Search For:

Displaying 1-31 out of 31 total
Work in progress -- Classroom and distance components of a GK12 program placing graduate students in high school classrooms
Found in: Frontiers in Education, Annual
By Justin Brough,Mary Baker,Dominick Casadonte
Issue Date:October 2011
pp. T1C-1-T1C-2
As our national mathematics and science scores continue to fall below expectations, creating environments that engage the professional scientific and engineering communities in public education becomes increasingly important. Most mathematics and science t...
 
From 3D Printing to Spy Cats
Found in: IEEE Pervasive Computing
By Mary Baker,Justin Manweiler
Issue Date:October 2014
pp. 6-9
This installment of Notes from the Community covers everything from virtual, physical, multidimensional, and 3D reality to wearables for cats.
 
Interviews: The Challenges of Emerging Economies
Found in: IEEE Pervasive Computing
By Mary Baker, Raj Reddy, Genevieve Bell
Issue Date:April 2006
pp. 40-46
In this department we hear from two important voices in the area of pervasive computing for emerging technologies: Raj Reddy of Carnegie Mellon University and Genevieve Bell of Intel's Digital Home Platform.
 
MobiSys 2003: On the Cutting Edge in San Francisco
Found in: IEEE Pervasive Computing
By James Mickens, Marco Gruteser, Justin Mazzola Paluska, Mary Baker
Issue Date:July 2003
pp. 81-84
<p>This new Usenix/ACM conference on mobile systems, applications, and services provides a forum for the best cutting-edge research on enabling, supporting, and coping with mobility. This article reports on the conference highlights, including the ke...
 
Wearable Computing
Found in: IEEE Pervasive Computing
By Jason Hong,Mary Baker
Issue Date:April 2014
pp. 7-9
To give you a preview of IEEE Pervasive Computing's October-December special issue on wearable computing, this installment of Notes from the Community focuses on submissions about wearables. The topics range from the origins of wearable computing to unusua...
 
3D Printing, Smart Cities, Robots, and More
Found in: IEEE Pervasive Computing
By Jason Hong,Mary Baker
Issue Date:January 2014
pp. 6-9
This installment of Notes from the Community covers a wide range of topics, including new gadgets that help you track down lost items, 3D printing, the downside of smart cities, and soldiers growing attached to their robots.
 
New Kinds of Gadgets, Interactions, and Ubicomp Visions
Found in: IEEE Pervasive Computing
By Jason Hong,Mary Baker
Issue Date:October 2013
pp. 8-11
This installment of Notes from the Community covers new kinds of gadgets and interactions; innovations in transportation, smart cities, and smartphones; ubicomp and art; and visions of ubicomp.
 
A Historic Name-Trail Service
Found in: Mobile Computing Systems and Applications, IEEE Workshop on
By Petros Maniatis, Mary Baker
Issue Date:October 2003
pp. 88
In this work we consider the mobility of personal on-line identifiers. People change the identifiers through which they are reachable on-line as they change jobs or residences or Internet service providers. This kind of personal mobility makes reaching peo...
 
Wearable Computing from Jewels to Joules [Guest editors' introduction]
Found in: IEEE Pervasive Computing
By Mary Baker,Jason Hong,Mark Billinghurst
Issue Date:October 2014
pp. 20-22
Wearables have been with us for a long time, and they're here to stay. Their capabilities and our expectations change with time, but many of the basic problems remain. This issue touches on designing for unpredictable human behavior, positioning sensors, p...
   
Terry O'Shea on the Function, Fashion, and Future of Wearables
Found in: IEEE Pervasive Computing
By Mary Baker
Issue Date:October 2014
pp. 16-19
Terry O'Shea, a Fellow in Hewlett-Packard's Printing and Personal Systems Division, talks about all things wearable--from past projects and lessons learned to current challenges and future goals.
 
Interaction Platforms, Energy Conservation, Behavior Change Research, and More
Found in: IEEE Pervasive Computing
By Jason Hong,Mary Baker
Issue Date:July 2013
pp. 10-13
This installment of Notes from the Community covers new developments in interaction toolkits and platforms, security and privacy, smartphones, power consumption and battery life, and ubicomp education. It also includes a vision of ubicomp's past and future...
 
