tag:blogger.com,1999:blog-67238361709678080002024-03-16T19:52:26.905+01:00Mobile Internet of Things BlogI use this blog as a public note-pad. This blog intends to be rather recent than correct, so articles will be rather brain dumps than matured poetry;)Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.comBlogger150125tag:blogger.com,1999:blog-6723836170967808000.post-68902198847853302952020-09-28T12:10:00.007+02:002020-09-28T12:34:25.310+02:00Hiring: Two Ph.D., one Post-Doc position at TU Wien/Austria
<table><tbody><tr><td>Starting September 1, 2020 I'm a <a href="https://informatics.tuwien.ac.at/news/1909">full professor for ubiquitous computing</a> at <a href="https://informatics.tuwien.ac.at/people/florian-michahelles">TU Wien</a>. I'm curious to continue my quest of investigating the boundaries between human and machine.<br />
After some wonderful years with the <a href="https://new.siemens.com/us/en/company/innovation/ahi-research.html">Artificial & Human Intelligence</a> <a href="https://new.siemens.com/us/en/company/innovation/ahi-research.html">research group</a> at <a href="https://new.siemens.com/us/en/company/press/siemens-stories/corporate-technology.html">Siemens Corporate Technology</a> in <a href="https://new.siemens.com/global/en/company/stories/research-technologies/artificial-intelligence/artificial-intelligence-robotic-research.html">Berkeley</a> I have moved on and I'm happy to be back in academia. I'm grateful for the experience from industry of making things real that matter. I was fascinated by the drive, passion and focus of my collaborators at Siemens.<br />Back in academia, I'm free again to investigate technologies with research questions in mind.</td><td>
<img border="0" height="237" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCBT1v2twnUg9sGDnUAkeuALWx7kyO4vhNYcBZjeReOnvwjkT9LYPfja10cRufK2R4rJOauO0NXAL26bj0B3zaHRkEYMSLVUa8LosCZqIc-u8Nps7yHgB7XjdAOZx6Q7u_qD7fKSD9ihM/w171-h237/Screenshot+2020-09-28+at+11.42.48.png" width="171" />
</td></tr></tbody></table>
I'm looking for allies who are willing to explore
<ul style="text-align: left;"><li>how can we build <a href="https://dl.acm.org/doi/10.1145/3308560.3316510">digital companions</a> [1] supporting humans in their tasks?</li><li>which user-interfaces can we build in order to establish a seamless interaction between human and machine? [2]</li><li>which modalities are most suited to proactively support users in their tasks? [3]</li></ul><div>I'm in the process of setting up a new research lab in the heart of downtown Vienna:</div><div><ul style="text-align: left;"><li>hardware lab: digital/physical tools in a workshop to create research prototypes</li><li>creation lab: workspace for students to code, build, create, experiment</li><li>user interaction lab: evaluation of prototypes, user studies, media-interaction</li></ul>If you want to join the team please do have a look at my <a href="https://media.tuwien.ac.at/hiring/">two open PhD and one post-doc position</a>. I'm looking forward to your applications!<br /><div><br /></div></div><div>[1] Mareike Kritzler, Jack Hodges, Dan Yu, Kimberly Garcia, Hemant Shukla, and Florian Michahelles. 2019. <a href="https://dl.acm.org/doi/10.1145/3308560.3316510">Digital Companion for Industry</a>. In <i>Companion Proceedings of The 2019 World Wide Web Conference </i>(WWW '19). Association for Computing Machinery, New York, NY, USA, 663–667. </div><div>[2] Tian, R., Saran, V., Kritzler, M., Michahelles, F. and Paulos, E., 2019, October. <a href="https://dl.acm.org/doi/abs/10.1145/3332165.3347918">Turn-by-wire: Computationally mediated physical fabrication</a>. In Proceedings of the 32nd Annual ACM Symposium on User Interface Software and Technology (pp. 713-725).</div>[3] Funk, M., Marky, K., Mizutani, I., Kritzler, M., Mayer, S. and Michahelles, F., 2019, May. <a href="https://dl.acm.org/doi/abs/10.1145/3290607.3312959">LookUnlock: Using Spatial-Targets for User-Authentication on HMDs</a>. In CHI Conference on Human Factors in Computing Systems, Late Breaking Work.<p></p>Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com2tag:blogger.com,1999:blog-6723836170967808000.post-82995258467415142312015-04-02T02:52:00.004+02:002015-04-02T02:54:19.627+02:00"Information is not knowledge. Knowledge is not wisdom. Wisdom is not truth."<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8i_Z5xTw1rENJRaLlB0XfjcVVaNtKMckfXHmUVVXgublRZvGWbMaSvO4bJ4SMlF6WYZInlhYNAjCM1dlq1dhdy4paIPyjyC5hdW0Hk9QaSpvdCM9hi8p6SMjyA69uceX4t9FB8l_Du-Y/s1600/IMG_1701.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8i_Z5xTw1rENJRaLlB0XfjcVVaNtKMckfXHmUVVXgublRZvGWbMaSvO4bJ4SMlF6WYZInlhYNAjCM1dlq1dhdy4paIPyjyC5hdW0Hk9QaSpvdCM9hi8p6SMjyA69uceX4t9FB8l_Du-Y/s1600/IMG_1701.JPG" height="133" width="200" /></a><br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVcK_YFr-StI9vf316ioNYxVDHFM-BKkCM2Dz4xm6YXUqV5CNOgvWw3FZrkFtyMWjbl4Xce6bTfZy7UmkYIdvOPP3hxO9_G_OKdUeSx0KZr4EZLi5cqTU_JTu5GO6lPRdvGyVCkt3acNM/s1600/IMG_1702.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVcK_YFr-StI9vf316ioNYxVDHFM-BKkCM2Dz4xm6YXUqV5CNOgvWw3FZrkFtyMWjbl4Xce6bTfZy7UmkYIdvOPP3hxO9_G_OKdUeSx0KZr4EZLi5cqTU_JTu5GO6lPRdvGyVCkt3acNM/s1600/IMG_1702.JPG" height="150" width="200" /></a>Just recently I had the opportunity to attend the event <a href="http://ciscoinvestments.com/iot">Iot:: Empowering the Enterprise</a>.
The event was opened by a welcome note by <a href="http://en.wikipedia.org/wiki/Padmasree_Warrior">Padmasree Warrior</a>, CTO of CISCO, who predicted IoT as the next revolution of technology wave. <br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMh6mNsXhyphenhyphenB0ZJyQ3jIXGF7gfljgkHgMTLRz3bVbu0x8af01cDkt3pZMM4vl526Hlxcqu92BmI-Dw0zzoTUWwd5oX_GE6yffFWc1mF1Bi4azfREgF__mHReHs-1B4ABAUhyDsUz3mpDds/s1600/IMG_1707.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMh6mNsXhyphenhyphenB0ZJyQ3jIXGF7gfljgkHgMTLRz3bVbu0x8af01cDkt3pZMM4vl526Hlxcqu92BmI-Dw0zzoTUWwd5oX_GE6yffFWc1mF1Bi4azfREgF__mHReHs-1B4ABAUhyDsUz3mpDds/s1600/IMG_1707.JPG" height="129" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijGGX8bEMbYJwxXPXhwuVEJrPh1JeRn2L28Gr2zsi4Os91mhhpmPaB4zBjtFIgWfrLSuYb5-FRGfpa4W_Qudxbgu40tTWKjidr1syZHODeY917EMyjpMqVSze5t6yxqUiu7Mm20C08uOc/s1600/IMG_1704.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijGGX8bEMbYJwxXPXhwuVEJrPh1JeRn2L28Gr2zsi4Os91mhhpmPaB4zBjtFIgWfrLSuYb5-FRGfpa4W_Qudxbgu40tTWKjidr1syZHODeY917EMyjpMqVSze5t6yxqUiu7Mm20C08uOc/s1600/IMG_1704.JPG" height="150" width="200" /></a>Then <a href="http://newsroom.cisco.com/wim-elfrink?articleId=33416">Wim Elfrink</a> stepped onto the stage and started off that his kids would only have two statuses in life, asleep or alive. He questioned IoT being a hype and emphasized the fact that IoT could only be built in a joined effort. Furthermore he presented evidence that the selling of sensors would be exploding and sensors are being deployed everywhere. Only 1% is of our world today would be connected so far. He mentioned it would be less about the data more about how to transfer data to knowledge and wisdom. (Which reminded me after the famous Frank Zappa <a href="http://www.goodreads.com/quotes/11708-information-is-not-knowledge-knowledge-is-not-wisdom-wisdom-is">quote</a>;) Surprising to me, Wim mentioned the public sector as the largest opportunity for sensors, he was calling for new governmental regulations to drive new opportunities. Finally, opened the stage for startup called relayr.io that provides connectivity to sensors bundled with an analytics platform. <br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_UjKXgutVbWMAIViWqxzEXn9oLPTnzPaO56GkYgJxefUNkRCasBLz9rlmvFlT-I2NMRs5vIMuh8AeALnObQJ4jKlDqq8IRr4Q7zJiHUJDM4tDiK5JHVvsy5E6sORtPXXXlnyjvHew2T8/s1600/IMG_1710.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_UjKXgutVbWMAIViWqxzEXn9oLPTnzPaO56GkYgJxefUNkRCasBLz9rlmvFlT-I2NMRs5vIMuh8AeALnObQJ4jKlDqq8IRr4Q7zJiHUJDM4tDiK5JHVvsy5E6sORtPXXXlnyjvHew2T8/s1600/IMG_1710.JPG" height="150" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirYjSkaKPzR-Ml6fNuApXB9dHh82gVA68YTVUgxOsGRI2iYwTxJ6kmQk3KDmQx3pyUPTWxBuv1bnlQC1iI7YIkfiWzajMNOVABy_M-BbWRTx6plEQaXfkITyTdpuRjBfs-y7TvV8oY9VM/s1600/IMG_1712.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirYjSkaKPzR-Ml6fNuApXB9dHh82gVA68YTVUgxOsGRI2iYwTxJ6kmQk3KDmQx3pyUPTWxBuv1bnlQC1iI7YIkfiWzajMNOVABy_M-BbWRTx6plEQaXfkITyTdpuRjBfs-y7TvV8oY9VM/s1600/IMG_1712.JPG" height="142" width="200" /></a>Next on the agenda was panel discussion on the IoT eco-system. <a href="https://www.linkedin.com/pub/debjit-mukerji/2/450/988">Debjit Mukerji </a>from Siemens presented the notion of Web of Systems as an approach for moving from sensor-cloud analytics systems to decentralized, local information processing systems. Thus, IoT systems would not solely depend on connectivity to a cloud but could operate and reason locally in real time closer to the phenomenon. Debjit mentioned the importance of enterprises for startups to learn about industrial business cases, receive real-world feedback, access to testing resources and customers. <br />
<a href="https://www.linkedin.com/pub/amit-chaturvedy/2/ab0/472">Amit Chaturvedy</a> from Cisco Investments said the IoT would a global phenomenon wherof silicon valley startups would be mostly focusing on consumer applications, Germany would be leading in industrial developments, Asia about smart cities...different geographies would have different drivers.
