate UI migration. In our implementation the user can transfer user interface of the application in the mobile phone temporally to a desktop computer. For most of the people, mobile phone is a device for making phone calls. It has also been pointed out that 65 percent of the mobile phone users use SMS messaging daily [IDC]. These are the cases we

2 chose as basis, although the UI migration concept could easily be extended to various other application scenarios such as simplifying the complex menu structures when configuring phone s numerous settings or organizing contacts and s. We study how the user benefits from UI migration when making a phone call or writing an SMS message. Our research questions are how the user experiences such interaction and whether the migrating UI approach is beneficial in these applications from the user s point of view. Rest of the paper is structured as follows. Related work is presented in the Chapter 2. Chapter 3 presents our system framework and prototype implementation. Test environment and test scenarios are presented in the Chapter 4. Evaluation is presented in the Chapter 5. The paper is concluded in the Chapter 6 with discussion and future work considerations. 2. Related work Savidis et al [2005] introduced a Voyager development framework for supporting implementation of ambient dialogues. In their system, a small processing unit carried by the user, is continuously looking for surrounding wearable wireless gadgets that are capable of hosting interactions. When such devices are detected, they are employed for providing user interface to the processing unit. If some device that is currently in use goes out of range, the ambient dialogue is halted and resumed again when a corresponding device is detected. The Voyager system relies on a discovery mechanism, a query protocol and a control protocol. Discovery mechanism is used for detecting surrounding UI devices. Query protocol is used by the processing unit to chase up the capabilities of detected devices and to determine if the device can satisfy its needs. Finally, the control protocol is used for UI event delivery between the processing unit and UI device. Somewhat similar user interface solution can be found in [Bauer et al. 2001]. In their work, Bauer et al used a component-based software framework called DWARF for building augmented reality systems. In DWARF system, the user interface was separated from the application logic by a specialized component; user interface engine, which provided platform independence of user interfaces and multi-modal user interaction. If some application required user interface in DWARF system, it asked user interface engine to build it by providing an abstract description of desired UI. UIML-based user interface description language was utilized for describing user interfaces in the DWARF system. Bertini et al [2004] defined an interaction model for designing internet based applications that automatically adapt to different mobile devices. Building blocks of their system are abstract interaction units (AIUs) and UML activity diagram. AIUs define a single view in the user interface; data to be shown to the user as well as user interaction and information exchanged between the user and the system. Activity diagram connects AIUs together and defines how the user interface is composed to complete a certain task, such as, to book a hotel room. This kind of interaction model can also be applied for public displays since application logic is separated from the user interface. Instead, the application defines what kind of user interface it needs and individual UI device can build the required user interface. However, the proposal is intended to be used in only very limited set of internet based applications. Nylander et al [2005] provided the Ubiquitous Interactor (UBI) to address the problems of design and development that arise from services that need to be accessed from many different devices. The UBI offers a possibility to develop one device independent version of the service and then create device specific user interfaces for it. The UBI uses interaction acts to describe user-service interaction in a device independent way. This description is used by all devices to generate an appropriate user interface. Thus, the application developer does not need to stick into fixed set of UI elements provided by the underlying platform. Instead, the user interface is represented by abstract description which is given to the interaction engine. Interaction engine translates between description and the user interface. Presentation of user interfaces can moreover be controlled through customization forms, which contain service- and device-specific information on how user interfaces should be presented. We, on the other hand, present a middleware based solution that offers the application developers an easy way to implement UI migration enabled applications. By doing this we also enable the application users to make the decision themselves whether to initiate the UI migration or not, and moreover, where to migrate the UI. In this paper we present a survey of user experiences about utilizing such a system and study to what extent the user can benefit from switchable user interface method while using a mobile device in tasks that require keypad input. 3. System framework In our previous research, we have introduced a middleware for supporting the development of ubiquitous and contextaware applications [Riekki et al. 2006]. The middleware provides applications with services that are common to this application area including distributed communication, service discovery, context information delivery, and more. Middleware and its components are illustrated in Figure 1:. Figure 1: Applications are built on top of the middleware and using components distributed in the environment. Our middleware divides functionality into atomic entities called components. Each component is specialized in some task or domain area and provides corresponding functionality to the other entities in the system and to the applications. Furthermore, it places the commonly used functions in independent components, so they can be

3 shared across the platforms and software environments. The middleware and its components are distributed to the devices in user s environment. To the application layer, however, services that the middleware offers are represented as a single, coherent system. A component can represent a service or some resource in the user s environment. The components live inside a container called an engine. Each device in our system hosts one engine. The lowest layer of the engine, core, includes the basic services for the applications. An engine may also contain an unspecified number of value-adding components that extends functionality of an engine. Applications are developed on top of the middleware by utilizing services it offers. When an application is initiated, it can start using any component in the environment by asking it from a core component called component management. Component management is responsible for granting and giving access to the other components in an environment User interface component User Interface component is one of the most important services the middleware has to offer for the applications and developers. Driving force behind the UI component design was to keep application logic separate from the user interface itself. This supports also our goal by making user interface migration a relatively straightforward process. Several UI components may exist in the system and the application may select which one to use. The UI component provides the developer an abstract method to describe the user interface of an application in XUL [Mozilla XUL] based language. Example UI description is listed in Figure 2:. The description contains two labels, two textboxes and a button. The described UI can be used e.g. for querying and phone number from the user. When an application starts, it usually gives description of its user interface to the User Interface component running on the local device. The user interface is then built by the User Interface component using the GUI libraries of the underlying platform. Naturally, it is up to the currently employed UI component, how the user interface is rendered and how it actually looks like. <?xml version="1.0" encoding="utf-8"?> <box id = "querybox" align="center" orient="vertical"> <label id="label1" value=" "> </label> <textbox id=" " multiline="false" readonly="false"> </textbox> <label id="label2" value="phone number"> </label <textbox id="phone" multiline="false" readonly="false"> </textbox> <button disabled="false" id="button1" label="ok" association=" ,phone"> </button> </box> Figure 2: Description of UI with two labels, two textboxes and a button The user interface description is composed of UI elements and UI controls that the application needs as well as their related data. All elements and controls have unique identification code. Moreover, UI controls can be associated to the UI elements as necessary. The application can have for example a button control which is associated to a text field element. When the control is triggered, the data written to the text field element is sent to the application as a button control event. The UI event handling is taken completely care of by our middleware. This way the application is transparent to the UI component and conversely the UI component is transparent to the application. Only thing the UI component knows from its clients is application identification code and a network address where it is located. This information is used for delivering the events to the desired destination. 4. Test environment and scenarios Our prototype system is presented in Figure 3:. The system is composed of a Nokia 7610 mobile phone and a standard desktop computer (Windows XP, service pack 2). In the mobile phone side, we have developed an SMS application, which utilizes services provided by middleware. In addition to core functionality of the middleware, two user interface components exist in the environment. One is running on the mobile phone and another one on the desktop computer. In addition to standard configuration, the mobile phone is equipped with an integrated RFID reader. When touching an RFID tag, the reader software framework sends an event including the data stored in the tag to all its subscribers. We utilize RFID system to initiate the UI migration. When SMS application is started, it employs the UI component on mobile phone to build its user interface. The UI component running on the PC is represented by an RFID tag which contains identification data of the component. When the user touches the tag located on the screen, or perhaps on the keyboard, with a mobile phone, the application is notified with an RFID event and it starts the UI migration procedure. At the end, the User Interface component on the PC is employed by the application and its user interface is shown on the screen of the desktop computer. Communication between the mobile phone and the PC is done using Bluetooth (RFCOMM profile) as it is convenient and reliable for wireless personal area networking. All server side functionality was implemented using Java 5.0 SDK and serial communications API. Components on top of Symbian OS were built using C++ and Series 60 SDK v.2.1. Figure 3: Test environment architecture

