scispace - formally typeset
Search or ask a question

Showing papers on "Personal computer published in 2002"


Patent
18 Nov 2002
TL;DR: In this paper, a system for integrating video programming with the vast information resources of the Internet is presented, where the web pages are synchronized to the video content for display in conjunction with a television program being broadcast to the user at that time.
Abstract: A system for integrating video programming with the vast information resources of the Internet. A computer-based system receives a video program with embedded uniform resource locators (URLs). The URLs, the effective addresses of locations or Web sites on the Internet, are interpreted by the system and direct the system to the Web site locations to retrieve related Web pages. Upon receipt of the Web pages by the system, the Web pages are synchronized to the video content for display. The video program signal can be displayed on a video window on a conventional personal computer screen. The actual retrieved Web pages are time stamped to also be displayed, on another portion of the display screen, when predetermined related video content is displayed in the video window. As an alternative, the computer-based system receives the URLs directly through an Internet connection, at times specified by TV broadcasters in advance. The system interprets the URLs and retrieves the appropriate Web pages. The Web pages are synchronized to the video content for display in conjunction with a television program being broadcast to the user at that time. This alternative system allows the URLs to be entered for live transmission to the user.

1,504 citations


Patent
17 Apr 2002
TL;DR: A multimedia production and distribution system collects or assembles a media production (such as, a news program, television programming, or radio broadcast) from a variety of sources, including television stations and other media hosting facilities.
Abstract: A multimedia production and distribution system collects or assembles a media production (such as, a news program, television programming, or radio broadcast) from a variety of sources, including television stations and other media hosting facilities. The media production is categorized and indexed for retrieval and distribution across a wired or wireless network, such as the Internet, to any client, such as a personal computer, television, or personal digital assistant. A user can operate the client to display and interact with the media production, or select various options to customize the transmission or request a standard program. Alternatively, the user can establish a template to generate the media production automatically based on personal preferences. The media production is displayed on the client with various media enhancements to add value to the media production. Such enhancements include graphics, extended play segments, opinion research, and URLs. The enhancements also include advertisements, such as commercials, active banners, and sponsorship buttons. An advertisement reporting system monitors the sale and distribution of advertisements within the network. The advertisements are priced according to factors that measure the likelihood of an advertisement actually being presented or viewed by users most likely to purchase the advertised item or service. The advertisement reporting system also collects metrics to invoice and apportion income derived from the advertisements among the network participants, including a portal host and/or producer of the content.

733 citations


Journal ArticleDOI
TL;DR: SHAPE, a package of programs for evaluating biological contour shapes based on Elliptic Fourier descriptors, is presented, which can easily analyze shapes on a personal computer without special knowledge about the procedures related to the method.
Abstract: Quantitative evaluation of the shapes of biological organs is often required in various research fields, such as agronomy, medicine, genetics, ecology, and taxonomy. Elliptic Fourier descriptors (EFDs), proposed by Kuhl and Giardina (1982), can delineate any type of shape with a closed two-dimensional contour and have been effectively applied to the evaluation of various biological shapes in animals (Bierbaum and Ferson 1986; Diaz et al. 1989; Ferson et al. 1985; Rohlf and Archie 1984) and plants (Furuta et al. 1995; Iwata et al. 1998; McLellan 1993; Ohsawa et al. 1998; White et al. 1988). Quantization of shapes is a prerequisite for evaluating the inheritance of morphological traits in quantitative genetics. There are many reports showing that measurements based on EFDs are helpful for such quantization of the shapes of plant and animal organs. For instance, Iwata et al. (2000) conducted a diallele analysis of the shape of Japanese radish (Raphanus sativus L.) roots, using the principal component scores of the EFDs as shape characteristics. Quantitative trait loci (QTL) analysis has also been conducted using the principal component scores of EFDs concerning the shape of the male genitalia of Drosophila species (Laurie et al. 1997; Liu et al. 1996). The shape evaluation method based on EFDs can be a powerful tool for analyzing biological shapes, but it is not easy for a researcher to use this method because it involves several complex procedures, such as image processing, contour recording, derivation of the descriptors, and multivariate analysis of the descriptors. In this article we present SHAPE, a package of programs for evaluating biological contour shapes based on EFDs. This package contains programs for image processing, contour recording, derivation of EFDs, principal component analysis of EFDs, and visualization of shape variations estimated by the principal components. With the aid of this package, a researcher can easily analyze shapes on a personal computer without special knowledge about the procedures related to the method. The principal component scores obtained by the procedures can be used directly as observed values of shape characteristics for the subsequent analyses. SHAPE is characterized by the following features: (1) The packaged programs are easily operated with the aid of a graphical user interface (GUI); (2) No special computer devices for image processing are required; (3) A large number of samples (say 1,000) can be treated; (4) The scores of principal components are stored in tabbed text format files and can be easily exported for analysis by other software; and (5) The variations in shape accounted for by the principal components can be visualized and printed out.