<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnyOTuP7AiPqhnsSj8HOSYJqJy165CvYOcE6BKydz_w6xBdZG8HgI-hVsmgmEvA9lffxmYHWobJgzVJ0p04OjXdsmXkTvQiCSbCe7jiXUnWxxv0sqP19SLfgECsbbM7j0C66qQwzRvKk4/s1600/IMG_1713.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnyOTuP7AiPqhnsSj8HOSYJqJy165CvYOcE6BKydz_w6xBdZG8HgI-hVsmgmEvA9lffxmYHWobJgzVJ0p04OjXdsmXkTvQiCSbCe7jiXUnWxxv0sqP19SLfgECsbbM7j0C66qQwzRvKk4/s1600/IMG_1713.JPG" height="150" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibnqjYM1rISExY7uJ6sABPplD5HrRKSSfpGImCksz-c9wrmsQ_qjYTh_XKyobrbcpvXVi-Jo4zV8sIIPLjZMHfVcJr4XGlVAe9O47kPmHEDvS6ByGphBRYdKONwt6eqO5xiZmP-fnCfWs/s1600/IMG_1732.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibnqjYM1rISExY7uJ6sABPplD5HrRKSSfpGImCksz-c9wrmsQ_qjYTh_XKyobrbcpvXVi-Jo4zV8sIIPLjZMHfVcJr4XGlVAe9O47kPmHEDvS6ByGphBRYdKONwt6eqO5xiZmP-fnCfWs/s1600/IMG_1732.JPG" height="150" width="200" /></a>From the startup pitches I recall <a href="https://www.pubnub.com/">pubnub</a> allowing to connect devices in a secure manner, <a href="http://www.helium.com/">helium</a> building networks on top of commercial wireless networks, <a href="https://edyn.com/">edyn</a> for monitoring plants (I can't help but hasn't <a href="https://www.koubachi.com/de/">Koubachi</a> done than some time ago?), <a href="http://www.skyspecs.com/">skyspecs</a> making drones saving for industrial use, <a href="https://www.aylanetworks.com/">Ayla</a> offering a network layer for remote monitoring, and <a href="http://www.placemeter.com/">placemeter</a> quantifying the real world in real time using computer vision and video sensors.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYEK4jLP7egXivsHHEIZWn16OXH9QqKkpX5y-ceUNb6WQfUsdMvejerlW9gLWqCYkRlrN48SjYXX6MA7KwbNNpbuE1vprIDiiUTK9IXaydbYesGsjx9ESwqf7JYY6iXUm5jGdjQvLA7bw/s1600/IMG_1724.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYEK4jLP7egXivsHHEIZWn16OXH9QqKkpX5y-ceUNb6WQfUsdMvejerlW9gLWqCYkRlrN48SjYXX6MA7KwbNNpbuE1vprIDiiUTK9IXaydbYesGsjx9ESwqf7JYY6iXUm5jGdjQvLA7bw/s1600/IMG_1724.JPG" height="116" width="200" /></a></div>
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgE5y6mYvEKxuGftqbCTTDYrxLxP_Fk-PEoRgSDa54HZyXQ7agWRp6D6PRhr8rri2aDCbj_COSxqA1zvKOQHdaj-ILY-q1RnX0RLXqVXDOd5ArFyUayOLX13xsWSf4epxT16WUGaMqoplI/s1600/IMG_1727.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgE5y6mYvEKxuGftqbCTTDYrxLxP_Fk-PEoRgSDa54HZyXQ7agWRp6D6PRhr8rri2aDCbj_COSxqA1zvKOQHdaj-ILY-q1RnX0RLXqVXDOd5ArFyUayOLX13xsWSf4epxT16WUGaMqoplI/s1600/IMG_1727.JPG" height="200" width="119" /></a><a href="https://www.facebook.com/VRFerose74">VR Ferose</a> from SAP sent out the message that connecting would be only the first step, the real value would be to learn from the data and most importantly provide enhanced customer experience. As an example he joked about settling down in the Bay area could be based on three apps google express, amazon prime and uber. IoT instead could go far beyond this experience provide new insights into predicitive maintenance and connected insurance. VR underlined his arguments by a remote control car demo where the premium rate has been adjusted to the driver's driving behavior. Personally, I was happy to see how earlier research [1] finally found its way into practice.
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKM6a5_KdVWaVH7EHtbEXk7i_FHe5UxGyNQZ8d1Ps1hQt5pLw1tiFJHCDl0E3NlIN-k4AajLeRepQnlE7RHc_xZZhyphenhyphenZ-F2mzIEJyYBPLKsRMW3yl8iEMIEOcZHSyY0bpdcqsQCL9SdHFQ/s1600/IMG_1737.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKM6a5_KdVWaVH7EHtbEXk7i_FHe5UxGyNQZ8d1Ps1hQt5pLw1tiFJHCDl0E3NlIN-k4AajLeRepQnlE7RHc_xZZhyphenhyphenZ-F2mzIEJyYBPLKsRMW3yl8iEMIEOcZHSyY0bpdcqsQCL9SdHFQ/s1600/IMG_1737.JPG" height="150" width="200" /></a></div>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnoha7iTGfzPUuyjTN3_0OEPMoIoFauVYGCsEgWYPbUAR9U6xDGKnH6Of-8AIy8ryYI8eMDF65NFEZYqVR0vicCeKfBAELVWxlxqxarbEwmgKrdqibuAHHeoKovikI-muJXhQ9xIOaAeY/s1600/IMG_1735.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnoha7iTGfzPUuyjTN3_0OEPMoIoFauVYGCsEgWYPbUAR9U6xDGKnH6Of-8AIy8ryYI8eMDF65NFEZYqVR0vicCeKfBAELVWxlxqxarbEwmgKrdqibuAHHeoKovikI-muJXhQ9xIOaAeY/s1600/IMG_1735.JPG" height="190" width="200" /></a>The last keynote on the program was delivered by <a href="http://en.wikipedia.org/wiki/Helmuth_Ludwig">Helmuth Ludwig</a>
who described integration of data during industrial manufacturing could be used the optimize performance and time to market. He mentioned the example of <a href="http://www.omneo.com/">Omneo</a> allowing to analyze events at real time. As you can't do physical prototypes for testing <a href="http://en.wikipedia.org/wiki/Mars_rover">mars rover</a>, simulation software can be used to eliminate prototypes, save resources, and increase efficiency.
The future would rely on tools helping companies to produce in new ways, more efficiently and faster. For that reason, Siemens has opened its <a href="http://usa.siemens.com/wot">research lab in Berkeley</a> to build bridges from the knowledge pool of universities and startups to the corporate world. As an example of this bridge he presented the video <a href="https://www.youtube.com/watch?v=qx8YAzZwWGU">The Missing Link</a>.
<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSQOc-k-J_K4mgonPSBIYHnIMMHUWrchE2jCSR6xCIMlgy0avNxmlYDpE-v63CAP7Y1Ebd8SF0coi6ta2pmkljZUkgHnqyAvyDYAI2QBX6f-mFQDHdXip3vb9lW0NNK1ADJx7e40tGe4w/s1600/IMG_1720.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSQOc-k-J_K4mgonPSBIYHnIMMHUWrchE2jCSR6xCIMlgy0avNxmlYDpE-v63CAP7Y1Ebd8SF0coi6ta2pmkljZUkgHnqyAvyDYAI2QBX6f-mFQDHdXip3vb9lW0NNK1ADJx7e40tGe4w/s1600/IMG_1720.JPG" height="150" width="200" /></a>Overall, I enjoyed very much being at this event feeling the great passion for Internet of Things both in the corporate and the startup world. While I found a lot of belief that IoT will happen (e.g. presented by cisco), I still see more thoughts to be spend on innovative ideas about how IoT can really provide value across domains. Connecting millions, billions, trillions - whatever the large number should be - is just the first step. Just having access to more data does not really provide value in itself. <br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjViy2eY3mYDRVukkY58pwiL5qxLn-MB3n-YKsR_xWHZZdPGXhZjIjWRPYjkQJ-mRVq-vbX5OBN75woIUW583HO8mXg2tTjpIBf4iSVkoHuk529RFxceqgYdpulBa5cAzQgz8fYu-lkUTg/s1600/IMG_1722.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjViy2eY3mYDRVukkY58pwiL5qxLn-MB3n-YKsR_xWHZZdPGXhZjIjWRPYjkQJ-mRVq-vbX5OBN75woIUW583HO8mXg2tTjpIBf4iSVkoHuk529RFxceqgYdpulBa5cAzQgz8fYu-lkUTg/s1600/IMG_1722.JPG" height="150" style="cursor: move;" unselectable="on" width="200" /></a>How can we leverage these investments across completely different domains? How can a temperature sensors describe itself as a temperature sensor and team up with an air pressure close by to provide a more comprehensive picture and simultaneously calibrate itself using the data of another temperature sensor close by? Why would the owner of the temperature sensor allow access to his sensor, what could be an appropriate business model look like? How can we keep track of this connected layer, upgrade it and maintain it over time? How much can we achieve in the cloud, what do have to do locally, how can we transition effectively between cloud and edge?<br />
<br />
To make IoT a reality in the enterprise there has to be more than collecting data, as <a href="https://youtu.be/kQHMVKleiN0?t=3m40s">Frank Zappa already recognized</a>: "Information is not knowledge. Knowledge is not wisdom. Wisdom is not truth..." ;)<br />
<br />
[1] Johannes Paefgen, Flavius Kehr, Yudan Zhai, Florian Michahelles: Driving Behavior Analysis with Smartphones: Insights from a Controlled Field Study, Proceedings of the 10th ACM SIGMOBILE Conference on Mobile and Ubiquitous Multimedia (<a href="http://www.mum2012.org/">MUM'12</a>), Ulm, Germany, December 2012 [<a href="http://www.im.ethz.ch/publications/driving_mum12.pdf">PDF</a>].
Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com58tag:blogger.com,1999:blog-6723836170967808000.post-91335621239916159692015-03-05T20:49:00.002+01:002015-03-05T20:55:19.414+01:00Summaries and Impressions: Internet of Things 2014 Conference, MIT, Oct 6-8, 2014<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikwoJzQQlBM0ShyphenhyphentO8ABVSUz3p2t9Dwtu8mwihq0mw8APfAe6k7ot37rtKGndtjrTTk7bRoaoCKI9AKqQfVwuo_geXHjRiY702t1I6t_gl7lkxSA6mnBxu8tfKWZu29LIEbF7xg-SGMFw/s1600/2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikwoJzQQlBM0ShyphenhyphentO8ABVSUz3p2t9Dwtu8mwihq0mw8APfAe6k7ot37rtKGndtjrTTk7bRoaoCKI9AKqQfVwuo_geXHjRiY702t1I6t_gl7lkxSA6mnBxu8tfKWZu29LIEbF7xg-SGMFw/s1600/2.jpg" width="170" /></a><a href="http://www.iot2014.org/" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img alt="www.iot2014.org" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3m6C6TLy2AET3USkIbCrrfnvzXuTuTbuOl2vjS6cA2w2VWqKIsrniGXcUe8oWE8sqPtdz7HSQyvbtbStOa5Z2wifbtYO9CW2DZubiY8zLsw7lf8hH1j73NftWeZrPIVFV-RBVzBeXB1M/s1600/1.jpg" width="120" /></a><span style="font-family: Arial;">I<a href="http://www.iot2014.org/">oT2014</a> is the
continuation of <a href="http://www.iot2008.org/">IoT2008</a> (Zurich), <a href="http://www.iot2010.org/">IoT2010</a> (Tokyo), I<a href="http://www.iot2013.org/">oT2012</a> (Wuxi). This
conference focuses on both academia and industry, it applies a rigorous review
process to research papers (according to IEEE guidelines), features focused
workshops on IoT subtopics as well as demo and poster session presenting early
ideas.<o:p></o:p></span><br />
<br />
<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjQssdR9m4i6T8uQQVy3kntdCayU7L6BiK65VHF0Id-u4rKCa1-lEPb3KidH63azrRhVuRQtE1ki3nBnhHMqvrxhejaU-zbX_AIXBG-RBXadhayvx1bm7LRFvetUU8iuj9ILmiB8qWfi4/s1600/3.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjQssdR9m4i6T8uQQVy3kntdCayU7L6BiK65VHF0Id-u4rKCa1-lEPb3KidH63azrRhVuRQtE1ki3nBnhHMqvrxhejaU-zbX_AIXBG-RBXadhayvx1bm7LRFvetUU8iuj9ILmiB8qWfi4/s1600/3.jpg" height="149" width="200" /></a><br />
<br />
<div class="MsoNormal" style="margin: 0in 0in 10pt;">
<span style="font-family: Arial;">The audience comprises a rather unique set of researchers,
consultants, end-users, funding agency representatives and entrepreneurs.<o:p></o:p></span></div>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8Q7mpM6x7oDEOUfxKnSV7_1Mm5MWfHP8grxk5sU2LNjWZJD-KA-EnuVzvAE6OMMaNNdhUGNwLIB8_qyi_dx2nwSXV19QzPY9zqx9_vt_BLxBC8R5aIPpOVZ0JwB79zipY8UyiAGpWFxk/s1600/4.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8Q7mpM6x7oDEOUfxKnSV7_1Mm5MWfHP8grxk5sU2LNjWZJD-KA-EnuVzvAE6OMMaNNdhUGNwLIB8_qyi_dx2nwSXV19QzPY9zqx9_vt_BLxBC8R5aIPpOVZ0JwB79zipY8UyiAGpWFxk/s1600/4.jpg" height="150" width="200" /></a><br />
<div class="MsoNormal" style="margin: 0in 0in 10pt;">
<!--[if gte vml 1]><v:shape id="Picture_x0020_1" o:spid="_x0000_s1028"
type="#_x0000_t75" style='position:absolute;margin-left:-130.8pt;margin-top:21.2pt;
width:103.2pt;height:103.2pt;z-index:251659264;visibility:visible;
mso-wrap-style:square;mso-width-percent:0;mso-height-percent:0;
mso-wrap-distance-left:9pt;mso-wrap-distance-top:0;mso-wrap-distance-right:9pt;
mso-wrap-distance-bottom:0;mso-position-horizontal:absolute;
mso-position-horizontal-relative:text;mso-position-vertical:absolute;
mso-position-vertical-relative:text;mso-width-percent:0;mso-height-percent:0;
mso-width-relative:page;mso-height-relative:page'>
<v:imagedata src="file:///C:\Users\michfl00\AppData\Local\Temp\msohtmlclip1\01\clip_image003.jpg"
o:title="booth_pic"/>
<w:wrap type="square"/>
</v:shape><![endif]--><!--[if !vml]--><!--[endif]--><span style="font-family: Arial;">Siemens’ </span><a href="http://usa.siemens.com/wot"><span style="color: blue; font-family: Arial;">Web of things</span></a><span style="font-family: Arial;"> research team has been the
this year’s gold sponsor. This yielded an honorary mention of Siemens in the
opening of the conference, a keynote speech (presented by K. Bettenhausen),
sponsor booth and appearance on print material. Additionally, team members of
WoT were visible beyond by organizing the web of things workshop and various
talks.<o:p></o:p></span></div>
<br />
<br />
<div class="MsoNormal" style="margin: 0in 0in 10pt;">
<!--[if gte vml 1]><v:shape id="Picture_x0020_7" o:spid="_x0000_s1026"
type="#_x0000_t75" style='position:absolute;margin-left:19.5pt;margin-top:14.05pt;
width:125pt;height:93.7pt;z-index:251664384;visibility:visible;
mso-wrap-style:square;mso-width-percent:0;mso-height-percent:0;
mso-wrap-distance-left:9pt;mso-wrap-distance-top:0;mso-wrap-distance-right:9pt;
mso-wrap-distance-bottom:0;mso-position-horizontal:absolute;
mso-position-horizontal-relative:text;mso-position-vertical:absolute;
mso-position-vertical-relative:text;mso-width-percent:0;mso-height-percent:0;
mso-width-relative:page;mso-height-relative:page'>
<v:imagedata src="file:///C:\Users\michfl00\AppData\Local\Temp\msohtmlclip1\01\clip_image005.jpg"
o:title="IMG_1103"/>
</v:shape><v:shape id="Picture_x0020_8" o:spid="_x0000_s1027" type="#_x0000_t75"
style='position:absolute;margin-left:153.05pt;margin-top:14pt;width:118.15pt;
height:88.55pt;z-index:251665408;visibility:visible;mso-wrap-style:square;
mso-width-percent:0;mso-height-percent:0;mso-wrap-distance-left:9pt;
mso-wrap-distance-top:0;mso-wrap-distance-right:9pt;
mso-wrap-distance-bottom:0;mso-position-horizontal:absolute;
mso-position-horizontal-relative:text;mso-position-vertical:absolute;
mso-position-vertical-relative:text;mso-width-percent:0;mso-height-percent:0;
mso-width-relative:page;mso-height-relative:page'>
<v:imagedata src="file:///C:\Users\michfl00\AppData\Local\Temp\msohtmlclip1\01\clip_image006.jpg"
o:title="IMG_1102"/>
</v:shape><![endif]--><!--[if !vml]--><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitnwoxJe5nulaqb_IgkkXJs4a8JUXPXXogqsQlO2k-CsNNQ-fyWbP4NWBJAvi_ryRISeIeYf9Tap9U3b3cK3kMKXVjBktZsURmLsnZrfJVzlvYtW9h2P6VdYE46gu15y5kdewM8cl1MKE/s1600/6.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitnwoxJe5nulaqb_IgkkXJs4a8JUXPXXogqsQlO2k-CsNNQ-fyWbP4NWBJAvi_ryRISeIeYf9Tap9U3b3cK3kMKXVjBktZsURmLsnZrfJVzlvYtW9h2P6VdYE46gu15y5kdewM8cl1MKE/s1600/6.jpg" height="150" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0O7oMtUel-r8zWv5m3SokeOj1SSO6QlG0oQ8kznSHAQZjT4QS-2E97rIQoLUUvtH5o7eSugNyCXBUPoYJ5Khx-q99KZ3xp00bvo-lSVyzeq_mltQRRLdk0Ubq_dx_-4PDAfr0wrLnZds/s1600/5.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0O7oMtUel-r8zWv5m3SokeOj1SSO6QlG0oQ8kznSHAQZjT4QS-2E97rIQoLUUvtH5o7eSugNyCXBUPoYJ5Khx-q99KZ3xp00bvo-lSVyzeq_mltQRRLdk0Ubq_dx_-4PDAfr0wrLnZds/s1600/5.jpg" /></a>The keynote of <a href="https://www.linkedin.com/in/kurtdbettenhausen">Kurt Bettenhausen</a> (Siemens) highlighted the economic importance of manufacturing industry across the world. He expressed the need for innovation in order to keep up with the pace of innovation coming from China. Thus, in Germany the vision of <a href="http://www.plattform-i40.de/">Industrie 4.0</a> has been created which suggests products carrying all the data throughout the production process describing the steps for the product necessary to get produced. The driver for this vision are individual customer needs, dynamic design of engineer, new services, increased efficiency, and the importance of work-life balance of workers. After the lost battle in internet technologies, software and mobile services, it's the European industries' chance to make <a href="http://www.siemens.de/industrie-4.0/">Industrie 4.0</a> a reality. This should allow companies to gain more flexibility in manufacturing control, reduction of energy and shorter time to market. In addition to the efforts and opportunities of big data analytics, there is much more knowledge available locally during the production process already which should be leveraged: why re-learning constraints from data analytics as they were already know during the design process. Questions from the audience focused on the performance of the Industrie 4.0 project progress in Germany and explicit examples of I4.0. The keynote speaker mentioned successful collaboration between research, industry and government but was not willing to disclose specific examples of I4.0.</div>
<div class="MsoNormal" style="margin: 0in 0in 10pt;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVR2TkLkspifB-MOUqiIQ7499cIqAvmZiKIHpmg9syNBw2QcQ5Hshd5shwh1bsOvHd1MKYzGgy2HwZ0hsOhbTBQD4mMUcQ3ppQOJCfea3YEmPJkCWOvx8uD3USSzD7AtFDebZxIwgoyl4/s1600/7.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVR2TkLkspifB-MOUqiIQ7499cIqAvmZiKIHpmg9syNBw2QcQ5Hshd5shwh1bsOvHd1MKYzGgy2HwZ0hsOhbTBQD4mMUcQ3ppQOJCfea3YEmPJkCWOvx8uD3USSzD7AtFDebZxIwgoyl4/s1600/7.jpg" height="150" width="200" /></a><a href="http://groups.csail.mit.edu/ana/People/Clark.html">David Clark</a> (MIT) explained why the<span style="font-family: "Arial","sans-serif"; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">
Internet has been so successful despite and because of the many design flaws and
compromises. He started out with reflecting on the initial goals of the Internet back in 1975: development of a generic, global reaching, layered approach following network. In retrospect he admitted various flaws. Configuring wifi routers in today's home can be challenging as the design of the IP protocol would not care about configuration. Also the systems would neither know nor care what the user was doing and could not never tell if there was going something wrong. Furthermore, the Internet was never designed for mobility. Instead, the IP protocol was designed as a stupid network. As key learnings David derived,</span></div>
<span style="font-family: "Arial","sans-serif"; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"></span><br />
<div class="MsoNormal" style="margin: 0in 0in 10pt;">
<blockquote class="tr_bq">