4 We examined the system with two scenarios that demonstrated common mobile phone use. At first, the test user was asked to write SMS messages with lengths of 2, 10, 20 and 50 characters. Secondly, the user was asked to make a phone call by choosing a receiver from the list of 200 available contacts in the phone s contact list. We created two UI descriptions, one for each scenario. The description was used by UI components on mobile phone and on the desktop computer to render corresponding user interface for the application. A simple script with a label, textbox and an ok button was used for displaying the message writing application. The other one with a list box and an ok button was for choosing the receiver on PC side. At mobile phone side choosing the receiver was done using an authentic Series 60 contacts selection dialog provided by available native application engines. This was done in order to keep the selection as natural as possible to the test users, since most of the current Series 60 phones employ the same selection dialog. Figure 5: illustrate the user interfaces generated from the description on both mobile phone and PC. Migration of the UI from mobile phone to a PC was launched by the user by touching an appropriate RFID tag. This way the process for Bluetooth service and device discovery was avoided, and the connection establishment was highly faster, as testified in [Hidden for anonymity reasons]. At the beginning of the tests, the overall setup and usage of the devices and interfaces were shown and made sure to be familiar to the users. This way time variation caused by learning was eliminated. In the first case, the user typed the given text first with the mobile phone. After this, the same text was written by using UI migration, i.e. transferring the application user interface to the desktop and using a traditional keyboard. Total time to finish the task was measured with both methods. After finishing writing of all four texts, users started the second scenario. At first the users had to select a given receiver of the phone call from the list of 200 possible contacts using phone s native contact dialog. Total time for the transaction was measured. After this, the same operation was done with UI migration. User interface on mobile phone with all 200 contacts was transferred to a desktop computer. This time, the user made the selection with mouse and a scrollable list box. Figure 4: SMS application user interfaces. Left: text editor on mobile phone. Right: same UI migrated to a desktop computer Figure 5: Receiver selection user interfaces. Left: receiver selection dialog on mobile. Right: same UI migrated to a desktop computer 5. Evaluation In the first case we measured the absolute time from the moment the user started the writing procedure to the point that the text was ready to be submitted as an SMS. Without the UI migration, the timer started when user chose to start writing from menu and stopped when the ok key was pressed. With migration, timing was started when an appropriate RFID tag for the service was touched. In this case, also an intermediate time was taken when the Bluetooth connection was up and ready to be used. Final time was again marked when the written text had fully arrived via the same Bluetooth socket back to the mobile phone. Second case timed the interval between starting of the contacts selection dialog or touching the tag to move the UI to server and selecting the desired receiver. As in the first case, a checkpoint time was taken when the connection establishment was accomplished. The time required in sending the actual XUL or the text written at server via BT is negligibly small and thus left without further attention. Altogether 15 test users were used in evaluating the system. Of the group, fourteen (14) were male and one (1) female. The average age was 25,6 years with a standard deviation of 2,6 years. The group was very technologyoriented, and working among computing business. As easily noted, some of the factors of this kind of research are very hard to address: the varying typing skills of testers, customs with different keyboards, suitableness of the used mobile phone s keypad to different users etc. We aimed to familiarize the users carefully with the setup before tests and minimize the effect of environment. This all taken into consideration, the results can not be universally generalized to all mobile device users, but are rather giving a good hint on what might be the impact of such services in modern, computer-oriented society. After the performance tests, the users were also made a questionnaire about the usability and convenience of utilizing UI migration instead of finishing the given task by using just the mobile phone alone.

5 5.1. Quantitative evaluation When evaluating the efficiency and times of writing, no predictive input (e.g. T9) was used. All the texts were written using traditional mobile phone writing technique with a normal Nokia 7610 keypad. Users were all familiar with the keypad layout and functions offered by the mobile phone (e.g. where to find special or capitalized characters). The profit of using UI migration varied a lot according to the test in question. As one can easily predict, when typing a short, compact, message such as ok or similar, migrating the UI for more capable and better I/O is not worthwhile at all. The times consumed for each of the test cases can be seen in Figure 6. For a text of 2 characters the average time of writing at the device itself was 3,7 seconds with a standard deviation of 1,2s. The average time with the migration proved to be somewhat bigger, 5,8 seconds (stdev 1,1s). Thus, for short messages the migration brings rather harm than advantage, since the user is forced to take extra steps (initiate migration, switch the input/output device) and effort in writing. Figure 6: Total time for each writing task with both methods As we observed longer texts, the advantage gained from better input grew dramatically. Already with a text of 20 chars, the time consumed for writing with the mobile phone s keypad (30,5s, stdev 11s) was over three times as big as the corresponding time with the migration (10,1s, stdev 1,6s). At these lengths, still being relatively short, also the standard deviation also starts to take role in the total time when talking about writing with the mobile phone. If user types a full, 160 characters long, or even longer SMS message, the time saved might well be minutes in case of some users. When examining the selection of the receiver, no question remains which way is more efficient. Figure 7 shows that the time for selecting the receiver with UI migration (13,8s, stdev 3,7s) is over 2 times slower than with the traditional way (6,1s, stdev 1,7 s). Selection of the receiver was also already considered to be as simple and fast as desired in mobile phones, as the following chapter brings forward. Simple t-tests were performed to verify the significance of the results above. The biggest value gained for p was (the 10 character case), thus verifying that the results are also statistically significant User feedback evaluation When comparing the described methods also qualitative feedback of the users has to be taken into account. All test users filled in a short questionnaire after finishing the tests. When it comes to writing an SMS message (generally text), only one out of fifteen testers thought the traditional way to be more comfortable. This was because of the test person was very accustomed to the keypad of a mobile phone and saw no need for a better method. Anyhow, a number of good aspects in the traditional way were reported. Users liked it because it was easy, simple and no extra actions were needed to type the message, that is, the initiation of the UI migration and using an external device for writing (PC). Privacy was mentioned indeed in many questionnaires as a shortcoming. When using a small screen in a personal mobile phone, other people are not able to see what the user is typing. After UI migration to the public display, the situation is highly different. Major shortcomings mentioned in using mobile s own keypad was slow typing with clumsy interface compared to a bigger and more advanced keyboard. Also special characters and upper/lower case switching caused trouble. Ten of the test users liked UI migration because it was a lot easier to use compared to traditional method. Also typing and editing of the message was faster with migration. One test person preferred the migration because using mouse and keyboard was familiar and safe. Large screen was mentioned as a positive thing in two cases. Especially special characters were thought to be easier to find with a normal keyboard. Anyhow, 3 users were not ready to use such services if they existed in real world because of possible digital security flaws and especially with privacy issues when using large, public screens. Downsides of the UI migration were listed also. Privacy and security being the major ones, additional steps to start typing and immobility while typing were mentioned as well. Even fear for diseases spreading via public devices was brought out. In the second scenario, only one user preferred to select the receiver with UI migration. Reason for this was that the selection of a receiver for a message was reported to be already really fast and convenient. No improvement suggestions were made. Additional migration and changing the interface only took time and made the whole transaction more complicated. However, three of the respondents said they would use such services in real-life anyway. Figure 7: Times for selecting the call receiver with both methods

