scispace - formally typeset
Search or ask a question

Showing papers on "Internet appliance published in 2006"


Patent
15 Nov 2006
TL;DR: In this paper, a system and methods are provided for facilitating the discovery of items, individuals, locations and business services that are relevant to the context of an individual (e.g., who an individual is, what the individual is looking for, where an individual was, the current time and/or date), facilitating post-discovery notifications (such as notifying the user or users), and executing postdiscovery actions such as making an offer to buy a product or prompting to add the user to an individual's personal network).
Abstract: Systems and methods are provided for facilitating the discovery of items, individuals, locations and business services that are relevant to the context of an individual (including, eg, who an individual is, what an individual is looking for, where an individual is, the current time and/or date), facilitating post-discovery notifications (such as notifying the user or users), and executing post-discovery actions (such as making an offer to buy a product or prompting to add the user to an individual's personal network) Accordingly, in implementations of the present invention, agents are configured by the individual and deployed to or by the individual's computerized device (eg, a mobile device, desktop computer, laptop computer, Internet appliance and/or server)

167 citations


Patent
16 Oct 2006
TL;DR: In this article, a mobile radio terminal (10), a message center (54), and an Internet server (58) are configured to allow a user of the mobile radio terminals to conduct an Internet search and view search results without subscribing to an Internet service offered by a communications service provider.
Abstract: A mobile radio terminal (10), a message center (54) and an Internet server (58) are configured to allow a user of the mobile radio terminal to conduct an Internet search and view search results without subscribing to an Internet service offered by a communications service provider. The Internet search is conducted using an exchange of text or multimedia messages.

100 citations


01 Jan 2006
TL;DR: This work has developed a freely available EAN-13 bar code recognition and information system that is both lightweight and fast enough for the use on camera equipped mobile phones, thus significantly lowering the barrier for large-scale, realworld testing of novel information and interaction applications based on ''connected'' physical objects.
Abstract: Automatic identification technology such as RFID promises to connect physical objects with virtual representations or even computational capabilities. However, even though RFID tags are continuously falling in price, their widespread use on consumer items is still several years away, rendering large-scale experiments with such an ''internet of things'' difficult. Much more ubiquitous are printed bar codes, yet so far their recognition required either specialized scanner equipment or custom-tailored bar codes an equally significant deployment hurdle. We have developed a freely available EAN-13 bar code recognition and information system that is both lightweight and fast enough for the use on camera equipped mobile phones, thus significantly lowering the barrier for large-scale, realworld testing of novel information and interaction applications based on ''connected'' physical objects. This demo presents our main contribution: A toolkit, consisting of a J2ME client for the barcode recognition on camera phones and a corresponding Java based server for linking the recognized product code to free and commercial databases on the internet, as well as two simple prototypical services (applications) based on this toolkit. With these tools, researchers can quickly develop fullfledged information and interaction applications based on EAN-13 product codes, and deploy them with a simple download to potentially large user bases in a much more effective manner than with the previously necessary special scanning equipment. We hope that this ''low tech'' version of bridging the gap will allow the community to quickly develop and try out more realistic and widespread applications, and thus gain real-world experiences for better jump-starting the future internet of things, today.

85 citations


Proceedings ArticleDOI
Guy Pujolle1
03 Oct 2006
TL;DR: This paper aims at defining and proposing an autonomic-oriented architecture to control the communications between these distributed things through network equipment.
Abstract: Electronic tags, usually refereed as RFIDs, sensors, wireless VoIP terminals are likely to create a technological and cultural revolution similar to the one initiated by the Internet technology in the early nineties. These very cheap components are manufactured by billions, and are going to be inserted in quite all our everyday objects. Internet of Things is a paradigm dealing with an architecture that enables such objects to exchange information through Internet, and therefore to conduct to T2T (thing to thing) communications. But due to their limited hardware and computing resources, things can?t natively handle IP connectivity. This paper aims at defining and proposing an autonomic-oriented architecture to control the communications between these distributed things through network equipment.

79 citations



Patent
15 Aug 2006
TL;DR: In this paper, a call negotiation scheme was proposed to identify and locate the other calling party in order to establish a voice communication channel over the Internet to a telephony or computer device.
Abstract: A method and system are disclosed in which an Internet subscriber can establish real-time voice conversations over the Internet. By performing a call negotiation scheme to identify and locate the other calling party, an Internet telephone can establish a voice communication channel over the Internet to a telephony or computer device.