<span style="font-family: "Arial","sans-serif"; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">If you build an ugly system, everybody says how
ugly it is, if you build a well-defined system, nobody will
ever look at it. </span></blockquote>
<span style="font-family: "Arial","sans-serif"; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><o:p>Thus, the consequences for today are that connectivity is not a cost issue anymore but configuration is. Initially the Internet has been designed to route packets, the rest was left up to the application, today the Internet is more about routing money, package routing is just a side-effect;)</o:p></span><br />
<div class="MsoNormal" style="margin: 0in 0in 10pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXEvZeKg9SgDHwj6GDxscWw5shR7yRVoZGVKbn_10T4dRVwsoLwO2_KTdZRwXBED5WaeOtxcCkTe2BM5dbA8B6WhGyu7IB_LBu2yd_UpTDMXsEwsxKsOC4ascJ4ZCNjcvekBX6HaAAhRQ/s1600/8.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXEvZeKg9SgDHwj6GDxscWw5shR7yRVoZGVKbn_10T4dRVwsoLwO2_KTdZRwXBED5WaeOtxcCkTe2BM5dbA8B6WhGyu7IB_LBu2yd_UpTDMXsEwsxKsOC4ascJ4ZCNjcvekBX6HaAAhRQ/s1600/8.jpg" /></a><o:p>An IoT panel discussion has been lead by <a href="http://www.im.ethz.ch/people/ailic">Alex Ilic</a> from the Auto-ID Labs. The keypoints raised by the panelists <a href="http://meche.mit.edu/people/?id=74">Sanjay Sarma</a> (MIT), <a href="http://www.im.ethz.ch/people/efleisch">Elgar Fleisch</a> (ETH Zurich/HSG) and <a href="http://jenson.org/about-scott/">Scott Jenson</a> (Google) were interesting and diverse. The Internet of Things should develop successfully in specific verticals first and then only derive generic principles for cross domain platforms. This would counter the "European" approach of EU-funded projects which have spend time and money on developing bullet proof and shiny solutions which have a hard time of adoption in any domain. There was, however, no consensus which approach would succeed, at least the Internet has followed build-it/fix-it approach;). History of industry has shown that whenever a dominant design [1] has evolved, the industry became successful. For the IoT we are still missing this dominant design, who could lead this effort, IT players, or verticals? Finally, healthcare was mentioned to bear the greatest potential for IoT, as here it is not just about money but about a huge societal problem. Healthcare is so expensive today and differences between developed and developing world are tremendous. IoT would have the potential to link information and devices, provide access, empower people, drive costs, and challenge expensive equipment, e.g. MRI's, with simpler sensors embedded in connected billions of phones.</o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: "Arial","sans-serif"; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtdodvQQ7h-MyEjySom3iZFuVzsK2K3TMjzywL40yTpaEbOZ7kIkOTDASwISD93FpMmI9RY0gwDqMjMA80XKYD5iYmlyhzxDaOTLtmZm67FeTGv4Q8AB47M04RSpgvKMSS1M9HPP6HNuM/s1600/10.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtdodvQQ7h-MyEjySom3iZFuVzsK2K3TMjzywL40yTpaEbOZ7kIkOTDASwISD93FpMmI9RY0gwDqMjMA80XKYD5iYmlyhzxDaOTLtmZm67FeTGv4Q8AB47M04RSpgvKMSS1M9HPP6HNuM/s1600/10.jpg" height="149" width="200" /></a></span></div>
<div class="MsoNormal" style="margin: 0in 0in 10pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV0pcCyzQhGJrvIc46CAndeyggRvWwa7icC_pKLOjpL7fejhWzoBn0SjqjM8HT-7azrUQzOQQhMNpz3nlRZvdbvPWVRPu4MfRX9zHrk2N-8425Z49zc9jU2EzF-6zBfE1T5GYXhI4MEGc/s1600/9.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV0pcCyzQhGJrvIc46CAndeyggRvWwa7icC_pKLOjpL7fejhWzoBn0SjqjM8HT-7azrUQzOQQhMNpz3nlRZvdbvPWVRPu4MfRX9zHrk2N-8425Z49zc9jU2EzF-6zBfE1T5GYXhI4MEGc/s1600/9.jpg" height="149" width="200" /></a><o:p><a href="https://www.linkedin.com/in/shoumendatta">Shouman Datta</a> (MIT) built upon the argument of the previous panel discussion that IoT should not be just about money but even more about societal challenges. The grand challenge would be to build a platform that creates an ecosystem for other to follow. The vision of the IoT would be rather old anyway. Shouman mentioned projects like 'pay per pee', monitoring at the toilet, odd projects like 'print your face' and others. The ultimate potential for IoT in healthcare will be to connect a plethora of dumb disconnected device of today, increase patient safety and increase building a more comprehensive understanding what's going in the human body for longer periods of time.</o:p></span></div>
<div class="MsoNormal" style="margin: 0in 0in 10pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><o:p>Overall, the IoT conference has been a very exciting event. It has provided the unique mixing researchers and practitioners which is hard to find. I'm very much looking forward to the 2015 edition in Korea: <a href="http://www.iot2015.org/">www.iot2015.org</a></o:p></span></div>
<div class="MsoNormal" style="margin: 0in 0in 10pt;">
<span style="font-family: "Arial","sans-serif"; font-size: 11pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;"><span style="font-family: Times New Roman; font-size: small;">
[1] <span class="reference-text">Mastering the Dynamics of Innovation, Utterback (1994) Harvard Business School Press <a class="internal mw-magiclink-isbn" href="http://en.wikipedia.org/wiki/Special:BookSources/0875843425">ISBN 0-87584-342-5</a> Library call numbers HD58.8.U87 1994 658.4'06—dc20, p 24.</span></span></span></div>
</div>
Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com16tag:blogger.com,1999:blog-6723836170967808000.post-5545280563938056792013-06-26T00:18:00.001+02:002013-06-26T00:38:17.768+02:00IoT has arrived in industryEight years from now I started with the <a href="http://www.autoidlabs.ch/">Auto-ID Labs</a> at <a href="http://www.im.ethz.ch/">ETH Zurich</a>. Our mission statement has been "<a href="http://autoidlabs.org/">architecting the Internet of Things</a>". The underlying principle was to build physical presences of physical objects, i.e. digital counterparts that would be linked to physical things through RFID, barcodes, or any other kinds of identifiers [1].<br />
For specifying the architecture we investigated the application using RFID against anti-counterfeiting. We developed various mechanisms to verify the authenticity of a product based on its identifier, history of trace and physical fingerprints [2]. Simultaneously, we recognized the tremendous potential of not only linking supply-chain partners to the Internet of Things but to also develop new channels to consumers and to also captcollect crowd-sourced data from them [3]. While NFC technology has been not ready for this for a while we started with mobile barcode reader software first [4].<br />
In addition to the Auto-ID Labs' research agenda of how to make things, products and objects part of the Internet, other communities, such as Web-of-Things researchers, have started exploring how to reuse existing web-standards, e.g. REST, or to expand to new standards, e.g. CoaP, in order to let addressing and communications with the Internet reaching out to more resource-constrained devices and sensors [5].<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwKNijUvlbL1LatAJd5TWlqU9-i_m9psy_3bha8HXuljHo4Eaf9NescAkagHZjaEesqgcljt4TfZllcmuLQE9EoAWT81cPUN_bLIdxgL0RyBi9Ua-LrpVq9rtIRt-W_iH6ZhYbRZEu5D4/s1600/IMG_20130304_130942_cr.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="135" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwKNijUvlbL1LatAJd5TWlqU9-i_m9psy_3bha8HXuljHo4Eaf9NescAkagHZjaEesqgcljt4TfZllcmuLQE9EoAWT81cPUN_bLIdxgL0RyBi9Ua-LrpVq9rtIRt-W_iH6ZhYbRZEu5D4/s200/IMG_20130304_130942_cr.jpg" width="200" /></a>Meanwhile, governments (e.g. <a href="http://florian-michahelles.blogspot.de/2013/03/the-german-perspective-of-iot-industrie.html">Germany</a> and <a href="http://florian-michahelles.blogspot.de/2011/06/iot-in-china-revisited-centralized.html">China</a>) and industry have recognized the Internet of Things as a new paradigm for upgrading their sectors and products from mere physical objects to networked items coupled with services. Several terminologies, such as Industrial Internet [6], <a href="http://blog.bosch-si.com/category/internet-of-things/">Internet of Things and Services</a>, <a href="http://www.ericsson.com/uxblog/2012/04/a-social-web-of-things/">Social web of things</a>, Internet of everything [7], describe attempts of occupying space in the emerging Internet of Things through proprietary and still mainly closed developments.<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeHayQvTEBJ3-SaM_dUInk_FP7DgUsZF8q9RSqGS4derjK9KI1D0H9a9_qh86ev8R-Uc17PFE7UZK6wS6nF2c4lPtZ5Wmyv0rdY1TjOgAauWGjBwwTNxGbrXq7emI4JrkAgxpctQMrhas/s1600/IMG_20130308_123155_cr.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeHayQvTEBJ3-SaM_dUInk_FP7DgUsZF8q9RSqGS4derjK9KI1D0H9a9_qh86ev8R-Uc17PFE7UZK6wS6nF2c4lPtZ5Wmyv0rdY1TjOgAauWGjBwwTNxGbrXq7emI4JrkAgxpctQMrhas/s200/IMG_20130308_123155_cr.jpg" width="190" /></a>The success of the Internet was mainly based on the absence of interest of industrial partners in the early days, such that a few academics could set out the communication principles of TCP/IP which was designed to be open and flexible on future developments on the top in terms of new applications and from the bottom regarding new communication technologies and protocols.<br />