From GPS Shoes to Instrumented Cities: Food for Thought
Found in: IEEE Pervasive Computing
By Jason Hong,Mary Baker
Issue Date:April 2013
pp. 86-88
Welcome to latest installment of Notes from the Community! This column offers a curated summary of interesting news and research in pervasive and mobile computing, with content drawn from submissions from a shared community on the social news site Reddit, ...
 
What's New in the Ubicomp Community?
Found in: IEEE Pervasive Computing
By Jason Hong,Mary Baker
Issue Date:January 2013
pp. 5-7
Welcome to the inaugural column of Notes from the Community! This column offers a curated summary of interesting news and research in pervasive and mobile computing, with content drawn from submissions from community members and readers. Visit www.reddit.c...
 
Pervasive Tabs, Pads, and Boards: Are We There Yet?
Found in: IEEE Pervasive Computing
By Maria R. Ebling,Mary Baker
Issue Date:January 2012
pp. 42-51
How far have we come with respect to commercial deployments of the devices Mark Weiser described? This review of Weiser's vision evaluates the commercial success of tabs, pads, and boards and discusses their real-world use.
 
Guest Editor's Introduction: Pervasive Computing for Emerging Economies
Found in: IEEE Pervasive Computing
By Mary Baker
Issue Date:April 2006
pp. 12-14
Ubiquitous computing has the potential to cut across cultures and countries, to be both locally valuable and globally pervasive. To reach this potential, it's important for researchers to recognize the challenges, rewards, goals, and methods of developing ...
 
Smartphones, Teddy Bears, and Toys
Found in: IEEE Pervasive Computing
By Jason Hong,Mary Baker
Issue Date:July 2014
pp. 5-7
This installment of Notes from the Community is all about technology for locating, sensing, and interacting. Oh, and teddy bears.
 
EEG-based comparisons of performance on a mental rotation task between learning styles and gender
Found in: 2013 IEEE Frontiers in Education Conference (FIE)
By Elizabeth Hames,Mary Baker
Issue Date:October 2013
pp. 1176-1182
Retention and diversity are central issues in engineering schools. Students' learning styles may hinder understanding of course material if presented in an incompatible way. While learning styles assessments are informative in determining the students' pre...
   
The sound of silence
Found in: Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13)
By Bowon Lee, Mary Baker, Ramin Samadani, Wai-Tian Tan
Issue Date:November 2013
pp. 1-14
A list of the dynamically changing group membership of a meeting supports a variety of meeting-related activities. Effortless content sharing might be the most important application, but we can also use it to provide business card information for attendees...
     
Introduction to special issue of USENIX FAST 2008
Found in: ACM Transactions on Storage (TOS)
By Mary Baker
Issue Date:November 2008
pp. 1-2
An extension of the λ-calculus is proposed, to study resource usage analysis and verification. It features usage policies with a possibly nested, local scope, and dynamic creation of resources. We define a type and effect system that, given a program,...
     
A fresh look at the reliability of long-term digital storage
Found in: Proceedings of the 2006 EuroSys conference (EuroSys '06)
By David S. H. Rosenthal, Mary Baker, Mehul Shah, Mema Roussopoulos, Petros Maniatis, Prashanth Bungale, TJ Giuli
Issue Date:April 2006
pp. 2-es
Emerging Web services, such as email, photo sharing, and web site archives, must preserve large volumes of quickly accessible data indefinitely into the future. The costs of doing so often determine whether the service is economically viable. We make the c...
     
Impeding attrition attacks in P2P systems
Found in: Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC (EW11)
By David S. H. Rosenthal, Mary Baker, Mema Roussopoulos, Petros Maniatis, TJ Giuli
Issue Date:September 2004
pp. 12-es
P2P systems are exposed to an unusually broad range of attacks. These include a spectrum of denial-of-service, or attrition, attacks from low-level packet flooding to high-level abuse of the peer communication protocol. We identify a set of defenses that s...
     