55 citations


DOI
01 Jan 2006
TL;DR: This workshop looks at the fundamental interplay between security and underlying network architecture and seeks to chart a preliminary course for future work in this crucial research area.
Abstract: This is the report on a workshop held at CMU on July 12–14, 2005. The workshop is part of the planning process initiated by NSF to explore potential architectures for a next generation secure network designed to meet the needs of the 21st century. In considering future architectures, we ignore issues of backward compatibility with the current Internet but seek to benefit from the experience gained by analyzing both the strengths and weaknesses of the current design. Specifically, this workshop looks at the fundamental interplay between security and underlying network architecture and seeks to chart a preliminary course for future work in this crucial research area. This workshop focused on initiating a productive dialog between experts from the network security and network architecture communities. The agenda was arranged to stimulate initial consideration of the security goals for a new Internet, the design space of possible solutions, how research in security and network architecture could be integrated so that security is included as a first-tier objective in future architectures, and to explore methods for identifying and considering the social consequences of these architecture and security design choices.

41 citations


01 Jan 2006
TL;DR: In order to manage the net efficiently, the managing protocol RFID-MP was studied based on advantages of SNMP(Simple Network Management Protocol) and contributes to the design, information service and network management development of China Internet of Things.
Abstract: The development for Internet of Things was described.A feasible scheme was shown for China Internet of Things and its information services system(RFID-IS) was proposed.In order to manage the net efficiently,the managing protocol(RFID-MP) was studied based on advantages of SNMP(Simple Network Management Protocol).The research contributes to the design,information service and network management development of China Internet of Things.

27 citations


01 Jan 2006
TL;DR: It is argued that instead of acting as useful guide for network practitioners of all kinds, the principle function the architecture performs these days is to keep the fields of “networking” and “distributed systems” separate, to the detriment of both.
Abstract: Architecture. There’s a lot of it about. Do we need it? Recent years have seen considerable publishing activity in the area of “internet architecture”. This paper steps back and asks a more radical question: is an internet architecture a good thing at all? Are we at a point in the development of distributed communications systems where the concept should be replaced by a different way of dividing up the design space? This is not a paper about what the Right internetwork architecture should look like, but rather whether the very idea of a network architecture at this point in history is a help or hindrance in moving communication technology (and research in particular) forward. We first examine critically what the role of the internet architecture is today. We argue that instead of acting as useful guide for network practitioners of all kinds (as it has in the past), the principle function the architecture performs these days is to keep the fields of “networking” and “distributed systems” separate, to the detriment of both. Put simply, the internet architecture, and more broadly the concept of a network architecture, is now in the way. At the same time, trends in networking and computational hardware, and in particular in the kinds of testbeds available to researchers to validate their ideas, have made it both feasible and compelling to do research that finesses network architecture as an issue completely, and concentrates on the broader problem of building, deploying, and operating large-scale distributed applications. Fortunately, this does not render research into “internet architecture” irrelevant, but it does call for a respinning of many of the ideas in a different context. This paper concludes by examining the new research opportunities in the area, and how they relate to tradition challenges in “architecture”.

26 citations


Journal ArticleDOI
P.V. Mockapetris1
TL;DR: This paper discusses the impending merger of traditional telephone networks and the Internet via a new technology, called voice over Internet Protocol (VoIP), and suggests that DNS capabilities need to be strengthened to ensure they can meet the demands of ENUM and other new network technologies.
Abstract: This paper discusses the impending merger of traditional telephone networks and the Internet via a new technology, called voice over Internet Protocol (VoIP). A key issue that must be addressed is how to merge the respective databases of the two communication networks. With a new type of data record, called ENUM (electronic number), the legacy information of both telephony and the Internet can be accommodated and allow a phone number to be converted to an Internet address. DNS capabilities, however, first need to be strengthened to ensure they can meet the demands of ENUM and other new network technologies.