The development of the Internet of Things, instead, is challenged various powerful players who aim at building their own platforms separat from others. Here, I believe in the evolution of developments as we could observe from the MNO's: today, all walled gardens have disappeared and mobile users can access the Internet regardless of their provider.<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsy3TI_QU9K3q1xtjAmO_i8_UrHESe6gd1fsqd4WPwPdEpru3QsXaZ0eFUlW61-_oLxBuFiLFV8lZ20ENVDwW7yn8ltx-trP-3ISc1fbIfIRJqdiw7pa_Zaw6i-u9Kh6k0irWf6wNJzo8/s1600/IMG_20130305_174036_cr.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="135" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsy3TI_QU9K3q1xtjAmO_i8_UrHESe6gd1fsqd4WPwPdEpru3QsXaZ0eFUlW61-_oLxBuFiLFV8lZ20ENVDwW7yn8ltx-trP-3ISc1fbIfIRJqdiw7pa_Zaw6i-u9Kh6k0irWf6wNJzo8/s200/IMG_20130305_174036_cr.jpg" width="200" /></a>The power of the Internet of Things lies in the integration of information and sensor data of various sources, the re-use of the same sensor data for various applications, and the creativity of 3rd party developers as the app-store models have proven successful.<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSD6BWM-gh8xqiOpDqIXsDOh6FNSVRcAdJmYbjsck7UaChTJmkz_vAZ3bxLZcbMWlEEKVoJdBoH0IZZQZuHfvjS7S9cpTW5orT_SD6oknzSMALhcmxjGY-rShPKR8rBXeH46gZ3G3rFsA/s1600/IMG_20130402_074039_cr.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="73" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSD6BWM-gh8xqiOpDqIXsDOh6FNSVRcAdJmYbjsck7UaChTJmkz_vAZ3bxLZcbMWlEEKVoJdBoH0IZZQZuHfvjS7S9cpTW5orT_SD6oknzSMALhcmxjGY-rShPKR8rBXeH46gZ3G3rFsA/s200/IMG_20130402_074039_cr.jpg" width="200" /></a>The Internet of Things has arrived in industry, I'm very excited about how the various players will manage their transformation from platform owner, hardware developers with long development cycles, and contracted partner networks to agile software developers that release beta-products and stay in a continuous dialogue with their customers.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfoYimhaEbJt8w0ww3PMgKb9GViR5rSYXmL-eflRH_6CAr6xdR2k8OOsot3jUvUOsQ4dMDgGKeLfh9iYhA06d0VQM1QA3cUZPj9uWIWJnlyzmUfZE4F2_vto64YEjLX_eRAHydj9l7SZo/s1600/IMG_20130319_094335.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfoYimhaEbJt8w0ww3PMgKb9GViR5rSYXmL-eflRH_6CAr6xdR2k8OOsot3jUvUOsQ4dMDgGKeLfh9iYhA06d0VQM1QA3cUZPj9uWIWJnlyzmUfZE4F2_vto64YEjLX_eRAHydj9l7SZo/s200/IMG_20130319_094335.jpg" width="200" /></a></div>
At this point I'm very happy to hand-over the lead of the Auto-ID labs to <a href="http://www.im.ethz.ch/people/ailic">Alexander Ilic</a>. Alexander has a strong background in retail applications, investigating offerings of new services to retail clients via digital receipts (see <a href="http://www.cosibon.de/">cosibon</a>). Simultaneously, I'm very happy for the opportunity to drive forward the development of the Internet of Things in industry!<br />
<br />
[1] D. Uckelmann, M. Harrison, & F. Michahelles(Eds.), Architecting the Internet of Things. Berlin, Germany: Springer. <a href="http://www.springerlink.com/content/x3121781555n0741/">ISBN 978-3-642-19156-5</a><br />
[2] Lehtonen, M.; Michahelles, F.; Fleisch, E. : <a href="http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4383013">Trust and Security in RFID-based Product Authentication Systems</a>.<a href="http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=4267003"> IEEE Systems Journal</a>, Special Issue on RFID Technology: Opportunities and Challenges, First Quarter of 2008.<br />
[3] S. Karpischek, F. Michahelles, E. Fleisch, my2cents – enabling research on consumer-product interaction, to appear in Special Issue on "Smartphone Applications and Services for Pervasive Computing", Journal of Personal and Ubiquitous Computing - Springer, 2011, ISSN 1617-490,<a href="http://www.springerlink.com/content/x8255r2713g278h4/">Doi: 10.1007/s00779-011-0426</a>.<br />
[4] F. von Reischach, S. Karpischek, R. Adelmann, F. Michahelles: Evaluation of 1D barcode scanning on mobile phones, Internet of Things 2010 Conference (<a href="http://www.iot2010.org/">IoT2010</a>), Tokyo, Japan, November - December 2010<br />
<br />
<br />
<br />
<br />
[5] Vlad Trifa, Dominique Guinard, Simon Mayer: <a class="publink" href="http://www.vs.inf.ethz.ch/publ/papers/Trifa10book.pdf">Leveraging the Web for a Distributed Location-aware Infrastructure for the Real World.</a>In: Erik Wilde, Cesare Pautasso (Eds.): REST: From Research to Practice. Springer, ISBN 978-1-4419-8302-2, pp. 381-400, New York, 2011<br />
<div>
Peter C. Evans, Marco Annunziata: Industrial Internet, GE, Nov 26, 2012. [<a href="http://www.ge.com/docs/chapters/Industrial_Internet.pdf">pdf</a>]</div>
<div>
[7] Dave Evans: <a href="http://www.cisco.com/web/about/ac79/docs/innov/IoE.pdf">The Internet of Everything</a>, Whitepaper, Cisco, 2012.</div>
<br />Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com18tag:blogger.com,1999:blog-6723836170967808000.post-22566740811814970272013-05-07T00:09:00.000+02:002013-05-07T00:10:33.107+02:002nd CfP: Workshop on Pervasive Technologies in Retail Environments at UbiComp 2013<h2 data-mce-style="text-align: center;" style="text-align: center;">
PeTRE - Workshop on Pervasive Technologies in Retail Environments</h2>
<div data-mce-style="text-align: center;" style="text-align: center;">
<b>at UbiComp <a data-mce-href="http://www.pervasive-retail.com" href="http://www.pervasive-retail.com/" title="2nd CfP: Workshop on Pervasive Technologies in Retail Environments at UbiComp 2013">2013</a></b><br />
<a data-mce-href="http://www.pervasive-retail.com" href="http://www.pervasive-retail.com/" title="2nd CfP: Workshop on Pervasive Technologies in Retail Environments at UbiComp 2013">http://www.pervasive-retail.com</a></div>
<div data-mce-style="text-align: center;" style="text-align: center;">
<i>organized by</i></div>
<div data-mce-style="text-align: center;" style="text-align: center;">
<i>Markus Löchtefeld, Petteri Nurmi,Florian Michahelles, Carsten Magerkurth, Patrik Floréen and Antonio Krüger</i></div>
<div data-mce-style="text-align: center;" style="text-align: center;">
Zürich, Switzerland, September 8th, 2013</div>
<h3>
</h3>
<h3>
About</h3>
The
workshop on Pervasive Technologies in Retail Environments (PeTRE) is
the continuation of MIRE 2011 (http://dfki.de/mire held at MobileHCI
2011) and provides an established forum for researchers from academy and
industry exploring how pervasive technologies can be embedded into
retail environments to create new shopping experiences and services. The
goals of the workshop are to<br />
<ul>
<li>discuss the integration of pervasive technologies into retailing;</li>
<li>construct a roadmap for future integration of pervasive technologies in retailing</li>
<li>strengthen and extend the community of this rapidly developing field.</li>
</ul>
We
invite both case studies discussing real-world deployments as well as
original research contributions in one of the following topic areas:<br />
<ul>
<li>mobile applications for retail contexts,</li>
<li>location sensing and customer flow analysis</li>
<li>pervasive public displays</li>
<li>personalization and user/customer modeling for the retail domain</li>
<li>human product interaction</li>
<li>infrastructure standards</li>
<li>integration and interaction with robots and drones</li>
<li>infrastructure combining eCommerce with brick and mortar stores</li>
<li>social media in the retail context,</li>
<li>business models and social impact.</li>
</ul>
<h3>
</h3>
<h3>
Workshop format and submissions</h3>
The
workshop on Pervasive Technologies in Retail Environments (PeTRE) is a
full-day workshop with an extended thematic scope and aims to bring
together researchers and practitioners from academia and industry with
multidisciplinary insights being explicitly encouraged. We ask for
papers (two-pages position-statement-paper or four-pages research-paper)
that address one or more of the research questions mentioned above, or
that describe findings that relate to these research questions based on
systems the authors have built.<br />
We highly encourage bringing a demonstration of your prototype if available and presenting it at the Workshop!<br />
Papers should be formatted according to the Ubicomp 2013 Workshop Format. (<a data-mce-href="http://www.ubicomp.org/ubicomp2013/calls/templates.php" href="http://www.ubicomp.org/ubicomp2013/calls/templates.php" title="submission template">http://www.ubicomp.org/ubicomp2013/calls/templates.php</a>
please remove the copyright notice). Papers should be submitted using
the electronic submission system available on the website (<a data-mce-href="http://www.pervasive-retail.com" href="http://www.pervasive-retail.com/" title="2nd CfP: Workshop on Pervasive Technologies in Retail Environments at UbiComp 2013">http://www.pervasive-retail.com</a>). At least one author of an accepted paper is required to register for the workshop.<br />
Each
paper will be reviewed by at least two members of an international
program committee. All accepted papers will be made available online on
the workshop website as well as in the ACM Digital Library.<br />
<h3>
</h3>
<h3>
Important dates</h3>
<code> May 20, 2013: Submission Deadline<br /> June 3, 2013: Author Notification<br /> June 20, 2013: Submission of camera-ready version<br /> September 8, 2013: Workshop in Zurich, Switzerland</code><br />
<h3>
</h3>
<h3>
Website and more information</h3>
<a data-mce-href="http://www.pervasive-retail.com" href="http://www.pervasive-retail.com/" title="2nd CfP: Workshop on Pervasive Technologies in Retail Environments at UbiComp 2013">http://www.pervasive-retail.com</a><br />
If you have any additional questions please contact us via email:<br />
markus.loechtefeld@dfki.de<br />
<h3>
</h3>
<h3>
Organizers</h3>
Markus Löchtefeld, German Research Center for Artificial Intelligence (DFKI), Germany<br />
Petteri Nurmi, Helsinki Institute for Information Technology (HIIT), Finland<br />
Florian Michahelles, Auto-ID Labs, ETH Zurich, Switzerland<br />
Carsten Magerkurth, SAP (Switzerland) AG, Switzerland<br />
Patrik Floréen, Helsinki Institute for Information Technology (HIIT), Finland<br />
