29,031 research outputs found
Classifying public display systems: an input/output channel perspective
Public display screens are relatively recent additions to our world, and while they may be as simple as a large screen with minimal input/output features, more recent developments have introduced much richer interaction possibilities supporting a variety of interaction styles. In this paper we propose a framework for classifying public display systems with a view to better understanding how they differ in terms of their interaction channels and how future installations are likely to evolve. This framework is explored through 15 existing public display systems which use mobile phones for interaction in the display space
Single Value Devices
We live in a world of continuous information overflow, but the quality of information and communication is suffering. Single value devices contribute to the information and communication quality by fo- cussing on one explicit, relevant piece of information. The information is decoupled from a computer and represented in an object, integrates into daily life. However, most existing single value devices come from conceptual experiments or art and exist only as prototypes. In order to get to mature products and to design meaningful, effective and work- ing objects, an integral perspective on the design choices is necessary. Our contribution is a critical exploration of the design space of single value devices. In a survey we give an overview of existing examples. The characterizing design criteria for single value devices are elaborated in a taxonomy. Finally, we discuss several design choices that are specifically important for moving from prototypes to commercializable products
Classification of logical vulnerability based on group attacking method
New advancement in the field of e-commerce software technology has also brought many benefits, at the same time developing process always face different sort of problems from design phase to implement phase. Software faults and defects increases the issues of reliability and security, thatâs reason why a solution of this problem is required to fortify these issues. The paper addresses the problem associated with lack of clear component-based web application related classification of logical vulnerabilities through identifying Attack Group Method by categorizing two different types of vulnerabilities in component-based web applications. A new classification scheme of logical group attack method is proposed and developed by using a Posteriori Empirically methodology
Instrumentational complexity of music genres and why simplicity sells
Listening habits are strongly influenced by two opposing aspects, the desire
for variety and the demand for uniformity in music. In this work we quantify
these two notions in terms of musical instrumentation and production
technologies that are typically involved in crafting popular music. We assign a
"complexity value" to each music style. A style is complex if it shows the
property of having both high variety and low uniformity in instrumentation. We
find a strong inverse relation between variety and uniformity of music styles
that is remarkably stable over the last half century. Individual styles,
however, show dramatic changes in their "complexity" during that period. Styles
like "new wave" or "disco" quickly climbed towards higher complexity in the 70s
and fell back to low complexity levels shortly afterwards, whereas styles like
"folk rock" remained at constant high complexity levels. We show that changes
in the complexity of a style are related to its number of sales and to the
number of artists contributing to that style. As a style attracts a growing
number of artists, its instrumentational variety usually increases. At the same
time the instrumentational uniformity of a style decreases, i.e. a unique
stylistic and increasingly complex expression pattern emerges. In contrast,
album sales of a given style typically increase with decreasing complexity.
This can be interpreted as music becoming increasingly formulaic once
commercial or mainstream success sets in.Comment: 17 pages, 5 figures, Supporting Informatio
Survey and Systematization of Secure Device Pairing
Secure Device Pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet
of Things (IoT) devices. Comparison and assessment of SDP schemes is
troublesome, because each scheme makes different assumptions about out-of-band
channels and adversary models, and are driven by their particular use-cases. A
conceptual model that facilitates meaningful comparison among SDP schemes is
missing. We provide such a model. In this article, we survey and analyze a wide
range of SDP schemes that are described in the literature, including a number
that have been adopted as standards. A system model and consistent terminology
for SDP schemes are built on the foundation of this survey, which are then used
to classify existing SDP schemes into a taxonomy that, for the first time,
enables their meaningful comparison and analysis.The existing SDP schemes are
analyzed using this model, revealing common systemic security weaknesses among
the surveyed SDP schemes that should become priority areas for future SDP
research, such as improving the integration of privacy requirements into the
design of SDP schemes. Our results allow SDP scheme designers to create schemes
that are more easily comparable with one another, and to assist the prevention
of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications
Surveys & Tutorials 2017 (Volume: PP, Issue: 99
- âŚ