713 citations


Journal ArticleDOI
TL;DR: In this article, a longitudinal study of Andy Grove's tenure as Intel Corporation's chief executive officer (CEO) documents how he moved Intel's strategy-making process from an internal-ecology model to the classical rational-actor model during 1987-1998.
Abstract: To examine the consequences of a period of extraordinary success for the long-term adaptive capability of a firm's strategy-making process, this comparative longitudinal study of Andy Grove's tenure as Intel Corporation's chief executive officer (CEO) documents how he moved Intel's strategy-making process from an internal-ecology model to the classical rational-actor model during 1987-1998. His creation of a highly successful strategy vector pursued through an extremely focused induced-strategy process led to coevolutionary lock-in with the personal computer market segment, in which Intel's strategy making became increasingly tied to its existing product market. Intracompany analysis of four new business development cases highlights the inertial consequences of coevolutionary lock-in. The paper examines implications of coevolutionary lock-in in terms of its effect on balancing induced and autonomous strategy processes and exploitation and exploration in organizational learning.

708 citations


Patent
20 Feb 2002
TL;DR: A modular personal network (MPN) as discussed by the authors is a set of devices that may be worn, carried, or used in close proximity to a user, including a control unit, a display, a user input and an audio output.
Abstract: We have disclosed a modular personal network (MPN) that includes multiple devices that may be worn, carried, or used in close proximity to a user. The devices communicate wirelessly. Functions of the MPN may be modified by adding or removing components. The MPN may communicate with a personal computer. General purpose devices may include a control unit, a display, a user input, and an audio output. The MPN may provide a variety of functions, including time, communication, entertainment, organization, guidance, athletic, medical, travel, outdoors, identity, security and military. The wireless protocol is preferrably based on the Bluetooth or IEEE 802.15 standards.

522 citations


Patent
21 Oct 2002
TL;DR: In this paper, improved techniques for interaction between a host computer and a media player are discussed, such as automatic synchronization of media contents stored on the media player with media contents on the host computer.
Abstract: Improved techniques for interaction between a host computer (e.g., personal computer) and a media player are disclosed. According to one aspect, interaction between a host computer and a media player, such as automatic synchronization of media contents stored on a media player with media contents stored on a host computer, can be restricted. According to another aspect, management of media items residing on a media player can be performed at and by a host computer for the media player. According to still another aspect, media content can be played by a media player in accordance with quality settings established for the media content at the host computer.

480 citations


Journal ArticleDOI
TL;DR: An efficient moving object segmentation algorithm suitable for real-time content-based multimedia communication systems is proposed and a processing speed of 25 QCIF fps can be achieved on a personal computer with a 450-MHz Pentium III processor.
Abstract: An efficient moving object segmentation algorithm suitable for real-time content-based multimedia communication systems is proposed in this paper. First, a background registration technique is used to construct a reliable background image from the accumulated frame difference information. The moving object region is then separated from the background region by comparing the current frame with the constructed background image. Finally, a post-processing step is applied on the obtained object mask to remove noise regions and to smooth the object boundary. In situations where object shadows appear in the background region, a pre-processing gradient filter is applied on the input image to reduce the shadow effect. In order to meet the real-time requirement, no computationally intensive operation is included in this method. Moreover, the implementation is optimized using parallel processing and a processing speed of 25 QCIF fps can be achieved on a personal computer with a 450-MHz Pentium III processor. Good segmentation performance is demonstrated by the simulation results.