Antonio Krüger, German Research Center for Artificial Intelligence (DFKI), GermanyFlorian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com6tag:blogger.com,1999:blog-6723836170967808000.post-59971340017522265222013-04-23T18:15:00.002+02:002013-04-23T18:16:33.871+02:00Streetspotr - the mechanical turk in the wild<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4ofFgBf3_78yPTfvY7Q4hIaV26xe4jGcOcsiqjxOKkcByG-ltCNsE-g34bDPCHI1HpXRkGC3VjWy_JHPFjfypeiX6XILVIMJpKP4VrwAjOyCvEJv6oGY7sCgXLmNzPlePjcDNpuEwjhA/s1600/IMG_20130411_132428.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4ofFgBf3_78yPTfvY7Q4hIaV26xe4jGcOcsiqjxOKkcByG-ltCNsE-g34bDPCHI1HpXRkGC3VjWy_JHPFjfypeiX6XILVIMJpKP4VrwAjOyCvEJv6oGY7sCgXLmNzPlePjcDNpuEwjhA/s200/IMG_20130411_132428.jpg" width="200" /></a>As part of my lecture <a href="http://www.im.ethz.ch/education/FS13/iot_lec">Businees Aspects of the Internet of Things</a> I could welcome Werner Hoier and Dorothea Utzt from <a href="http://streetspotr.com/">Streetspotr.com</a> as guest lecturers (<a href="http://www.im.ethz.ch/education/FS13/slides/streetspotr_ethz.pdf">slides</a>).<br />
They shared some interesting insights about their start-up which implements the idea of match-making between location-based micro-task issuing and fullfilling (as described earlier by [1]). Having reached out to 180k users who are only waiting for earning some fractions of a EURO by solving tasks like "take a picture of the menu in restaurant", "collect the GPS location of a parking lot", or "check the availability of an ATM". Without marketing but mostly relying on public media and blogs who featured their story they could build up their user base.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-G7Gx3OCDDOy8pvShIjQ4xC2im6mxanrg0QWR04hjkVreAKPTQw98a-biwip-4Yp1P_TDXf_gozgQSXLJlcIFnhsqQO3r4aD83f-098GzZ9DLwPJvwEg24fNy4gpy3hhNP-irIfEbplU/s1600/IMG_20130411_134946.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-G7Gx3OCDDOy8pvShIjQ4xC2im6mxanrg0QWR04hjkVreAKPTQw98a-biwip-4Yp1P_TDXf_gozgQSXLJlcIFnhsqQO3r4aD83f-098GzZ9DLwPJvwEg24fNy4gpy3hhNP-irIfEbplU/s200/IMG_20130411_134946.jpg" width="150" /></a></div>
Interesting enough they are no longer looking for more users but rather for more job issuers. Also, so far they refrained from allowing to share user-to-user services. Their service nicely extends traditional services of market survey agencies. They reported about their most successful user who already earned a 600 EUR on their platform.<br />
<br />
I'm really curious how this micro-task business evolves. I could well see opportunities for people waiting or being stuck somewhere and either earn money or giving something back by solving small little tasks in their downtime. Furthermore, finding a proper alignment between situation of the user and available tasks and corresponding rewards should be key to success, see also [2].<br />
<br />
[1] Florian Alt, Alireza Sahami Shirazi, Albrecht Schmidt, Urs Kramer, and
Zahid Nawaz. 2010. Location-based crowdsourcing: extending crowdsourcing
to the real world. In <i>Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries</i> (NordiCHI '10). <a href="http://dl.acm.org/citation.cfm?id=1868921" target="_self">link</a><br />
[2] Navkar Samdaria, Akhil Mathur, and Ravin Balakrishnan. 2012. Paying in kind for crowdsourced work in developing regions. In <i>Proceedings of the 10th international conference on Pervasive Computing</i> (Pervasive'12), Judy Kay, Paul Lukowicz, Hideyuki Tokuda, Patrick Olivier, and Antonio Krüger (Eds.). <a href="http://link.springer.com/chapter/10.1007%2F978-3-642-31205-2_21">link</a> Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com2tag:blogger.com,1999:blog-6723836170967808000.post-57305375777973689342013-04-23T17:46:00.002+02:002013-06-26T00:43:04.870+02:00Thad Starner - the personalized Augmented Human<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<w:DoNotOptimizeForBrowser/>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin:0cm;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;}
</style>
<![endif]-->
<br />
<div class="MsoPlainText">
I was lucky to visit the closing keynote of Thad Starner at the 3rd <a href="http://www.hcilab.org/ah2013/">Augmented Human Conference</a> held in Stuttgart in March 2013.</div>
<div class="MsoPlainText">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.hcilab.org/ah2013/images/photos/131.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="213" src="http://www.hcilab.org/ah2013/images/photos/131.jpg" width="320" /></a></div>
<br /></div>
<div class="MsoPlainText">
As part of Thad's talks he pulled out his favorite 2-second rule which says: the longer accessing a device exceeds 2s, the more its actually usage would decrease exponentially. Thus, he made a claim that wrist watch interface always sitting on one's wrist ready to use should be more successful than mobile phones which have to pulled out of the pocket. He showed a compelling example of implementing a pie-chart interface using the 12 positions of an analog watch to "dial into apps" [1]. </div>
<div class="MsoPlainText">
<br /></div>
<div class="MsoPlainText">
Then he showed the <a href="https://www.youtube.com/watch?v=6BTCoT8ajbI">promo video</a> on google glasses, which uses voice control to record video and display related information.</div>
<div class="MsoPlainText">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgazJUxAUyMNr2_eutuncd9J0l7zYTQsddo64-duveAqQ0pNKdTfUYUtkdOZ4myDAWhAw_maAZup4A0fYl-57LaK7VPXOYZofKYYwYtiuVEDTswsW-YVmUYVggvRMW6LrCE6SlYpt6ncbY/s1600/IMG_20130307_185711_cr.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="187" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgazJUxAUyMNr2_eutuncd9J0l7zYTQsddo64-duveAqQ0pNKdTfUYUtkdOZ4myDAWhAw_maAZup4A0fYl-57LaK7VPXOYZofKYYwYtiuVEDTswsW-YVmUYVggvRMW6LrCE6SlYpt6ncbY/s400/IMG_20130307_185711_cr.jpg" width="400" /></a></div>
<div class="MsoPlainText">
He ended his talk with teaching muscle memory applied to the example of <a href="http://www.youtube.com/watch?v=uEdr6iY6F-w">how to learn to play piano</a> (well, or at least to play some one-handed melodies;). Finally, he showed some working examples of brain-computer interfaces which generally perform very slow in allowing users to convey control information at only about 1bit per second. However, he could show how to pick up American sign language gestures from reactions of the motor cortex. His final vision would be to allow patients without movements to communicate with their environment.</div>
<br />
Overall, I was intrigued by Thad's lecture style: instead of selling his research he puts himself into the position of a critical spectator of his own research who gets excited and convinced by his own results. Indeed, a smart way of presenting.<br />
<br />
[1] Daniel Ashbrook, Kent Lyons, and Thad Starner. 2008. <a href="http://dl.acm.org/citation.cfm?id=1409276">An investigation into round touchscreen wristwatch interaction</a>. In <i>Proceedings of the 10th international conference on Human computer interaction with mobile devices and services</i> (MobileHCI '08). Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com32tag:blogger.com,1999:blog-6723836170967808000.post-91055170426398704462013-04-23T17:25:00.003+02:002013-04-23T17:26:46.726+02:00A short report about NFC 2013<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-Cmzz2TfDudA/URLaFR-_vuI/AAAAAAAAAAw/Bhit29Jtvq0/s640/DSCN1536.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="http://1.bp.blogspot.com/-Cmzz2TfDudA/URLaFR-_vuI/AAAAAAAAAAw/Bhit29Jtvq0/s200/DSCN1536.JPG" width="200" /></a></div>
<a href="http://1.bp.blogspot.com/-SLucxhG8gFA/URLaK94QMxI/AAAAAAAAAA4/z-REcssWq3s/s640/DSCN1537.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="http://1.bp.blogspot.com/-SLucxhG8gFA/URLaK94QMxI/AAAAAAAAAA4/z-REcssWq3s/s200/DSCN1537.JPG" width="200" /></a>As program chairs Josef Langer and T<span id="goog_1103282144"></span><span id="goog_1103282145"></span>uomo Tuika opened the Fifth International Workshop on Near-field Communication (<a href="http://nfc-workshop.org/2013/">NFC2013</a>) in Zurich on February 5, 2013. I as the general chair introduced briefly about the previous hype on NFC and it's current loss against national football conference on <a href="http://www.google.com/trends/explore#q=nfc">google trends</a>.<br />
<div data-canvas-width="661.4634898223878" data-font-name="g_font_p0_3" dir="ltr" style="font-family: serif; font-size: 13.2835px; left: 77.2787px; top: 153.668px; transform-origin: 0% 0% 0px; transform: scale(1.01141, 1);">
The goal of the workshop was to bring together experts on RF and smartcards technology, security, NFC-related applications,</div>
<div data-canvas-width="661.4634898223879" data-font-name="g_font_p0_3" dir="ltr" style="font-family: serif; font-size: 13.2835px; left: 77.2787px; top: 169.608px; transform-origin: 0% 0% 0px; transform: scale(0.9814, 1);">
services and business processes. We received 22 research paper submissions around these topics. A rigorous review</div>
<div data-canvas-width="661.4634898223877" data-font-name="g_font_p0_3" dir="ltr" style="font-family: serif; font-size: 13.2835px; left: 77.2787px; top: 185.548px; transform-origin: 0% 0% 0px; transform: scale(1.02871, 1);">
process was followed with each paper receiving three reviews from international experts of the program committee. Based</div>
<div data-canvas-width="661.4634898223878" data-font-name="g_font_p0_3" dir="ltr" style="font-family: serif; font-size: 13.2835px; left: 77.2787px; top: 201.488px; transform-origin: 0% 0% 0px; transform: scale(0.984321, 1);">
upon this process, thirteen full papers were selected to appear in these proceedings and to be presented at the workshop. This</div>
<div data-canvas-width="243.10071747207644" data-font-name="g_font_p0_3" dir="ltr" style="font-family: serif; font-size: 13.2835px; left: 77.2787px; top: 217.428px; transform-origin: 0% 0% 0px; transform: scale(1.01716, 1);">
resulted in an acceptance rate of 59% for 2013.</div>