6 6. Discussion and conclusions We presented a middleware support for facilitating the development of applications that support migrating user interfaces. We developed a prototype application on top of the middleware components. Using the prototype, we evaluated benefits of the UI migration with two common tasks for mobile users and compared the actual efficiency between the migration and traditional method. A pure time based efficiency evaluation and a user survey about the experiments was provided. The plain times measured are supporting and providing background data rather than being universal averages, since there are many variables present in this case. From the technological point of view, utilization of UI migration and public displays introduces a number of challenges. Security and privacy are probably the most important, as notified also by some of our test persons. The main security threat in UI migration concerns communication between application and the UI device. The situation is clearly similar to using any web service where user s private data is accessed through web browser. The application, let s say, an online payment service is running on web server of the bank whilst user interface of the application is shown to the user locally on his/her PC. The attacker may use several techniques to access the ongoing transaction, such as, man-on-the-middle attack, eavesdropping, manipulation and more. Thus, a system where UI migration is supported has to deal with the common security threats related to internetworking. On the other hand, the security issues in question are quite well understood and the existing methodologies can be applied also to UI migration. In addition to security issues, solutions have been introduced for improving privacy for public screens. For instance, Sharp et al enhanced privacy in their system by hiding private data on public displays and filtering possible input events from the terminals [Sharp et al. 2006]. Various use cases exists where UI migration could be utilized in real life. This is due to fact that user interface of mobile terminals are inefficient for complex tasks. Technologically speaking the solution presented in this paper is already possible. Mobile phones have been equipped with various radio interfaces for communication for a long time. Furthermore, RFID is becoming a common technology and it can be utilized in session setup. Some mobile phone models today already offer RFID capabilities. As we pointed out in this paper, UI migration makes mobile phone use more efficient when user is writing text longer than just a few characters. Since smart phones today have capabilities, the UI migration could be useful for many users if deployed widely. It is easy to imagine an internet café, which provides public terminals to the customers with keyboard and screen. All personal data and the applications are located in the user s mobile terminal. However, during the usage of the device the external UI devices are utilized, which enhances usability and efficiency of the application user interface. User is able to watch movies or edit documents and use his device in a lot more convenient and enjoyable fashion. The whole concept of migrating UI and utilizing public devices is a fascinating one and we are going to continue work on it. As for user tests, we aim to deploy an updated system in public space, and go for larger surveys. For security, research is planned by developing the middleware onwards. This kind of systems might easily lead into unwanted situations of leaked personal information such as s or contact information. In general, user interface migration offers a great number of possibilities, but there is a mass of work to be done to make it an everyday luxury. 10. References Bauer, M., Bruegge, B., Klinker, G., MacWilliams, A., Recher, T., Riss, S. and San, M Design of a component-based augmented reality framework. In Int l Symp on Augmented Reality, New York, USA, Bernstein, P.A Middleware: a model for distributed system services. Communications of the ACM. Vol. 39, Num. 2. ACM Press, Bertini, E. and Santucci, G Modelling internet based applications for designing multi-device adaptive interfaces. In Proceedings of the Working Conference on Advanced Visual Interfaces. Chetan, S. Al-Muhtadi, J. Campbell, R. and Mickunas, M.D. (2005) Mobile Gaia: a Middleware for Ad-hoc Pervasive Computing. The Second IEEE Consumer Communications and Networking Conference, pp Han, S., Bong, Y. and Youn, H A New Middleware Architecture for Ubiquitous Computing Environment. In: Proceedings of the Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS 04), May 11-12, Vienna, Austria, pp IDC homepage, Survey on Mobile Data Service Usage. 3_ accessed September Messer, A. Kunjithapatham, A. Sheshagiri, M. Song, H. Kumar, P. Nguyen, P. and Kyoung Hoon Yi InterPlay: a middleware for seamless device integration and task orchestration in a networked home. Proc. of the Fourth International IEEE Conference on Pervasive Computing and Communications (PerCom 06), pp Nylander, S. Bylund, M. and Waern, A Ubiquitous Service Access Through Adapted User Interfaces on Multiple Devices. Journal on Personal and Ubiquitous Computing, Vol. 9, Issue 3, May 2005, Springer-Verlag, London, Riekki J., Salminen T., and Alakärppä I Requesting Pervasive Services by Touching RFID Tags. IEEE Pervasive Computing, vol 5, issue 1 Savidis, A., and Stephanidis, C Distributed interface bits: dynamic dialogue composition from ambient computing resources. In Journal on Personal and Ubiquitous Computing, Vol. 9, Issue 3, May 2005, Springer-Verlag, London, Sharp, R. Scott J. and Beresford A Secure Mobile Computing via Public Terminals. In Proceedings of International Conference on Pervasive Computing, Springer Berlin/Heidelberg, pp The homepage of Mozilla XUL documentation, accessed April 2007.