Measuring link bandwidths using a deterministic model of packet delay
Found in: Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '00)
By Kevin Lai, Mary Baker
Issue Date:August 2000
pp. 406-415
We describe a deterministic model of packet delay and use it to derive both the packet pair [2] property of FIFO-queueing networks and a new technique packet tailgating) for actively measuring link bandwidths. Compared to previously known techniques, packe...
     
Mitigating routing misbehavior in mobile ad hoc networks
Found in: Proceedings of the sixth annual international conference on Mobile computing and networking (MobiCom '00)
By Kevin Lai, Mary Baker, Sergio Marti, T. J. Giuli
Issue Date:August 2000
pp. 255-265
This paper describes two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this problem, we propose categorizing nodes based upon their dynamically measured behavio...
     
Analysis of a local-area wireless network
Found in: Proceedings of the sixth annual international conference on Mobile computing and networking (MobiCom '00)
By Diane Tang, Mary Baker
Issue Date:August 2000
pp. 1-10
To understand better how users take advantage of wireless networks, we examine a twelve-week trace of a building-wide local-area wireless network. We analyze the network for overall user behavior (when and how intensively people use the network and how muc...
     
Analysis of a metropolitan-area wireless network
Found in: Proceedings of the fifth annual ACM/IEEE international conference on Mobile computing and networking (MobiCom '99)
By Diane Tang, Mary Baker
Issue Date:August 1999
pp. 13-23
Post-hoc worknotes is a concept demonstration, an envisionment showing how workgroup communication could be supported using a combination of existing technologies in the field of nontextual information management. We have identified a number of use-driven ...
     
Flexible network support for mobility
Found in: Proceedings of the fourth annual ACM/IEEE international conference on Mobile computing and networking (MobiCom '98)
By Claude Castelluccia, Mary Baker, Xinhua Zhao
Issue Date:October 1998
pp. 145-156
Post-hoc worknotes is a concept demonstration, an envisionment showing how workgroup communication could be supported using a combination of existing technologies in the field of nontextual information management. We have identified a number of use-driven ...
     
Consistent overhead byte stuffing
Found in: Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication (SIGCOMM '97)
By Mary Baker, Stuart Cheshire
Issue Date:September 1997
pp. 406-415
Byte stuffing is a process that transforms a sequence of data bytes that may contain 'illegal' or 'reserved' values into a potentially longer sequence that contains no occurrences of those values. The extra length is referred to in this paper as the overhe...
     
Internet mobility 4×4
Found in: Conference proceedings on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '96)
By Mary Baker, Stuart Cheshire
Issue Date:August 1996
pp. 406-415
Mobile IP protocols allow mobile hosts to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment in the Internet.While some recent work in Mobile IP focuses on a couple of sp...
     
Going threadbare (panel session): sense or sedition? a debate on the threads abstraction
Found in: Proceedings of the fifteenth ACM symposium on Operating systems principles (SOSP '95)
By Mary Baker
Issue Date:December 1995
pp. 180-189
Shared memory is an effective and efficient paradigm for interprocess communication. We are concerned with software that makes use of shared memory in a single site system and its extension to a multimachine environment. Here we describe the design of a di...
     
Non-volatile memory for fast, reliable file systems
Found in: Proceedings of the fifth international conference on Architectural support for programming languages and operating systems (ASPLOS-V)
By Etienne Deprit, John Ouseterhout, Margo Seltzer, Mary Baker, Satoshi Asami
Issue Date:October 1992
pp. 205-209
This paper investigates the limitations on designing a processor which can sustain an execution rate of greater than one instruction per cycle on highly-optimized, non-scientific applications. We have used trace-driven simulations to determine that these a...
     
Availability in the Sprite distributed file system
Found in: Proceedings of the fourth workshop on ACM SIGOPS European workshop (EW 4)
By John Ousterhout, Mary Baker
Issue Date:September 1990
pp. 1-4
In the Sprite environment, tolerating faults means recovering from them quickly. Our position is that performance and availability are the desired features of the typical locally-distributed office/engineering environment, and that very fast server recover...
     
 1