<div data-canvas-width="532.972519924164" data-font-name="g_font_p0_3" dir="ltr" style="font-family: serif; font-size: 13.2835px; left: 77.2787px; top: 265.249px; transform-origin: 0% 0% 0px; transform: scale(0.998076, 1);">
The papers covered a range of topics related to NFC payment and ticketing, security, retail applications, and NFC communication. </div>
<div data-canvas-width="532.972519924164" data-font-name="g_font_p0_3" dir="ltr" style="font-family: serif; font-size: 13.2835px; left: 77.2787px; top: 265.249px; transform-origin: 0% 0% 0px; transform: scale(0.998076, 1);">
<br />
Marcello Morean started off with a <a href="http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6482446&contentType=Conference+Publications&searchField%3DSearch_All%26queryText%3DNear+Field+Communication+.LB.NFC.RB.%2C+2013+5th+International+Workshop+On">secure solution for mobile ticketing</a>.<br />
Christian Saminger presented a solution of <a href="http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6482448&contentType=Conference+Publications&searchField%3DSearch_All%26queryText%3DNear+Field+Communication+.LB.NFC.RB.%2C+2013+5th+International+Workshop+On">ticketing using the inverse reader mode</a> where the phone acts as reader/write device whereas terminal emulates the nfc ticketing card. This approach works on any nfc without requiring a secure element.<br />
<a href="http://sphotos-a.ak.fbcdn.net/hphotos-ak-ash3/579547_188493274607877_954840301_n.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="http://sphotos-a.ak.fbcdn.net/hphotos-ak-ash3/579547_188493274607877_954840301_n.jpg" width="200" /></a>Next, Gerald Madlmayr talked about the <a href="http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6482440&contentType=Conference+Publications&searchField%3DSearch_All%26queryText%3DNear+Field+Communication+.LB.NFC.RB.%2C+2013+5th+International+Workshop+On">nfc payment ecosystem</a>. </div>
Michael Roland presented on<a href="http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6482441&contentType=Conference+Publications&searchField%3DSearch_All%26queryText%3DNear+Field+Communication+.LB.NFC.RB.%2C+2013+5th+International+Workshop+On"> hacking and fixing relay attacks</a> against the google wallet. Ali Alshehri explained how to analyse <a href="http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6482439&contentType=Conference+Publications&searchField%3DSearch_All%26queryText%3DNear+Field+Communication+.LB.NFC.RB.%2C+2013+5th+International+Workshop+On">coupon protocols using the CASPER/FDR framework</a>.<br />
<br />
Marcello Morena stepped in for his colleagues and reported about <a href="http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6482445&contentType=Conference+Publications&searchField%3DSearch_All%26queryText%3DNear+Field+Communication+.LB.NFC.RB.%2C+2013+5th+International+Workshop+On">user-centered design process of developing an NFC museum app</a>.<br />
Mark Lochrie showed how to use <a href="http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6482442&contentType=Conference+Publications&searchField%3DSearch_All%26queryText%3DNear+Field+Communication+.LB.NFC.RB.%2C+2013+5th+International+Workshop+On">NFC/checkins to curate music preferences</a>. By reusing library cards the music could be controlled.<br />
<br />
<br />
Gregor Broll reported about on-going work of <a href="http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6482443&contentType=Conference+Publications&searchField%3DSearch_All%26queryText%3DNear+Field+Communication+.LB.NFC.RB.%2C+2013+5th+International+Workshop+On">displaying sugar saturation in products using multimodal feedback</a>. Maali Alabdulhafith reported about how to use <a href="http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6482450&contentType=Conference+Publications&searchField%3DSearch_All%26queryText%3DNear+Field+Communication+.LB.NFC.RB.%2C+2013+5th+International+Workshop+On">NFC to check for drug allergies</a> and notify doctors and pharmacists accordingly. The system relies on the hospital's database entries but may trigger some false alarms if the DB is not properly curated.<br />
<br />
All papers are available in the <a href="http://ieeexplore.ieee.org/search/searchresult.jsp?newsearch=true&queryText=Near+Field+Communication+.LB.NFC.RB.%2C+2013+5th+International+Workshop+On">online proceedings</a> as part of the<a href="http://ieeexplore.ieee.org/search/searchresult.jsp?newsearch=true&queryText=Near+Field+Communication+.LB.NFC.RB.%2C+2013+5th+International+Workshop+On"> IEEE Xplore libary</a>. <br />
<br />
Overall, it was an exciting workshop. It remains to be seen whether 2013 will be the year of NFC, after all the previous years have been suspects of this event already;) Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com24tag:blogger.com,1999:blog-6723836170967808000.post-36405974317164916292013-04-23T10:50:00.002+02:002013-04-23T10:51:43.377+02:00IEEE Consumer Communications & Networking Conference - General Call for Workshops <!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin:0cm;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:10.0pt;
font-family:"Times New Roman","serif";}
</style>
<![endif]-->
<br />
<div class="MsoNormal">
***********************************************************</div>
<div class="MsoNormal">
IEEE Consumer Communications & Networking Conference
(<a href="http://ccnc2014.ieee-ccnc.org/">CCNC</a>)
</div>
<div class="MsoNormal">
(Held in conjunction with the <a href="http://www.cesweb.org/">International ConsumerElectronics Show</a>, </div>
<div class="MsoNormal">
Las Vegas, January 11-14,
2014)
</div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
<h3>
General Call for Workshops
</h3>
</div>
<div class="MsoNormal">
***********************************************************</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
IEEE Consumer Communications and Networking Conference
(<a href="http://ccnc2014.ieee-ccnc.org/">CCNC</a>), sponsored by the IEEE Communications Society, is a major annual
international conference. Taking advantage of its co-location with the
<a href="http://www.cesweb.org/">International CES</a> (the world's largest tradeshow on consumer technology), <a href="http://ccnc2014.ieee-ccnc.org/">CCNC</a>
is organized with the objective of bringing together researchers, developers,
and practitioners from academia and industry working in all areas of consumer
technologies. <a href="http://ccnc2014.ieee-ccnc.org/">CCNC 2014</a> will feature high quality keynotes, plenary talks, panels,
and tutorials.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
The <a href="http://ccnc2014.ieee-ccnc.org/">CCNC 2014</a> Organization Committee invites members of the
research, development, and practitioner communities to submit workshop
proposals.</div>
<div class="MsoNormal">
Workshops provide a forum for people to discuss areas of
special interest pertinent to consumer communications and networking with
like-minded researchers and practitioners. Workshops aim at examining an area
in a less formal, more open environment for the free exchange of views, and
possibly in a more focused way than in the main track of the conference itself.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Topics of interest include, but are not limited to:</div>
<ul>
<li>Communications and Signal processing for modern mobile
devices.</li>
<li>Social Networking, CrowdSourcing and Participatory Sensing</li>
<li>Wearable Augmented Reality</li>
<li>Peer-to-Peer and Cloud-based Networking</li>
<li>Multimedia
Networking, Services, & Applications</li>
<li>Smart Spaces & Sensor Networks</li>
<li>3D printing</li>
<li>Personal Robotics</li>
<li>Security, Content Protection & DRM</li>
<li>Vehicular Networks</li>
<li>Green Communications & Computation</li>
<li>eHealth, Ambient
Assisted Living</li>
<li>Home Energy Management</li>
<li>Telepresence & Telerobotics</li>
<li>Intelligent & Emotion-oriented Computing</li>
<li>3D Imaging, Processing,
Communications & Display</li>
<li>Innovative Multimedia Systems & Consumer
Electronics</li>
<li>Information Integration & Data Analytics</li>
<li>Case studies of
application deployments</li>
<li>Emerging Standardization Topics in Consumer
Communications.</li>
</ul>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
CCNC workshops will be organized on the first and last day
of the conference (Jan 11 and Jan 14).</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<h3>
Proposal Format</h3>
</div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
The workshop organizers should submit a workshop proposal by
May 31st 2013.</div>
<div class="MsoNormal">
Each Workshop proposal should include:</div>
<br />
<ol>
<li>Name of workshop and
proposed URL of site to host CFP, program etc.</li>
<li>Theme of the workshop and
topics of interest and how these related to the overall conference</li>
<li>Names, affiliations,
and a short bio (up to 200 words) of the organizers</li>
<li>Brief description (up to 1
page) of research, industry, and practitioners' topics of interest that the workshop will
address</li>
<li>Reasons why the workshop is
of interest to the conference participants</li>
<li>Audience: expected number
of participants, potential program committee members</li>
<li>Description of the
publicity plan: how to attract participants and submissions</li>
<li>Planned format: participant
selection, time line, type of contributions, discussions and integration of non-presenting
participants.</li>
<ul>
<li> Full-day
workshops should aim for 8-9 accepted papers or invited technical talks. Half-day workshops should aim for 4-5
accepted papers or invited technical talks. Indicate the maximum length of the
papers to be submitted.</li>
<li>If the
workshop will include invited technical talks (i.e. presentation of a non-peer-reviewed paper ), the proposal
should include a subset of invited speakers who are willing to attend and
participate if the workshop is accepted.