441 citations


Journal ArticleDOI
TL;DR: An algorithm for reconstructing three-dimensional structure and motion causally, in real time from monocular sequences of images is described and it is proved that the algorithm is minimal and stable, in the sense that the estimation error remains bounded with probability one throughout a sequence of arbitrary length.
Abstract: We describe an algorithm for reconstructing three-dimensional structure and motion causally, in real time from monocular sequences of images. We prove that the algorithm is minimal and stable, in the sense that the estimation error remains bounded with probability one throughout a sequence of arbitrary length. We discuss a scheme for handling occlusions (point features appearing and disappearing) and drift in the scale factor. These issues are crucial for the algorithm to operate in real time on real scenes. We describe in detail the implementation of the algorithm, which runs on a personal computer and has been made available to the community. We report the performance of our implementation on a few representative long sequences of real and synthetic images. The algorithm, which has been tested extensively over the course of the past few years, exhibits honest performance when the scene contains at least 20-40 points with high contrast, when the relative motion is "slow" compared to the sampling frequency of the frame grabber (30 Hz), and the lens aperture is "large enough" (typically more than 30/spl deg/ of visual field).

359 citations


Journal ArticleDOI
TL;DR: IB-IVUS represents a new and useful tool for evaluating the tissue structure of human coronary arterial plaques and revealed that the surface color of plaques in angioscopy reflected the thickness of the fibrous cap rather than the size of the lipid core.
Abstract: Background— The purpose of the present study was to define whether integrated backscatter (IB) combined with conventional intravascular ultrasound (IVUS) makes tissue characterization of coronary arterial plaques possible. Methods and Results— IB-IVUS was performed in coronary arteries (total 18 segments) of 9 patients at autopsy, and the findings were compared with the histology. RF signals, which were digitized at 2 GHz in 8-bit resolution, were obtained with an IVUS system with a 40-MHz catheter. IB values of the RF signal from the region of interest (ROI) (100-μm depth, 1.4° per line) were calculated by use of a personal computer. IB values on the ROIs were divided into 5 categories, compared with each of the plaque histologies: category 1 (thrombus), −88 < IB ≤ −80; category 2 (intimal hyperplasia or lipid core), −73 < IB ≤ −63; category 3 (fibrous tissue), −63 < IB ≤ −55; category 4 (mixed lesions), −55 < IB ≤ −30; and category 5 (calcification), −30 < IB ≤ −23. On the basis of these categories, we ...

334 citations


Patent
17 Oct 2002
TL;DR: In this paper, the authors present a remote gaming system where a player can gamble against a wagering establishment or state-run lottery from a remote location on a personal computer or portable computer device where it is unnecessary to establish an on-line connection with a host computer associated with the WAGER.
Abstract: A remote gaming system whereby a player can gamble against a wagering establishment or state-run lottery from a remote location on a personal computer or portable computer device where it is unnecessary to establish an on-line connection with a host computer associated with the wagering establishment, the gaming computer having associated gaming software for providing at least one wagering opportunity and enabling the player to obtain gambling credit and cash-out any resulting winnings, the host computer enabling the player to purchase and redeem gambling credit at the remote location in one embodiment of the invention using cryptographic protocols such as through a series of authenticatable message exchanges between the player and the wagering establishment, the gaming computer and the host computer directly on-line, or the gaming computer having a detachable tamper-resistant or tamper-evident credit module associated therewith or for use with a personal computer being provided to the player with preinstalled or preloaded gambling credit, the gaming system also enabling participation in future events of which the outcome is uncertain such as, for example, a lottery whereby the player makes selections on a gaming computer at a remote location.

312 citations


Patent
17 Oct 2002
TL;DR: In this article, the authors propose a system for grouping and navigating media files within a playlist on a computer-readable medium, based on a grouping criterion to define a group from the media files.
Abstract: Grouping and navigating media files within a playlist on a computer-readable medium. Software according to the invention selects one or more media files according to a grouping criterion to define a group from the media files. The defined group references the selected media files. The invention software generates a group header associated with the group. The group header includes a value identifying the defined group and a reference to another group to enable navigation. The invention software stores the selected media files, the playlist, the defined groups, and the associated group headers on a computer-readable medium. The invention software also includes playback software for navigating and selecting media files via groups within a playlist. In one embodiment, the invention is operable as part of a compressed media format having a set of small files containing metadata, menus, and playlists in a compiled binary format designed for playback on feature-rich personal computer media players as well as low cost media players.