24 citations



Patent
12 May 2006
TL;DR: In this article, an Internet web operating system that uses the next dimension of an Internet program logic exchange that is embedded in the web site operating system and is working with Internet multiple requests and responses by using Internet multiple/multiplex server pages and is operating in an Internet control processor kernel.
Abstract: This is an Internet web operating system that uses the next dimension of an Internet program logic exchange that is embedded in the web site operating system and is working with Internet multiple requests and responses by using Internet multiple/multiplex server pages and is operating in an Internet control processor kernel.

Proceedings ArticleDOI
09 Nov 2006
TL;DR: Internet Gateway that consists of UPnP IGD IGD DCP (Internet Gateway Device) DCP(Device Control Protocol) and theUPnP Bridge for control electrical appliance of Internet home network is proposed.
Abstract: Electrical appliances of home network via the Internet can be controlled with the UPnP expansion like ones in the same home network without modification of existing UPnP. In this paper, we propose Internet Gateway that consists of UPnP IGD(Internet Gateway Device) DCP(Device Control Protocol) and the UPnP Bridge for control electrical appliance of Internet home network. UPnP IGD DCP is configurable initiation and sharing of Internet connections, advanced connection-management, management of host configuration, and supports transparent Internet access by non-UPnP-certified devices. UPnP Bridge searches for local home network devices by sending control messages. Control Point of UPnP Bridge searches for devices of interest on the Internet and can deliver the control devices on other home networks to device within its home network.With our approach, devices can control home electrical appliances via internet through IGD DCP on other home network with control commands of UPnP.

Patent
25 Jul 2006
TL;DR: In this article, a system for the provision of accountability for and blocking of Internet use of a selected computer user is proposed, which includes a computer which has Internet access blocked, a remote server, and a second computer at which an Accountability Partner communicates to the remote server such that Internet access is permitted to the person using the first computer.
Abstract: A system for the provision of accountability for and blocking of Internet use of a selected computer user. The system includes a computer which has Internet access blocked, a remote server, and a second computer at which an Accountability Partner communicates to the remote server, such that Internet access is permitted to the person using the first computer. The Internet access activity includes access of at least one Internet protocol from the group consisting of newsgroups, file sharing programs, file transfer programs, chat rooms, peer to peer chats cell phone or PDA transmissions, http, https, and electronic mail activity.

Journal Article
TL;DR: In this paper, the authors focused on providing a deeper insight into the Malaysian Internet users' behavior and adoption of browsing or purchasing products and services through the Internet. And they found that Internet/Non Internet Shopper and years of usage on the Internet was insignificant at 0.05 significance level.
Abstract: The rapid adoption of the Internet as a commercial tool has resulted in firms trying to do business in innovative ways of marketing in computer-mediated environments. As more businesses connect to the Internet, consumers will have wider choices in gathering products or services with respect to the latest information in a global online marketplace. This study focuses on providing a deeper insight into the Malaysian Internet users’ behaviour and adoption of browsing or purchasing products and services through the Internet. It was found that Internet/Non Internet Shopper and years of usage on the Internet was insignificant at 0.05 significance level. Thus, Malaysian Internet users’ who have just experienced browsing the Internet for just one year prior are also attracted to conduct online shopping. They are attracted to the Internet pull factors such as user friendliness and reliability of the products or services offered through the Internet.

Journal ArticleDOI
TL;DR: An insight is given into why people are interested and what is their attitude towards the use of Internet based information resources and Internet use.
Abstract: Investigators have made an attempt to explain the important aspects of Internet, the Internet being a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. Internet and Internet based information resources are essential to overcome the distance barrier in information explosion, and it also saves the time, when searching the literature in electronic form and allows to identify the resources. Presently, Internet based information resources are increasingly used for various purposes. The teachers, research scholars and students of higher education use Internet to keep themselves up to date. The present study explains / gives an insight into why people are interested and what is their attitude towards the use of Internet based information resources and Internet use.