Enhancing Bluetooth Connectivity with RFID

Enhancing Bluetooth Connectivity with RFID Enhancing Bluetooth Connectivity with RFID Timo Salminen, Simo Hosio and Jukka Riekki Department of Electrical and Information Engineering, 914 University of Oulu, Finland firstname.surname@ee.oulu.fi

More information

A Context Based Storage System for Mobile Computing Applications

A Context Based Storage System for Mobile Computing Applications A Context Based Storage System for Mobile Computing Applications Sharat Khungar Jukka Riekki {firstname.lastname}@ee.oulu.fi Department of Electrical and Information Engineering and Infotech Oulu P.O.BOX

More information

Requesting Services by Touching Objects in the Environment

Requesting Services by Touching Objects in the Environment Requesting Services by Touching Objects in the Environment Jukka Riekki 1, Timo Salminen 1, Simo Hosio 1, Ismo Alakärppä 2 1 University of Oulu 2 University of Lapland P.O.Box 4500 P.O.Box 122 90014 Oulu

More information

EVALUATING DIFFERENT TOUCH-BASED INTERACTION TECHNIQUES IN A PUBLIC INFORMATION KIOSK

EVALUATING DIFFERENT TOUCH-BASED INTERACTION TECHNIQUES IN A PUBLIC INFORMATION KIOSK EVALUATING DIFFERENT TOUCH-BASED INTERACTION TECHNIQUES IN A PUBLIC INFORMATION KIOSK Roope Raisamo Department of Computer Science University of Tampere P.O. Box 607 (Pinninkatu 53B) FIN-33101 Tampere,

More information

COMMON ISSUES AFFECTING SECURITY USABILITY

COMMON ISSUES AFFECTING SECURITY USABILITY Evaluating the usability impacts of security interface adjustments in Word 2007 M. Helala 1, S.M.Furnell 1,2 and M.Papadaki 1 1 Centre for Information Security & Network Research, University of Plymouth,

More information

Client-server application testing plan

Client-server application testing plan Client-server application testing plan 1. INTRODUCTION The present plan contains and describes testing strategy principles applied for remote access system testing. The plan is intended to be used by project

More information

Supporting Mobile Service Usage through Physical Mobile Interaction

Supporting Mobile Service Usage through Physical Mobile Interaction Supporting Mobile Service Usage through Physical Mobile Interaction Gregor Broll 1, Sven Siorpaes 1, Enrico Rukzio 2, Massimo Paolucci 3, John Hamard 3, Matthias Wagner 3, Albrecht Schmidt 4 1 Media Informatics

More information

Implicit Personalization of Public Environments using Bluetooth

Implicit Personalization of Public Environments using Bluetooth Implicit Personalization of Public Environments using Bluetooth Hema Mahato RWTH Aachen 52062 Aachen hema.mahato@rwth-aachen.de Dagmar Kern Pervasive Computing University of Duisburg-Essen 45117 Essen,

More information

Spontaneous Interaction using Mobile Phones and Short Text Messages

Spontaneous Interaction using Mobile Phones and Short Text Messages Spontaneous Interaction using Mobile Phones and Short Text Messages Frank Siegemund Distributed Systems Group, Department of Computer Science, Swiss Federal Institute of Technology (ETH) Zurich, 8092 Zurich,

More information

Policy-Based Context-Management for Mobile Solutions

Policy-Based Context-Management for Mobile Solutions Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,

More information

Visualizing Access Control Policies in Databases. Jared Chandler. Comp 116 Fall 2015

Visualizing Access Control Policies in Databases. Jared Chandler. Comp 116 Fall 2015 Visualizing Access Control Policies in Databases Jared Chandler Comp 116 Fall 2015 To the Community I chose this topic because it is something I have an interest in improving. SQL databases are widespread

More information

Developing a Mobile Information Service

Developing a Mobile Information Service Developing a Mobile Information Service Proceedings of the 15 th Annual NACCQ, Hamilton New Zealand July, 2002 www.naccq.ac.nz ABSTRACT T.T. Goh Chris Chen Victoria University Wellington Wellington, New

More information

Android PC Splash Brothers Design Specifications

Android PC Splash Brothers Design Specifications Android PC Splash Brothers Design Specifications Contributors: Zach Bair Taronish Daruwalla Joshua Duong Anthony Nguyen 1. Technology background The Android x86 project has been in existence since 2011.

More information

Extensible GUIs for Remote Application Control on Mobile Devices

Extensible GUIs for Remote Application Control on Mobile Devices International Journal of Scientific and Research Publications, Volume 4, Issue 9, September 2014 1 Extensible GUIs for Remote Application Control on Mobile Devices Ajitkaur Saini, Bhushan Borse *, Pratiksha

More information

AUTOMATED GUI TESTING OF SOFTWARE APPLICATIONS USING UML MODELS

AUTOMATED GUI TESTING OF SOFTWARE APPLICATIONS USING UML MODELS AUTOMATED GUI TESTING OF SOFTWARE APPLICATIONS USING UML MODELS Robertas Jasaitis, Dominykas Barisas, Eduardas Bareisa Kaunas University of Technology, Department of Software Engineering Studentu st. 50,

More information

Internet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12

Internet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12 Chapter12 Internet Platform Management The Internet is like alcohol in some sense. It accentuates what you would do anyway. If you want to be a loner, you can be more alone. If you want to connect, it

More information

Personal Health Assistant: Final Report Prepared by K. Morillo, J. Redway, and I. Smyrnow Version Date April 29, 2010 Personal Health Assistant

Personal Health Assistant: Final Report Prepared by K. Morillo, J. Redway, and I. Smyrnow Version Date April 29, 2010 Personal Health Assistant Personal Health Assistant Ishmael Smyrnow Kevin Morillo James Redway CSE 293 Final Report Table of Contents 0... 3 1...General Overview... 3 1.1 Introduction... 3 1.2 Goal...3 1.3 Overview... 3 2... Server

More information

Comparing Techniques for Mobile Interaction with Objects from the Real World

Comparing Techniques for Mobile Interaction with Objects from the Real World Comparing Techniques for Mobile Interaction with Objects from the Real World Gregor Broll 1, Sven Siorpaes 1, Enrico Rukzio 2, Massimo Paolucci 3, John Hamard 3, Matthias Wagner 3, Albrecht Schmidt 4 1

More information

I. INTRODUCTION ABSTRACT

I. INTRODUCTION ABSTRACT 2018 IJSRST Volume 4 Issue 8 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Science and Technology Voice Based System in Desktop and Mobile Devices for Blind People Payal Dudhbale*, Prof.