Patent
22 Oct 2002
TL;DR: A programmable and expandable building automation and control system (10) includes a system platform that supports interchangeable smart card (12), security card (22), power supply card (24), telephone/voice/modem card (26), HVAC relay control (62), auxiliary relay control(66), power (80), telephone interface (30), sensor analog inputs (32), smoke detector interface (54), siren/strobe output (80) tamper loop (52), protected peripheral power supply (72), PLC communication protocol interface (18), RS 232 communication interface (
Abstract: A programmable and expandable building automation and control system (10)includes a system platform supports interchangeable smart card (12), security card (22), power supply card (24), telephone/voice/modem card (26), HVAC relay control (62), auxiliary relay control (66), power (80), telephone interface (30), sensor analog inputs (32), smoke detector interface (54), siren/strobe output (80), tamper loop (52), protected peripheral power supply (72), switched peripheral power supply (74), PLC communication protocol interface (18), RS 232 communication interface (14), RS 485 communication interface (16), touchscreen user interface (28), and 'smart' key interface (34) via 'smart' key (104). In addition to touchscreen and smart key interface, user-interface with system (10) is accommodated via telephone, personal computer or personal digital assistant, or through infrared or radio frequency transmission.

Patent
17 Oct 2002
TL;DR: In this paper, an adaptive menu structure for media files is presented. But it is not shown on a display associated with a media player as a function of a media type associated with the media player.
Abstract: Creating and displaying an adaptive menu structure for media files. The invention includes authoring software to create the menu structure to enable a user to navigate the media files using a media player. The invention also includes filtering software to adapt the created menu structure to display menu information on a display associated with the media player as a function of a media type associated with the media player. In one embodiment, the invention is operable as part of a compressed media format having a set of small files containing metadata, menus, and playlists in a compiled binary format designed for playback on feature-rich personal computer media players as well as low cost media players.

Journal ArticleDOI
TL;DR: In the summer of 1998, a program of aerial photography was carried out at the main site of the Surface Heat Budget of the Arctic Ocean (SHEBA) program at altitudes ranging from 1220 to 1830 m as mentioned in this paper.
Abstract: [1] During spring and summer, the Arctic pack ice cover undergoes a dramatic change in surface conditions, evolving from a uniform, reflective surface to a heterogeneous mixture of bare ice, melt ponds, and leads. This transformation is accompanied by a significant decrease in areally averaged, integrated albedo. The key factors contributing to this reduction in albedo are the melting of the snow cover, the formation and growth of the melt ponds, and the increase in the open water fraction. To document these changes and enable quantification of the evolution of the ponds throughout the melt season, a program of aerial photography was carried out at the main site of the Surface Heat Budget of the Arctic Ocean (SHEBA) program. A modified square pattern, 50 km on a side, surrounding the SHEBA site was flown at altitudes ranging from 1220 to 1830 m. Twelve of these aerial survey photography flights were completed between 20 May and 4 October 1998. The flights took place at approximately weekly intervals at the height of the melt season, with occasional gaps as long as 3 weeks during August and September due to persistent low clouds and fog. In addition, flights on 17 May and 25 July were flown in a closely spaced pattern designed to provide complete photo coverage of a 10-km square centered on the SHEBA main site. Images from all flights were scanned at high resolution and archived on CD-ROMs. Using personal computer image processing software, we have measured ice concentration, melt pond coverage, statistics on size and shape of melt ponds, lead fraction, and lead perimeter for the summer melt season. The ponds began forming in early June, and by the height of the melt season in early August the pond fraction exceeded 0.20. The temporal evolution of pond fraction displayed a rapid increase in mid-June, followed by a sharp decline 1 week later. After the decline, the pond fraction gradually increased until mid-August when the ponds began to freeze. By mid-September the surface of virtually all of the ponds had frozen. The open water fraction varied between 0.02 and 0.05 from May through the end of July. In early August the open water fraction jumped to 0.20 in just a few days owing to ice divergence. Melt ponds were ubiquitous during summer, with number densities increasing from 1000 to 5000 ponds per square kilometer between June and August.

Patent
06 Sep 2002
TL;DR: In this article, a DSP (12) coupled with data storage (32) is a high-volume storage device such as hard drive for storing audio data files, and a method for providing audio playlist files (90) is presented.
Abstract: A digital audio player (10) and a method for providing audio playlist files (90). The audio data player (10) comprises a DSP (12) coupled with data storage (32). Data storage (32) is a high-volume storage device such a hard drive for storing audio data files. The method provides playlist records (92) in a playlist file (90) for use by audio data player (10) by locating audio data files stored on data storage (32), reading content information for the audio data files, determining file pointers locating the audio data files, sorting the content information and file pointers by at least a portion of the content information, determining indexing information indicating the location and number of playlist records related by content information, and storing the content information, indexing information and file pointers in playlist records (92) in a playlist (90). The method includes creating a number of playlist files, each sorted by different content information such as ID3 tag information stored in MP3 files, for example, artist, album, genre, and title. Additionally, the method may be executed in a personal computer (80) as a stand-alone application or as a plug-in used with existing music management software. Created playlists may then be transferred to an audio data player (10).