Proceedings ArticleDOI
04 Dec 2006
TL;DR: The paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger; (2) phishing or fraud via e-mails; and (3) fake Websites.
Abstract: Mounting popularity of the Internet has led to the birth of instant messaging, an up-and-coming form of Internet communication. Instant messaging is very popular with businesses and individuals since it has instant communication ability. As a result, Internet security has become a pressing and important topic for discussion. Therefore, in recent years, a lot of attention has been drawn towards Internet security and the various attacks carried out by hackers over the Internet. People today often handle affairs via the Internet. For instance, instead of the conventional letter, they communicate with others by e-mails; they chat with friends through an instant messenger; find information by browsing Websites instead of going to the library; perform e-commerce transactions through the Internet, etc. Although the convenience of the Internet makes our life easier, it is also a threat to Internet security. For instance, a business email intercepted during its transmission may let slip business confidentiality; file transfers via instant messengers may also be intercepted, and then implanted with backdoor malwares; conversations via instant messengers could be eavesdropped. Furthermore, ID and password theft may lose us money when using Internet bank service. Attackers on the Internet use hacking tricks to damage systems while users are connected to the Internet. These threats along with possible careless disclosure of business information make instant messaging a very unsafe method of communication for businesses. The paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger; (2) phishing or fraud via e-mails; and (3) fake Websites

Patent
27 Dec 2006
TL;DR: In this paper, a method for displaying a real-time message on a mobile communication device is applied to a mobile communications device linked to the Internet by searching an Internet accessing device to link to the internet, automatically executing a navigating program, linking to an Internet server predetermined by the Internet, and displaying a page provided by the internet server.
Abstract: A method for displaying a real-time message on a mobile communication device is applied to a mobile communication device linked to the Internet. When the mobile communication device is linked to an access point or is turned on, a webpage or data navigating program is executed, and the contents provided by the Internet service supplier are displayed. Thereby, a real-time message is displayed, or a commercial promotion message is displayed to advertise a commercial activity. The method includes searching an Internet accessing device to link to the Internet, automatically executing a navigating program, linking to an Internet server predetermined by the Internet, and displaying a page provided by the Internet server. The page can include log in information, product marketing contents, or real-time information, personalized information, on-line shopping information or a personalized webpage of an online store.

Patent
30 Aug 2006
TL;DR: In this article, the authors propose a method and system for providing features for internet access at an internet appliance which go beyond the resource limitations of the internet appliance and adapt to memory and processor limitations.
Abstract: The invention provides a method and system for providing features for internet access at an internet appliance which go beyond the resource limitations of the internet appliance The desired features are primarily implemented on the server, and coupled to the internet appliance for display, responsive to the ability of the internet appliance to provide those features (1) The internet appliance and the server adapt to communication link limitations by dynamically adjusting picture quality or size for graphics to be displayed (2) The internet appliance and the server adapt to memory and processor limitations by dynamically running applets at the server and intercepting display functions of applets for display at the internet appliance (3) The internet appliance and the server adapt to memory and processor limitations by dynamically running editing programs or web pages at the server and by dynamically adjusting picture quality or size for graphics to be displayed

Patent
Luana Napoleoni1, Brie Olivier1
12 Dec 2006
TL;DR: In this paper, a system and method for automatically provisioning a composite telecommunications product comprising a plurality of sub-products or services in response to a single customer order are provided, for example, Internet Access (IA), Voice over Internet Protocol (VoIP), and Internet Protocol Television (IPTV) services bundled together as a single product.
Abstract: A system and method for automatically provisioning a composite telecommunications product comprising a plurality of sub-products or services in response to a single customer order are provided. A composite telecommunications product may comprise, for example, Internet Access (IA), Voice over Internet Protocol (VoIP), and Internet Protocol Television (IPTV) services bundled together as a single product. The present invention allows all three sub-products to be automatically provisioned in response to a single customer order for the composite product.

Journal ArticleDOI
01 Jan 2006
TL;DR: The radio industry has the opportunity now to amalgamate the internet on the cusp of its real, quantifiable penetration and diffusion into the culture.
Abstract: The advancement of technology is not limited anymore to merely the sophistication of the desktop PC. Integrated items such as wireless capacity to broadband connectivity to software intricacy have conspired to propel the rapid diffusion of the internet into all genres of life. As found through a review of literature and conceptual modelling, the true value of the internet might just be found in its complementary potential with traditional forms of product delivery channels, not its stand-alone wherewithal as a competitor. The radio industry has the opportunity now to amalgamate the internet on the cusp of its real, quantifiable penetration and diffusion into the culture. Station management can strategically leverage the internet to expand its demographic base and broaden advertising opportunities.