More information

Copyright

Copyright 1 SECURITY TEST Data flow -- Can you establish an audit trail for data, what goes where, is data in transit protected, and who has access to it? Data storage -- Where is data stored, and is it encrypted?

More information

Recording end-users security events: A step towards increasing usability

Recording end-users security events: A step towards increasing usability Section 1 Network Systems Engineering Recording end-users security events: A step towards increasing usability Abstract D.Chatziapostolou and S.M.Furnell Network Research Group, University of Plymouth,

More information

Development of new security infrastructure design principles for distributed computing systems based on open protocols

Development of new security infrastructure design principles for distributed computing systems based on open protocols Development of new security infrastructure design principles for distributed computing systems based on open protocols Yu. Yu. Dubenskaya a, A. P. Kryukov, A. P. Demichev Skobeltsyn Institute of Nuclear

More information

Grocery List: An Android Application

Grocery List: An Android Application The University of Akron IdeaExchange@UAkron Honors Research Projects The Dr. Gary B. and Pamela S. Williams Honors College Spring 2018 Grocery List: An Android Application Daniel McFadden djm188@zips.uakron.edu

More information

Content-based Management of Document Access. Control

Content-based Management of Document Access. Control Content-based Management of Document Access Control Edgar Weippl, Ismail Khalil Ibrahim Software Competence Center Hagenberg Hauptstr. 99, A-4232 Hagenberg, Austria {edgar.weippl, ismail.khalil-ibrahim}@scch.at

More information

with TestComplete 12 Desktop, Web, and Mobile Testing Tutorials

with TestComplete 12 Desktop, Web, and Mobile Testing Tutorials with TestComplete 12 Desktop, Web, and Mobile Testing Tutorials 2 About the Tutorial With TestComplete, you can test applications of three major types: desktop, web and mobile: Desktop applications - these

More information

assignment #9: usability study and website design

assignment #9: usability study and website design assignment #9: usability study and website design group #3 christina carrasquilla sarah hough stacy rempel executive summary This report will examine the usability of the website http://iwantsandy.com

More information

Multi-stakeholder collaboration: The CIFE iroom

Multi-stakeholder collaboration: The CIFE iroom Theme: Title: Multi-stakeholder collaboration: The CIFE iroom Author(s): Institution(s): E-mail(s): Abstract: Keywords: Martin Fischer 1, Maureen Stone 2, Kathleen Liston 3, John Kunz 1, Vibha Singhal

More information

Welcome to our Moodle site! What is Moodle?

Welcome to our Moodle site! What is Moodle? Welcome to our Moodle site! We are excited to introduce the use of this online e-learning platform in our "Get SMART FAST" Training Program! We believe the use of this virtual classroom and training format

More information

An Approach to VoiceXML Application Modeling

An Approach to VoiceXML Application Modeling An Approach to Application Modeling Xin Ni 1 Meng Ye 2 Lianhong Cai 3 1,3 Tsinghua University, Beijing, China 2 IBM China Research Lab nx01@mails.tsinghua.edu.cn, yemeng@cn.ibm.com, clh-dcs@tsinghua.edu.cn

More information

205CDE: Developing the Modern Web. Assignment 1: Designing a Website. Scenario: D Bookshop

205CDE: Developing the Modern Web. Assignment 1: Designing a Website. Scenario: D Bookshop 205CDE: Developing the Modern Web Assignment 1: Designing a Website Scenario: D Bookshop Introduction I decided to make a second hand bookshop website. There are some reasons why I made this choice. Mainly

More information

Touch & Control: Interacting with Services by Touching RFID Tags

Touch & Control: Interacting with Services by Touching RFID Tags Touch & Control: Interacting with Services by Touching RFID Tags Iván Sánchez 1, Jukka Riekki 1, Mikko Pyykkönen 2 1 Dept. of Electrical and Information Engineering and Infotech Oulu. P.O. Box 4500, University

More information

CHAPTER 4 HUMAN FACTOR BASED USER INTERFACE DESIGN

CHAPTER 4 HUMAN FACTOR BASED USER INTERFACE DESIGN CHAPTER 4 HUMAN FACTOR BASED USER INTERFACE DESIGN 4.1 Introduction Today one of the most important concerns is how to use the system with effectiveness, efficiency and satisfaction. The ease or comfort

More information

Mobile Messaging Using Bangla

Mobile Messaging Using Bangla 1 Mobile Messaging Using Bangla Tofazzal Rownok ID# 01101040 Department of Computer Science and Engineering December 2005 BRAC University, Dhaka, Bangladesh 2 DECLARATION I hereby declare that this thesis

More information

LetterScroll: Text Entry Using a Wheel for Visually Impaired Users

LetterScroll: Text Entry Using a Wheel for Visually Impaired Users LetterScroll: Text Entry Using a Wheel for Visually Impaired Users Hussain Tinwala Dept. of Computer Science and Engineering, York University 4700 Keele Street Toronto, ON, CANADA M3J 1P3 hussain@cse.yorku.ca

More information

Achieving Right Automation Balance in Agile Projects

Achieving Right Automation Balance in Agile Projects Achieving Right Automation Balance in Agile Projects Vijayagopal Narayanan Vijayagopal.n@cognizant.com Abstract When is testing complete and How much testing is sufficient is a fundamental questions that

More information

WEB APPLICATIONS: OUR IDEA FOR A DEVELOPMENT FRAMEWORK

WEB APPLICATIONS: OUR IDEA FOR A DEVELOPMENT FRAMEWORK WEB APPLICATIONS: OUR IDEA FOR A DEVELOPMENT FRAMEWORK Luca Contursi luca.contursi@unile.it Roberto Paiano roberto.paiano@unile.it Andrea Pandurino andrea.pandurino@unile.it ABSTRACT The increased complexity

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT. March 2017 PRINCIPLES OF USER INTERFACE DESIGN

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT. March 2017 PRINCIPLES OF USER INTERFACE DESIGN BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT March 2017 PRINCIPLES OF USER INTERFACE DESIGN EXAMINERS REPORT General Comments Candidates should focus

More information

Iteration vs Recursion in Introduction to Programming Classes: An Empirical Study

Iteration vs Recursion in Introduction to Programming Classes: An Empirical Study BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 4 Sofia 2016 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2016-0068 Iteration vs Recursion in Introduction

More information

Software Tools. Scott Klemmer Autumn 2009

Software Tools. Scott Klemmer Autumn 2009 stanford hci group http://cs147.stanford.edu Software Tools Scott Klemmer Autumn 2009 It accomplishes an important task (for better and for worse) You don t have to make it yourself, and it abstracts a

More information

Copyright

Copyright 1 Security Test EXTRA Workshop : ANSWER THESE QUESTIONS 1. What do you consider to be the biggest security issues with mobile phones? 2. How seriously are consumers and companies taking these threats?