Patent
18 Jun 2002
TL;DR: In this article, an additional data frame in the information segment storing one or more audio data files, or "audio tag files" was introduced. But the structure of the audio tag files may be altered prior to storing in the audio data file.
Abstract: A digital audio player ( 10 ) and a method for processing encoded digital audio data. The audio data player has a hard disk or other data storage medium ( 32 ) for storing data files, a microcontroller ( 22 ), buffer memory ( 25 ) for anti-skip protection, and an audio decoder ( 12 ). The encoded audio data files and associated decoder files are downloaded from a personal computer or similar device to the audio data player hard drive ( 32 ). The data structure generally includes a first audio data file having an information segment and an audio data segment. The information segment, generally called a tag, may include textual and graphic information related to the audio data segment. The present invention further includes an additional data frame in the information segment storing one or more audio data files, or “audio tag files”. The audio tag files stored in the information segment include encoded audible or voice recordings that vocalize other tag information related to the audio data segment. The informational audio tag files can be created by processing textual tag information with a text-to-voice converter, or by downloading the informational audio tag files from a server or the Internet. To prevent a data processing device, from inadvertently recognizing the informational audio tag files as stand-alone audio data files, the data structure of the audio tag files may be altered prior to storage in the audio data file.

Patent
14 Mar 2002
TL;DR: In this article, a biometric access control and time and attendance system comprises an integrated network including one or more remote access devices in electronic communication with a computer database, each remote access device comprises a silicon chip-based system and preferably includes a Biometric input device, a liquid crystal display (LCD), computer processing capabilities based on embedded system architecture with configurable system-on-chip (CSOC) technology, and an electrical output for controlling a door lock or the like.
Abstract: A biometric access control and time and attendance system comprises an integrated network including one or more remote access devices in electronic communication with a computer database. Each remote access device comprises a silicon chip based system and preferably includes a biometric input device, a liquid crystal display (LCD), computer processing capabilities based on embedded system architecture with configurable system-on-chip (CSOC) technology, and an electrical output for controlling a door lock or the like. The use of CSOC architecture in lieu of conventional personal computer technology (e.g. mother boards, hard drives, video controllers and the like) allows for a more compact and cost efficient design. A plurality of remote access devices is configured for communication with a primary computer database wherein data corresponding to biometric samples for all authorized users is stored. In an embodiment wherein the biometric input devices comprise fingerprint scanners, the devices are configured to facilitate fingerprint identification by incorporating an auto-targeting capability that enables the user to simply place his or her finger on the fingerprint scanner whereafter the system adjusts the scanned image by automatically shifting the scanned image data to a properly targeted position thereby enabling the system compare the scanned print to the biometric samples in the system's data storage memory. Auto-targeting capability eliminates the requirement for manual targeting present in systems of the background art thereby improving system performance and minimizing reliance on human interaction. The present invention contemplates the use of auto-targeting with other biometric systems, such as facial recognition and/or retinal scanning systems, or any other biometric identification technology.

Patent
Ryan Steelberg, Chad Steelberg1
27 Feb 2002
TL;DR: In this article, the location of the remote user device and the host server are determined by accessing signals generated by either GPS satellites, or by terrestrial radio broadcast stations, through a process known as radio frequency triangulation telemetry tracking (RF-3T).
Abstract: Method and apparatus for providing authenticated, secure, communication between a gaming host communicating via radio frequency (RF) subcarriers to a remote user device in another location. Location of the remote user device and the host server are determined by accessing signals generated by either Global Positioning System (GPS) satellites, or by terrestrial radio broadcast stations, through a process known as radio frequency triangulation telemetry tracking (RF-3T). Player authentication (identity verification) is determined by use of a personal identification number (PIN). A remote user device may be implemented as a stand alone or self-contained single unit that is portable and can receive communications via radio frequency, or may be implemented as one or more discreet components adapted to be used with a laptop, a personal digital assistant (PDA), or desktop personal computer (PC).