Proceedings ArticleDOI
29 Aug 2006
TL;DR: The traffic between every service device has been studied and different elements about users' behaviour have been analyzed and the conclusions are essential to improve the configuration of one of these services.
Abstract: The increase in the number of web-pages where links to Internet-radios are offered has made these services one of the most popular in nowadays Internet. This popularity has motivated the interest of the scientific community and a lot of research has been carried out in order to improve and study these services. This paper presents the analysis of the Internet-radio hosted by the www.asturies.com digital newspaper. The study has been performed thanks to a log database stored over a period of almost two years. The traffic between every service device has been studied and different elements about users? behaviour have been analyzed. The conclusions are essential to improve the configuration of one of these services. Service models for Internet-radio services can be developed and help managers to test different configurations or predict future situations, avoiding problems in advance.

Proceedings ArticleDOI
01 Nov 2006
TL;DR: This paper presents a low complexity solution for proving triple play services as it enables integrating different applications so that each received the service it requires, possibly in a guaranteed fashion, while ensuring high resource utilization efficiency.
Abstract: The Internet has the potential to become the ubiquitous and universal means of accessing any type of information, whether pulled by the user or pushed by a provider. However, in order to be the infrastructure of choice for this role, the Internet must represent a business opportunity to information providers or, at least, be economically self-sustainable. In other words, Internet technology must support services in such a way that both people are willing to pay for them and the cost of delivering them is low. The former implies that services, besides being appealing, must be reliable and of reasonably high and persistent quality. The latter requires low complexity technological solutions and convergence to a single network infrastructure that supports, in an integrated manner, traditional Internet applications (e.g., web, e-mail, and file sharing), telephony, and video, a.k.a. triple play. Since today's solutions resort to overprovisioning to satisfy the quality requirements, they fail to minimize costs due to low resource utilization efficiency. This paper presents a low complexity solution for proving triple play services as it enables integrating different applications so that each received the service it requires, possibly in a guaranteed fashion, while ensuring high resource utilization efficiency.

Patent
23 Jan 2006
TL;DR: In this paper, a transaction-enabling Java-applet is embedded within an HTML-encoded document stored in an HTTP server at a predetermined URL, and the corresponding HTTP document is automatically accessed and displayed at the terminal and initiated for execution so that the customer, consumer or client desiring the transaction can simply and conveniently conduct information-related transaction over the Internet.
Abstract: A novel transaction-enabling method and system are disclosed, wherein a transaction-enabling Java-Applet is embedded within an HTML-encoded document stored in an HTTP server at predetermined URL. When a code symbol (e.g., magstripe or bar code) encoded with the URL is read using a code symbol reader interfaced with a Java-enabled Internet terminal, the corresponding HTTP document is automatically accessed and displayed at the terminal, and the transaction-enabling Java-Applet initiated for execution so that the customer, consumer or client desiring the transaction can simply and conveniently conduct the information-related transaction over the Internet. The transaction-enabling Internet terminal can be in the form of an Internet kiosk installed in a public location, in the manner as conventional ATMs. By virtue of the present invention, universal transaction machine (UTMs) can be easily deployed for use by the mass population so that they can easily conduct various types of transaction over the Internet.

ReportDOI
01 Jan 2006
TL;DR: This paper provides a framework for network-supported synchronous multimedia groupwork at Internet scope and for large user groups and involves an novel classification for such systems concerning scale and scope of interaction.
Abstract: : Despite significant proliferation of Internet services in recent years, technology for computer-supported cooperative work and groupware have not progressed at the same rate. A wider distribution of the work force motivates the need for networked multimedia and groupware at Internet scope and for larger groups of end-users. In particular, synchronous telecollaboration enables people in different geographic locations to bridge time and space by sharing and jointly manipulating multimedia information in realtime and at various levels of granularity. This aspect stands in contrast to legacy client-server applications such as Internet radio broadcast or video-on-demand, and to asynchronous, document-centric collaboration tools like email, instant messaging, or chat rooms. In this paper, we provide a framework for network-supported synchronous multimedia groupwork at Internet scope and for large user groups. Contributions entail an novel classification for such systems concerning scale and scope of interaction, a formal framework for Internet sessions and mediation of access to concurrently shared resources, a taxonomy of crucial elements in cooperative applications, and a discussion of a generic network coordination protocol to sustain live interaction among concurrently active user groups. The core ideas put forward in this paper are useful for the characterization and rapid prototyping of a new generation of collaborative applications.