More information

ODK Tables Graphing Tool

ODK Tables Graphing Tool ODK Tables Graphing Tool Nathan Brandes, Gaetano Borriello, Waylon Brunette, Samuel Sudar, Mitchell Sundt Department of Computer Science and Engineering University of Washington, Seattle, WA [USA] {nfb2,

More information

Preface. Structure of the Book

Preface. Structure of the Book When the first edition of this book was published back in 2008, the scope was anything to do with smart cards and security tokens in the widest sense. The aim was in fact to provide a complete story, looking

More information

Quantitative Models for Performance Enhancement of Information Retrieval from Relational Databases

Quantitative Models for Performance Enhancement of Information Retrieval from Relational Databases Quantitative Models for Performance Enhancement of Information Retrieval from Relational Databases Jenna Estep Corvis Corporation, Columbia, MD 21046 Natarajan Gautam Harold and Inge Marcus Department

More information

New Windows 10 Productivity Improvements

New Windows 10 Productivity Improvements New Windows 10 Productivity Improvements Windows 10 features enhance security and productivity at Microsoft Microsoft IT enabled several enterprise features for its global user base, including Windows

More information

Routing Protocol comparison

Routing Protocol comparison Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate

More information

The Grid 2 is accessible to everybody, accepting input from eye gaze, switches, headpointer, touchscreen, mouse, and other options too.

The Grid 2 is accessible to everybody, accepting input from eye gaze, switches, headpointer, touchscreen, mouse, and other options too. The Grid 2-89224 Product Overview The Grid 2 is an all-in-one package for communication and access. The Grid 2 allows people with limited or unclear speech to use a computer as a voice output communication

More information

Technical Solutions Novel Challenges to Privacy Privacy Enhancing Technologies Examples

Technical Solutions Novel Challenges to Privacy Privacy Enhancing Technologies Examples Muhammad Eka WIJAYA Technical Solutions Novel Challenges to Privacy Privacy Enhancing Technologies Examples How to Address Privacy in Ubiquitous Work Understand Application Define Problem Know Tools 2

More information

INADEQUACIES IN THE USE OF PRESENT MOBILE BANKING IMPLEMENTATIONS

INADEQUACIES IN THE USE OF PRESENT MOBILE BANKING IMPLEMENTATIONS INADEQUACIES IN THE USE OF PRESENT MOBILE BANKING IMPLEMENTATIONS Karun Madan, Surya World Institute of Engg. & Technology, Rajpura, Punjab ABSTRACT In the recent years, the number of online banking users

More information

Multimodal Interfaces. Remotroid

Multimodal Interfaces. Remotroid Multimodal Interfaces Remotroid Siavash Bigdeli / Christian Lutz University of Neuchatel and University of Fribourg 1. June 2012 Table of contents 1 Introduction...3 2 Idea of the application...3 3 Device

More information

Webroot SecureAnywhere Business Endpoint Protection

Webroot SecureAnywhere Business Endpoint Protection Single Product Test Head-to-Head Comparison VIPRE Endpoint Security - Cloud Edition Webroot SecureAnywhere Business Endpoint Protection Language: English October 2017 Last revision: 3 rd November 2017-1

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

A Content Based Image Retrieval System Based on Color Features

A Content Based Image Retrieval System Based on Color Features A Content Based Image Retrieval System Based on Features Irena Valova, University of Rousse Angel Kanchev, Department of Computer Systems and Technologies, Rousse, Bulgaria, Irena@ecs.ru.acad.bg Boris

More information

An Overview of Visual Basic.NET: A History and a Demonstration

An Overview of Visual Basic.NET: A History and a Demonstration OVERVIEW o b j e c t i v e s This overview contains basic definitions and background information, including: A brief history of programming languages An introduction to the terminology used in object-oriented

More information

Towards a Framework for Distributed User Modelling for Ubiquitous Computing

Towards a Framework for Distributed User Modelling for Ubiquitous Computing Towards a Framework for Distributed User Modelling for Ubiquitous Computing Marcus Specht, Andreas Lorenz, and Andreas Zimmermann Fraunhofer Institute for Applied Information Technology Schloss Birlinghoven

More information

A STUDY OF ANDROID OPERATING SYSTEM WITH RESPECT WITH USERS SATISFACTION

A STUDY OF ANDROID OPERATING SYSTEM WITH RESPECT WITH USERS SATISFACTION A STUDY OF ANDROID OPERATING SYSTEM WITH RESPECT WITH USERS SATISFACTION Ashish A Kulkarni 1, Pooja A Kulkarni 2 1 Assistant Professor, MIT School of Management Pune, (India) 2 Assistant Professor, NBN

More information

Wrapper: An Application for Evaluating Exploratory Searching Outside of the Lab

Wrapper: An Application for Evaluating Exploratory Searching Outside of the Lab Wrapper: An Application for Evaluating Exploratory Searching Outside of the Lab Bernard J Jansen College of Information Sciences and Technology The Pennsylvania State University University Park PA 16802

More information

Luckily, our enterprise had most of the back-end (services, middleware, business logic) already.

Luckily, our enterprise had most of the back-end (services, middleware, business logic) already. 2 3 4 The point here is that for real business applications, there is a connected back-end for services. The mobile part of the app is just a presentation layer that is unique for the mobile environment.

More information

VMer Visualized Mobile Designer for Applications on Small Devices

VMer Visualized Mobile Designer for Applications on Small Devices Proc. of the 8th WSEAS Int. Conf. on Mathematical Methods and Computational Techniques in Electrical Engineering, Bucharest, October 16-17, 2006 253 VMer Visualized Mobile Designer for Applications on

More information

Models, Tools and Transformations for Design and Evaluation of Interactive Applications

Models, Tools and Transformations for Design and Evaluation of Interactive Applications Models, Tools and Transformations for Design and Evaluation of Interactive Applications Fabio Paternò, Laila Paganelli, Carmen Santoro CNUCE-C.N.R. Via G.Moruzzi, 1 Pisa, Italy fabio.paterno@cnuce.cnr.it

More information

Usability Report for Online Writing Portfolio

Usability Report for Online Writing Portfolio Usability Report for Online Writing Portfolio October 30, 2012 WR 305.01 Written By: Kelsey Carper I pledge on my honor that I have not given or received any unauthorized assistance in the completion of

More information

User Guide. For version 0.5, January Download the latest version from jnetmap.sourceforge.net

User Guide. For version 0.5, January Download the latest version from jnetmap.sourceforge.net User Guide For version 0.5, January 2011 Download the latest version from jnetmap.sourceforge.net Table of Contents Introduction...1 Quick Start...1 Opening and saving files...1 Passwords...1 Editing a

More information

Introduction CHAPTER1. Strongly Recommend: Guidelines that, if not followed, could result in an unusable application.