Journal ArticleDOI
01 Sep 2002-Pain
TL;DR: Multivariate analyses showed equivalent stimuli to be rated much the same whether entered on paper VAS or PTC touch screen VAS (P<0.0001).
Abstract: The visual analogue scale (VAS) is an established, validated, self-report measure usually consisting of a 10 cm line on paper with verbal anchors labeling the ends. Palmtop computers (PTCs also known as personal digital appliances) have incorporated VAS entry by use of a touch screen. However, the validity and psychophysical properties of the electronic VAS have never been formally compared with the conventional paper VAS. The aim of this study is to determine the agreement between the electronic (eVAS) and paper (pVAS) modes. Twenty-four healthy volunteers were recruited for this study. Each study participant provided input using both measurement methods by marking the eVAS and pVAS in response to two kinds of stimuli, cognitive and sensory. A verbal rating scale of seven descriptors of intensity represented the cognitive stimuli. Participants were asked to mark the location that best corresponded to the pain intensity described by each word on scales from 'no pain' to 'worst possible pain'. The sensory stimuli used were a set of test weights consisting of plastic containers ranging from 7 to 129 g. The VAS for sensory stimuli ranged from 0 (no weight) to 'reference weight' (the heaviest weight outside the range of test weights). There were two types of input stimuli and two modes for recording responses for a total of four experimental conditions. Two evaluators independently measured and recorded all the pVAS forms to the nearest millimeter. A total of 2016 stimuli were rated. The overall correlation for ratings of both sensory and cognitive stimuli on eVAS and pVAS was r = 0.91. For paired verbal stimuli the correlation was r = 0.97. For paired sensory stimuli the correlation was r = 0.86. The correlation between group eVAS and pVAS ratings to common verbal stimuli was r = 0.99. For common sensory stimuli the group correlation was r = 0.99. The median of correlations comparing eVAS and pVAS ratings was 0.99 for verbal stimuli and 0.98 for sensory stimuli. Multivariate analyses showed equivalent stimuli to be rated much the same whether entered on paper VAS or PTC touch screen VAS (P < 0.0001). Support was found for the validity of the computer version of the VAS scale.

Patent
08 Oct 2002
TL;DR: In this paper, a method and system for transferring a computer session between devices, such as a land-line device to a wireless device, is presented, where the context of the computer session is determined as it is being performed on the first device, and corresponding context data is transferred to the second device.
Abstract: A method and system for transferring a computer session between devices, such as a land-line device to a wireless device. A user launches a computer session on a first device, such as a personal computer. The user may then selectively transfer the computer session to another device, such as a wireless device, through activation of a triggering signal or other transfer request means. In response, the context of the computer session is determined as it is being performed on the first device, and corresponding context data is transferred to the second device. An applicable application on the second device is opened and loaded with applicable context data to continue the session. Several session transfer mechanisms, including use of an online service, proxy mechanisms, and peer-to-peer communication links, are disclosed.

Patent
28 Mar 2002
TL;DR: In this article, a method of operating a personal computer (PC) in either a PC mode or a PDA mode is also provided that includes: initiating a control signal; and loading a first or second operating system based on the control signal, wherein the first operating system operates the PC is the first PC mode and the second one operates the PDA is the second PC mode.
Abstract: A personal computer (PC) adapted to function as a personal digital assistant (PDA) includes: a central processing unit (CPU) responsive to a control signal to load a first operating system or a second operating system, wherein the first operating system is run by the PC in a first PC mode and the second operating system is run by the PC in a second PDA mode. A method of operating a personal computer (PC) in either a PC mode or a PDA mode is also provided that includes: initiating a control signal; and loading a first or second operating system based on the control signal, wherein the first operating system operates the PC is the first PC mode and the second operating system operates the PC is the second PDA mode.

Proceedings ArticleDOI
12 May 2002
TL;DR: Experiments show that enough high-frequency content remains in the emitted light to permit the reconstruction of readable text by deconvolving the signal received with a fast photosensor, and that optical compromising emanations can be received even after diffuse reflection from a wall.
Abstract: A new eavesdropping technique can be used to read cathode-ray tube (CRT) displays at a distance. The intensity of the light emitted by a raster-scan screen as a function of time corresponds to the video signal convolved with the impulse response of the phosphors. Experiments with a typical personal computer color monitor show that enough high-frequency content remains in the emitted light to permit the reconstruction of readable text by deconvolving the signal received with a fast photosensor These optical compromising emanations can be received even after diffuse reflection from a wall. Shot noise from background light is the critical performance factor In a sufficiently dark environment and with a large enough sensor aperture, practically significant reception distances are possible. This information security risk should be considered in applications with high confidentiality requirements, especially in those that already require "TEMPEST"-shielded equipment designed to minimize radio-frequency emission-security concerns.