Proceedings ArticleDOI
K. Kanno1, N. Fernando1, A. Bolhassan1, S. Narita1, Michael Cohen1 
25 Mar 2006
TL;DR: The Internet Chair, a novel internet appliance, is a pivot (swivel, rotating) chair deployed as an output device, a rotary motion-platform information appliance, dynamically aligning haptic display with wireless visual displays and spatial audio in rotation-invariant virtual spaces.
Abstract: We have developed second-generation prototypes of the Internet Chair, a novel internet appliance. The first generation explored using the chair as an input device; i°S chaire,i± the prototype employed here, is a pivot (swivel, rotating) chair deployed as an output device, a rotary motion-platform information appliance, dynamically aligning haptic display with wireless visual displays and spatial audio in rotation-invariant virtual spaces. As a haptic output modality, chairs with servomotors render kinesthetic and proprioceptive cues, twisting under networked control, to direct the attention of a seated subject orienting seated users like a i°dark ridei± amusement park attraction or under active user control, local or distributed. Using its audio display modality, i°nearphonesi± embedded in the seat headrest, the system can present unencumbered binaural sound with soundscape stabilization for multichannel sound image localization. In groupware situations like teleconferencing, chat spaces, or multiplayer gaming, such orientation is also synchronized with panoramic or turnoramic displays or twisting iconic representations of the users, avatars in virtual spaces, enabling social situation awareness. The S chaire, manifesting as personal LBE (location-based entertainment), can be used in both stand-alone and networked applications.We have developed several clients that exploit such i°practically panoramici± capability, including simulators, games, and 360¢a browsers, providing sensory-integrated multimodal applications, variously including stereographic or mobile features.


Patent
20 Dec 2006
TL;DR: In this article, the authors present a method and an apparatus for providing an Internet service to a home network, which enables a user to use the Internet service by utilizing a device, in which a web browser is not installed.
Abstract: Provided are a method and an apparatus for providing an Internet service to a home network. The method enables a user to use the Internet service by utilizing a device, in which a web browser is not installed, by representing the Internet service as a virtual home network device, receiving a control request for the virtual home network device from a home network controller, and processing the control request linked with a server providing the Internet service.

Patent
17 Oct 2006
TL;DR: In this article, an Internet appliance accesses an HTML page on a Web site containing configuration information for the appliance, such as an Internet compatible telephone, and the data from the HTML page are downloaded to the appliance to modify its options or settings automatically upon accessing the HTML web page, or as directed by the user.
Abstract: An Internet appliance accesses an HTML page on a Web site containing configuration information for the appliance, such as an Internet compatible telephone. Data from the HTML page are downloaded to the appliance to modify its options or settings automatically upon accessing the HTML page, or as directed by the user. The data may be downloaded to a programmable memory in the Internet appliance and the stored data may be used to upgrade the appliance. The upgrade HTML page may include information to alert the user when the new information is available regarding changes to options and settings of the appliance. Alternatively, data from the Internet appliance are placed in an HTML page and the data are then uploaded to the Web site. Additional embodiments provide other functions that may be placed in an HTML page to effect some internal action in the Internet appliance, such as checking e-mail.

Book ChapterDOI
TL;DR: There are many reasons examined here why the wireless Internet and LBS have not expanded more rapidly, not the least of which was the development of a wireless infrastructure.
Abstract: Although the wireless Internet is a natural and inevitable progression from the wired Internet, the two developed much differently. The wired Internet was based on existing personal computer and workstation technology that had begun in the early 1980s. Over 1.3 billion computers were already in use when the World Wide Web was introduced a decade later. The browser software was free and no additional hardware was required — beside the use of a modem for connection purposes. The Web was quickly applied for all sorts of information delivery and its use expanded rapidly. In contrast, the development of the mobile Internet is hindered by a number of factors, not the least of which was the development of a wireless infrastructure. To fund its development, commercial companies devised new services that would generate revenue. One such revenue scheme was Location Based Services (LBS), a model for informing the mobile phone user where they are currently located and what services are available in the surrounding area. For a variety of reasons, LBS has not grown as quickly as had been predicted. While one might blame the small display, there are many reasons examined here why the wireless Internet and LBS have not expanded more rapidly.