Introduction CHAPTER1. Strongly Recommend: Guidelines that, if not followed, could result in an unusable application. sg-midp20.book Page 1 Wednesday, May 14, 2003 1:27 PM CHAPTER1 Introduction MOBILE Information Device Profile (MIDP) defines the Java application environment for mobile information devices (MIDs), such

More information

One Device to Rule Them All: Controlling Household Devices with a Mobile Phone

One Device to Rule Them All: Controlling Household Devices with a Mobile Phone One Device to Rule Them All: Controlling Household Devices with a Mobile Phone William Shato Introduction This project was undertaken as part of a seminar course in Mobile Computing. While searching for

More information

Final Paper. Automation in Agile Testing. Vijay Kumar - Senior Software Engineer - Testing CenturyLink Technologies

Final Paper. Automation in Agile Testing. Vijay Kumar - Senior Software Engineer - Testing CenturyLink Technologies Final Paper Automation in Agile Testing Vijay Kumar - Senior Software Engineer - Testing CenturyLink Technologies Vijay.Kumar@CenturyLink.Com Abstract In any Agile Development methodology, automated testing

More information

Bangla Text Input and Rendering Support for Short Message Service on Mobile Devices

Bangla Text Input and Rendering Support for Short Message Service on Mobile Devices Bangla Text Input and Rendering Support for Short Message Service on Mobile Devices Tofazzal Rownok, Md. Zahurul Islam and Mumit Khan Department of Computer Science and Engineering, BRAC University, Dhaka,

More information

An UML-XML-RDB Model Mapping Solution for Facilitating Information Standardization and Sharing in Construction Industry

An UML-XML-RDB Model Mapping Solution for Facilitating Information Standardization and Sharing in Construction Industry An UML-XML-RDB Model Mapping Solution for Facilitating Information Standardization and Sharing in Construction Industry I-Chen Wu 1 and Shang-Hsien Hsieh 2 Department of Civil Engineering, National Taiwan

More information

A Communication Middleware with Unified Data Transmission Interface

A Communication Middleware with Unified Data Transmission Interface Communications and Network, 2013, 5, 34-38 doi:10.4236/cn.2013.51b009 Published Online February 2013 (http://www.scirp.org/journal/cn) A Communication Middleware with Unified Data Transmission Interface

More information

Voice Recognition Based Smart Home Control System

Voice Recognition Based Smart Home Control System International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 6, Issue 4 [April 2017] PP: 01-05 Voice Recognition Based Smart Home Control System Awadalla Taifour Ali 1, Eisa

More information

A Development Of A Web-Based Application System Of QR Code Location Generator and Scanner named QR- Location

A Development Of A Web-Based Application System Of QR Code Location Generator and Scanner named QR- Location UTM Computing Proceedings Innovations in Computing Technology and Applications Volume 2 Year: 2017 ISBN: 978-967-0194-95-0 1 A Development Of A Web-Based Application System Of QR Code Location Generator

More information

COPYRIGHTED MATERIAL. Part I: Getting Started. Chapter 1: Introducing Flex 2.0. Chapter 2: Introducing Flex Builder 2.0. Chapter 3: Flex 2.

COPYRIGHTED MATERIAL. Part I: Getting Started. Chapter 1: Introducing Flex 2.0. Chapter 2: Introducing Flex Builder 2.0. Chapter 3: Flex 2. 02671c01.qxd:02671c01 4/20/07 11:24 AM Page 1 Part I: Getting Started Chapter 1: Introducing Flex 2.0 Chapter 2: Introducing Flex Builder 2.0 Chapter 3: Flex 2.0 Basics Chapter 4: Using Flex Builder 2.0

More information

A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things

A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things Xuchao Chang, Chunhong Zhang, Li Sun Beijing University of Posts and Telecommunications, Beijing, 100876, China E-mail:

More information

User Interfaces for Web Sites and Mobile Devices. System and Networks

User Interfaces for Web Sites and Mobile Devices. System and Networks User Interfaces for Web Sites and Mobile Devices System and Networks Computer Systems and Networks: Device-Aware Interfaces Interfaces must take into account physical constraints of computers and networks:

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 5.1 Program Overview Contents About the Program Ekran Server & Management Tool Database Management Licensing Client Installation Monitoring Parameters Client Protection Advanced User Authentication

More information

THE CPU SPENDS ALMOST ALL of its time fetching instructions from memory

THE CPU SPENDS ALMOST ALL of its time fetching instructions from memory THE CPU SPENDS ALMOST ALL of its time fetching instructions from memory and executing them. However, the CPU and main memory are only two out of many components in a real computer system. A complete system

More information

BT Conference Call MeetMe

BT Conference Call MeetMe BT Conference Call MeetMe Create virtual meetings that deliver results BT MeetMe Web Tools Advanced User Guide BT MeetMe To join a BT MeetMe call online visit: www.conferencing.bt.com/meetme or for more

More information

Trusted Profile Identification and Validation Model

Trusted Profile Identification and Validation Model International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 1 (May 2013), PP. 01-05 Himanshu Gupta 1, A Arokiaraj Jovith 2 1, 2 Dept.

More information

Crash Course in Modernization. A whitepaper from mrc

Crash Course in Modernization. A whitepaper from mrc Crash Course in Modernization A whitepaper from mrc Introduction Modernization is a confusing subject for one main reason: It isn t the same across the board. Different vendors sell different forms of

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

OWASP Top 10 The Ten Most Critical Web Application Security Risks

OWASP Top 10 The Ten Most Critical Web Application Security Risks OWASP Top 10 The Ten Most Critical Web Application Security Risks The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain

More information

6.001 Notes: Section 15.1

6.001 Notes: Section 15.1 6.001 Notes: Section 15.1 Slide 15.1.1 Our goal over the next few lectures is to build an interpreter, which in a very basic sense is the ultimate in programming, since doing so will allow us to define

More information

MPML: A Multimodal Presentation Markup Language with Character Agent Control Functions

MPML: A Multimodal Presentation Markup Language with Character Agent Control Functions MPML: A Multimodal Presentation Markup Language with Character Agent Control Functions Takayuki Tsutsui, Santi Saeyor and Mitsuru Ishizuka Dept. of Information and Communication Eng., School of Engineering,