Patent
24 Apr 2002
TL;DR: In this article, a fully integrated email system for a desktop computer with an associated palmtop computer is described, where the personal computer has an email synchronization conduit that synchronizes email on the portable computer email client with email for the desktop computer system.
Abstract: A fully integrated email system for a desktop computer with an associated palmtop computer is disclosed. The portable computer has an email client for viewing incoming email messages and composing outgoing email messages. The personal computer has an email synchronization conduit that synchronizes email on the portable computer email client with email for the desktop computer system. The email synchronization conduit ensures that the email state on the portable computer system matches the email state on the desktop personal computer system exactly. Thus, if an email message is deleted on the portable computer system then that email message will be deleted from the desktop personal computer system. Similarly, if an email message is deleted on the desktop personal computer system then that email message will be deleted from the portable computer system.

Patent
19 Jan 2002
TL;DR: In this paper, the authors describe a virus and intrusion protection apparatus for use with a personal computer or the like, and a computer network that adds a dedicated network board for exclusive communications with an external network, the World Wide Web and email.
Abstract: A virus and intrusion protection apparatus for use with a personal computer or the like, and a computer network that adds a dedicated network board for exclusive communications with an external network, the World-Wide-Web and email. The dedicated network board includes the necessary duplicated computing components to isolate the Main Core of the computer or network server from external communications with the World-Wide-Web such as a central processing unit, memory, communications ports, needed modems, etc. During external communications, a switch connecting the dedicated network board to the Main Core of the computer or network server is opened. Booby trap ghost address book and ghost directories are added in the access board to trap new viruses that is not detected by the existing inspection programs.

PatentDOI
TL;DR: An improved hearing-related analysis programming system with a host computer for providing at least one hearing aid program and having at least a personal computer memory card international association (PCMCIA) defined port in combination with a PCMCIA card inserted in the port and arranged for interacting with the host computer as discussed by the authors.
Abstract: An improved hearing-related analysis programming system with a host computer for providing at least one hearing aid program and having at least one personal computer memory card international association (PCMCIA) defined port in combination with a PCMCIA Card inserted in the port and arranged for interacting with the host computer for controlling hearing-related analysis or programming of a hearing aid. The host computer provides power and ground to the PCMCIA Card and provides for downloading the hearing aid programming software to the PCMCIA Card upon initialization. A microprocessor on the PCMCIA Card executes hearing-related analysis or the programming software. A hearing aid interface for adjusting voltage levels and impedance levels is adapted for coupling signals to the hearing aid being programmed. Systems for performing hearing-related analysis include a portable audiometer system on a PCMCIA Card and operable with a portable host computer to analyze hearing of a patient, and a real-ear system on a PCMCIA Card and operable with a portable host computer to analyze output from a hearing aid in a patient's ear.

Journal ArticleDOI
09 Jan 2002
Abstract: Current mobile computing devices such as palmtop computers, personal digital assistants (PDAs) and mobile phones, and future devices such as Bluetooth and GSM enabled cameras, and music players have many implications for the design of the user interface. These devices share a common problem: attempting to give users access to powerful computing services and resources through small interfaces, which typically have tiny visual displays, poor audio interaction facilities and limited input techniques. They also introduce new challenges such as designing for intermittent and expensive network access, and design for position awareness and context sensitivity. No longer can designers base computing designs around the traditional model of a single user working with a personal computer at his/her workplace. In addition to mobility and size requirements, mobile devices will also typically be used by a larger population spread than traditional PCs and without any training or support networks, whether formal or informal. Furthermore, unlike early computers which had many users per computer, and PCs with usually one computer per user, a single user is likely to own many mobiles devices [1] which they interact with indifferent ways and for different tasks.

Patent
11 Mar 2002
TL;DR: In this paper, the authors describe a highly secure distribution system which thwarts copyright infringement and other unauthorized copying over a terrestrial or satellite network using a portion of standard FM radio or television signals.
Abstract: Methods and apparatus for gradually delivering software over a terrestrial or satellite network are disclosed. Packets of a software program are conveyed wirelessly from a central server to customers using a portion of standard FM radio or television signals. These packets are conveyed to a wireless receiver at the customer's premises over a relatively long period of time. The packets are slowly accumulated in the customer's receiver, which includes a storage device such as an array of hard drives or memory chips. After this “accumulation period” is completed, and a full software program has been built up, subscribers may then retrieve and use the software. The invention provides a highly secure distribution system which thwarts copyright infringement and other unauthorized copying. In the preferred embodiment of the invention, the data conveyed to customers is computer software, including operating systems, applications and updates. The system may also be tamper-proofed, so that any attempt to make unauthorized copies of the software, or to open the receiver cause an immediate erasure of all the programs stored in the receiver. A peripheral device maybe connected to the customer's personal computer. This device connects to a computer using a USB or other port, and includes a conventional FM radio or television receiver, a large storage device, and a security chip. This device may also be built into the customer's personal computer.

DOI
01 Jan 2002
TL;DR: This paper presents a framework for one- to-many negotiation by means of conducting a number of concurrent coordinated one-to-one negotiations, and outlines two levels of strategies that can be exercised on two levels, the individual negotiation level, and the coordination level.
Abstract: Negotiation is a process in which two or more parties with different criteria, constraints, and preferences, jointly reach an agreement on the terms of a transaction. Many current automated negotiation systems support one-to-one negotiation. One-to-many negotiation has been mostly automated using various kinds of auction mechanisms, which have a number of limitations such as the lack of the ability to perform two-way communication of offers and counteroffers. Moreover, in auctions, there is no way of exercising different negotiation strategies with different opponents. Even though auction-based online trading is suitable for many applications, there are some in which there is a need for such greater flexibility. There has been a significant body of work towards sophisticated one-to-one automated negotiation. In this paper, we present a framework for one-to-many negotiation by means of conducting a number of concurrent coordinated one-to-one negotiations. In our framework, a number of agents, all working on behalf of one party, negotiate individually with other parties. After each negotiation cycle, these agents report back to a coordinating agent that evaluates how well each agent has done, and issues new instructions accordingly. Each individual agent conducts reasoning by using constraint-based techniques. We outline two levels of strategies that can be exercised on two levels, the individual negotiation level, and the coordination level. We also show that our one-to-many negotiation architecture can be directly used to support many-to-many negotiations. In our prototype Intelligent Trading Agency (ITA), agents autonomously negotiate multi- attribute terms of transactions in an e-commerce environment tested with a personal computer trading scenario.

Journal ArticleDOI
TL;DR: The utility of a Palmtop computer with schedule prompting software is demonstrated to increase independence in the performance of vocational and daily living tasks by individuals with mental retardation.
Abstract: Achieving greater independence for individuals with mental retardation depends upon the acquisition of several key skills, including time-management and scheduling skills. The ability to perform tasks according to a schedule is essential to domains like independent living and employment. The use of a portable schedule prompting system to increase independence and self-regulation in time-management for individuals with mental retardation was examined. Twelve people with mental retardation participated in a comparison of their use of the technology system to perform tasks on a schedule with use of a written schedule. Results demonstrated the utility of a Palmtop computer with schedule prompting software to increase independence in the performance of vocational and daily living tasks by individuals with mental retardation.

Journal ArticleDOI
Feng Cheng1, Markus Ettl1, Grace Lin1, David D. Yao1
TL;DR: A nonlinear optimization model with multiple constraints, reflecting the service levels offered to different market segments is developed, and an exact algorithm for the important case of demand in each market segment having (at least) one unique component is developed.
Abstract: This study is motivated by a process-reengineering problem in personal computer (PC) manufacturing, i.e., to move from a build-to-stock operation that is centered around end-product inventory towards a configure-to-order (CTO) operation that eliminates endproduct inventory. In fact, CTO has made irrelevant the notion of preconfigured machine types and focuses instead on maintaining the right amount of inventory at the components. CTO appears to be the ideal operational model that provides both mass customization and a quick response time to order fulfillment. To quantify the inventory-service trade-off in the CTO environment, we develop a nonlinear optimization model with multiple constraints, reflecting the service levels offered to different market segments. To solve the optimization problem, we develop an exact algorithm for the important case of demand in each market segment having (at least) one unique component, and a greedy heuristic for the general (nonunique component) case. Furthermore, we show how to use sensitivity analysis, along with simulation, to fine-tune the solutions. The performance of the model and the solution approach is examined by extensive numerical studies on realistic problem data. We present the major findings in applying our model to study the inventory-service impacts in the reengineering of a PC manufacturing process.