More information

WWW and Web Browser. 6.1 Objectives In this chapter we will learn about:

WWW and Web Browser. 6.1 Objectives In this chapter we will learn about: WWW and Web Browser 6.0 Introduction WWW stands for World Wide Web. WWW is a collection of interlinked hypertext pages on the Internet. Hypertext is text that references some other information that can

More information

Part I: Programming Access Applications. Chapter 1: Overview of Programming for Access. Chapter 2: Extending Applications Using the Windows API

Part I: Programming Access Applications. Chapter 1: Overview of Programming for Access. Chapter 2: Extending Applications Using the Windows API 74029c01.qxd:WroxPro 9/27/07 1:43 PM Page 1 Part I: Programming Access Applications Chapter 1: Overview of Programming for Access Chapter 2: Extending Applications Using the Windows API Chapter 3: Programming

More information

Miming navigation pages with a personal remote control device for the aged

Miming navigation pages with a personal remote control device for the aged Miming navigation pages with a personal remote control device for the aged Maria Teresa SEGARRA 1 and André THEPAUT Institut Telecom Telecom Bretagne Technopôle Brest-Iroise CS 83818 Brest Cedex 3 - France

More information

White Paper: Delivering Enterprise Web Applications on the Curl Platform

White Paper: Delivering Enterprise Web Applications on the Curl Platform White Paper: Delivering Enterprise Web Applications on the Curl Platform Table of Contents Table of Contents Executive Summary... 1 Introduction... 2 Background... 2 Challenges... 2 The Curl Solution...

More information

model (ontology) and every DRS and CMS server has a well-known address (IP and port).

model (ontology) and every DRS and CMS server has a well-known address (IP and port). 7 Implementation In this chapter we describe the Decentralized Reasoning Service (DRS), a prototype service implementation that performs the cooperative reasoning process presented before. We present also

More information

Suggestions for Visualising Physical Hyperlinks. Pasi Välkkynen PERMID Workshop, Dublin, May

Suggestions for Visualising Physical Hyperlinks. Pasi Välkkynen PERMID Workshop, Dublin, May Suggestions for Visualising Physical Hyperlinks Pasi Välkkynen PERMID Workshop, Dublin, May 7 2006 Contents Physical browsing and physical selection Visualisation challenges in physical browsing Visualisations

More information

RavenDB & document stores

RavenDB & document stores université libre de bruxelles INFO-H415 - Advanced Databases RavenDB & document stores Authors: Yasin Arslan Jacky Trinh Professor: Esteban Zimányi Contents 1 Introduction 3 1.1 Présentation...................................

More information

Web publishing training pack Level 3 Forms

Web publishing training pack Level 3 Forms Web publishing training pack Level 3 Forms Learning objective: Forms for submitting data - create and manage forms where data is saved in the Web Publishing System (e.g. questionnaire, registration, feedback).

More information

Developing Lightweight Context-Aware Service Mashup Applications

Developing Lightweight Context-Aware Service Mashup Applications Developing Lightweight Context-Aware Service Mashup Applications Eunjung Lee and Hyung-Joo Joo Computer Science Department, Kyonggi University, San 94 Yiui-dong, Suwon-si, Gyeonggy-do, South Korea ejlee@kyonggi.ac.kr,

More information

The goal of this book is to teach you how to use Adobe Integrated

The goal of this book is to teach you how to use Adobe Integrated Clearing the AIR The goal of this book is to teach you how to use Adobe Integrated Runtime (AIR) to create desktop applications. You can use JavaScript or ActionScript to develop AIR applications, and

More information

Enterprise Modernization for IBM System z:

Enterprise Modernization for IBM System z: Enterprise Modernization for IBM System z: Transform 3270 green screens to Web UI using Rational Host Access Transformation Services for Multiplatforms Extend a host application to the Web using System

More information

Dr. Shuang LIANG. School of Software Engineering TongJi University

Dr. Shuang LIANG. School of Software Engineering TongJi University Human Computer Interface Dr. Shuang LIANG School of Software Engineering TongJi University Today s Topics UI development and Trends NUI Discussion Today s Topics UI development and Trends Development Trends

More information

Konark - Writing a KONARK Sample Application

Konark - Writing a KONARK Sample Application icta.ufl.edu http://www.icta.ufl.edu/konarkapp.htm Konark - Writing a KONARK Sample Application We are now going to go through some steps to make a sample application. Hopefully I can shed some insight

More information

MEETING ISO STANDARDS

MEETING ISO STANDARDS WHITE PAPER MEETING ISO 27002 STANDARDS September 2018 SECURITY GUIDELINE COMPLIANCE Organizations have seen a rapid increase in malicious insider threats, sensitive data exfiltration, and other advanced

More information

Hello, and welcome to another episode of. Getting the Most Out of IBM U2. This is Kenny Brunel, and

Hello, and welcome to another episode of. Getting the Most Out of IBM U2. This is Kenny Brunel, and Hello, and welcome to another episode of Getting the Most Out of IBM U2. This is Kenny Brunel, and I'm your host for today's episode which introduces wintegrate version 6.1. First of all, I've got a guest

More information

DTV for Personalized Mobile Access and Unified Home Control

DTV for Personalized Mobile Access and Unified Home Control DTV for Personalized Mobile Access and Unified Home Control Jianlin Guo, Fernando Matsubara, Johnas Cukier, Haosong Kong Mitsubishi Electric Research Labs, 558 Central Avenue, Murray Hill, NJ 07974, USA

More information

JANUS EXPLORER. Janus Explorer Version 1.4 Quick Guide

JANUS EXPLORER. Janus Explorer Version 1.4 Quick Guide JANUS EXPLORER Version 1.4 Quick Guide Page 1 TABLE OF CONTENTS Introduction... 3 Installation... 3 Software Guide... 6 Send Commands... 8 Responses... 8 SMS and Dial... 8 Modem and SIM Details... 9 Phone

More information

SlipStream SP V4.0 Release Notes

SlipStream SP V4.0 Release Notes SlipStream SP V4.0 Release Notes SlipStream SP is the defacto standard in web and email acceleration, used by over 1000 ISPs around the world. SlipStream applies patented, proprietary compression technology

More information

Einführung in die Erweiterte Realität

Einführung in die Erweiterte Realität Einführung in die Erweiterte Realität - 7. Context Toolkit - Gudrun Klinker Dec. 2, 2003 Literature Anind K. Dey, Gregory D. Abowd, and Danieal Salber, A Conceptual Framework and a Toolkit for Supporting

More information