</li>
</ul>
<li> If applicable, a
description of past editions of the workshop, including: number of submitted and accepted papers, and
number of attendees.</li>
<li>A draft workshop call for papers with:
<ul>
<li>The names,
affiliations, addresses, phone numbers and email</li>
addresses of the workshop organizers, who should be experts
in the related topics and preferably from multiple organizations.</ul>
</li>
</ol>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
All proposals and questions should be submitted to the
workshop chair:</div>
<div class="MsoNormal">
Florian Michahelles, ETH Zurich, <a href="mailto:fmichahelles@ethz.ch">fmichahelles@ethz.ch</a>, subject: CCNC14
workshop.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Conference registration fees will not be waived for speakers
at accepted workshops. The organizers of the accepted workshops will be
responsible for paper reviewing and the workshop programs.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Workshop Proposals Due: May 31, 2013</div>
<div class="MsoNormal">
Acceptance Notification: June 15, 2013</div>
<div class="MsoNormal">
_______________________________________________</div>
<div class="MsoNormal">
Florian Michahelles, <a href="mailto:fmichahelles@ethz.ch">fmichahelles@ethz.ch</a></div>
<div class="MsoNormal">
<a href="http://ccnc2014.ieee-ccnc.org/">CCNC 2014</a> Workshops Chair</div>
Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com1tag:blogger.com,1999:blog-6723836170967808000.post-50856410322861293252013-03-20T20:12:00.000+01:002013-03-20T20:13:00.322+01:00The German perspective of IoT: Industrie 4.0Last year in June I had the opportunity to join a workshop on the impact of Internet of Things (IoT) for the German industry.<br />
The consensus was that Germany missed the developed of an app-industry and hard-ware development. Instead, Germany should rather focus on proprietary platforms, appstores, for machines, cars and smart home: app-stores for things. A new job profile, the IoT-mechanic, is emerging.<br />
<br />
<br />
The overall goal of IoT is to improve quality of life, sustainability and growth (hm...isn't growth the opposite of sustainability!?). IoT bears the danger of forgetting the human yielding a rigid and process-oriented life focusing on the beauty, bold and technophiles.<br />
<br />
Instead, developments should be driven by industry focusing on health, energy efficiency and standardization. Research questions could be:<br />
<ul>
<li>how to integrate the diverse and isolated initiatives of IoT into one coherent platform?</li>
<li>IP doesn't work for everything, iterative processes based on specific examples should help to develop alternatives.</li>
<li>who owns the platform?</li>
<li>vertical platforms should be developed to solve societal challenges: production, plant manufacturing, and machine development</li>
<li>horizontal integration to reusing technology</li>
<ul>
<li>interoperability</li>
<li>discovery/self-organisation</li>
<li>open platforms for third parties, SME's</li>
<li>reference architecture for niches</li>
</ul>
</ul>
Involved parties should be telco providers, device manufacturers, service providers and end-users.<br />
Overall, platforms should help SME's to develop new services and create business and jobs. Open-source should allow communities to develop new services. The german government should provide the legal framework to include various stakeholders, protect their investment, yield services for the good.<br />
I'm looking forward to the results of <a href="http://www.bmbf.de/de/19955.php">Industrie 4.0</a>. Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com2tag:blogger.com,1999:blog-6723836170967808000.post-71372029117713058802012-12-13T16:56:00.003+01:002012-12-13T16:56:43.761+01:00Stephan Karpischek defended his thesis on mobile barcode scanning and quality of product master data <div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii1N11DZMFlZV6bXPo5fDoq_A6oxsM2WF2X4tgG4CK1gfrpzeyT_6QL_7PNWowuaRbbhOoJZb2ncrXr0bDlPr5TEID-5zlBzWiUIX_DtHEghOfGdfhLokXotuSBqj7qWz47Eg23VJQXv4/s1600/IMG_20121213_142802.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii1N11DZMFlZV6bXPo5fDoq_A6oxsM2WF2X4tgG4CK1gfrpzeyT_6QL_7PNWowuaRbbhOoJZb2ncrXr0bDlPr5TEID-5zlBzWiUIX_DtHEghOfGdfhLokXotuSBqj7qWz47Eg23VJQXv4/s200/IMG_20121213_142802.jpg" width="200" /></a></div>
<a href="http://www.im.ethz.ch/people/karpischek">Stephan Karpischek</a> is, after <a href="http://florian-michahelles.blogspot.ch/2012/12/dr-irena-pletikosa-cvijikj-well-done.html">Irena Pletikosa</a>, the second the PhD student this week and my fifth in total successfully defending his thesis. Congratulations, Dr. Stephan Karpischek! <br />
As his co-referee <a href="http://web.mit.edu/lmp/people/sarma.html">Sanjay Sarma</a> from MIT could not attend in person, Stephan defended his thesis in a sophisticated conference room at ETH where we had high-quality connection to MIT. The quality of video and sound was amazing and prove that some travels can be indeed eliminated by these technologies.<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3va1R1KxT5LqLChAdrm2hdQf-wHMCIjU_Xnb0HE6jUiRBClRXPNlqbUuYwL6r_tI0J7_hLJx8d2Z1eEqwR84vEyqzrz4nbFrtzzWSCQmycGDD-v080sgUrdZADnFNUDL_5VXnmFHaBWc/s1600/IMG_20121213_142833.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3va1R1KxT5LqLChAdrm2hdQf-wHMCIjU_Xnb0HE6jUiRBClRXPNlqbUuYwL6r_tI0J7_hLJx8d2Z1eEqwR84vEyqzrz4nbFrtzzWSCQmycGDD-v080sgUrdZADnFNUDL_5VXnmFHaBWc/s200/IMG_20121213_142833.jpg" width="200" /></a>Stephan outlined four contributions of his thesis: the implementation of the <a href="https://github.com/kpii/my2cents-server#readme">open-source mobile barcode scanning app my2cents.mobi</a> [1], the proof of incorrect master data yielding lower usage of mobile apps [2], the introduction of a <br />
<iframe align="right" allowfullscreen="allowfullscreen" frameborder="0" height="150" src="http://www.youtube.com/embed/r0WoOIp-Ihg" width="200"></iframe>
method to measure correctness of product names and its application to public master data sources [3]. Additionally, Stephan also did<br />
some remarkable analysis of user behavior of mobile bargaining [4] and developed one of the most renown Swiss apps [5] , <a href="http://peaks-app.ch/">Swisspeaks</a>. However, both results did not really fit any more in his thesis "<i>Mobile Barcode Scanning Applications for Consumers</i>" (will be available in a couple of months <a href="http://e-collection.library.ethz.ch/">here</a>).<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjj7cjfD3QoujUnNaFHbXAndQP7fEUqYrjdt8VhQNGCuWTL3Gid_73T4GKGDMdjT1Dn8yD_b6peo9cV40ZpaXC_9e2NvonP4AJ3sDlaFMSqrykeWIT5t5nTuv2SzkE4ioSZGbE5wr6eA0/s1600/IMG_20121213_155257.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjj7cjfD3QoujUnNaFHbXAndQP7fEUqYrjdt8VhQNGCuWTL3Gid_73T4GKGDMdjT1Dn8yD_b6peo9cV40ZpaXC_9e2NvonP4AJ3sDlaFMSqrykeWIT5t5nTuv2SzkE4ioSZGbE5wr6eA0/s200/IMG_20121213_155257.jpg" width="200" /></a> In the Q and A section of his defense Stephan prove that roughly 2% of today's master data available in online data pools
amazon, google, afili.net etc. are wrong, dillute the brand image and could yield financial losses. This result provides a fact-based justification of the GS1's emerging Trusted Source service [6] which aims at providing brand-owner approved master-data. He also gave a perspective of a future master-data monitoring service that brand-owners could use to measure their appearance and abuse of their barcodes by other parties on the network...<br />
Stephan, it has been a great pleasure to working with you and I really enjoyed the inspiring discussion with you. I wish you good luck in your new job!<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4Ku6NB6RnWkb858SlqBleVgl3W6lPjVXt80OlF4DTNfLN5a3-_zawhBFFKQwkPD5fwuc03xKB34Gdci73moTKpS4Ho5B0SGiBjb2K30ibNWH3yr0YCIWSnJD3XJ0W56FmozKSI1_kUVw/s1600/IMG_20121213_153636.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><br /></a></div>
<br />
[1] S. Karpischek, F. Michahelles, E. Fleisch, <a href="http://www.im.ethz.ch/publications/my2cents_PUC.pdf">my2cents – enabling research on consumer-product interaction</a>. Journal of Personal and Ubiquitous Computing. Springer, 2011, [<a href="http://dx.doi.org/10.1007/s00779-011-0426-9">doi:10.1007/s00779-011-0426-9</a>].<br />
[2] S. Karpischek, F. Michahelles, <a href="http://www.im.ethz.ch/publications/my2cents_iot2010.pdf">my2cents - Digitizing consumer opinions and comments about retail products</a>, Internet of Things 2010 Conference (IoT2010), 29 November - 1 December 2010, Tokyo, Japan.<br />
[3] S. Karpischek, F. Michahelles, E. Fleisch, <a href="http://www.im.ethz.ch/publications/icec_2012_not_so_unique_gtin_abstract.pdf">The
Not So Unique Global Trade Identification Number - Product master data
quality in publicly available sources (Extended Abstract)</a>. 14th International Conference on Electronic Commerce (ICEC'12), 7 - 8 August 2012, Singapore. <br />
[4] S. Karpischek, D. Santani, F. Michahelles, <a href="http://www.im.ethz.ch/publications/ec-web-12.pdf">Usage Analysis of a Mobile Bargain Finder Application</a>.
13th International Conference on Electronic Commerce and Web
Technologies (EC-Web 2012), 3 - 7 September 2012, Vienna, Austria.<br />
[5] S. Karpischek, C. Marforio, M. Godenzi, S. Heuel, F. Michahelles, <a href="http://www.im.ethz.ch/publications/swisspeaks.pdf">SwissPeaks - Mobile augmented reality to identify mountains</a>,
Let's Go Out: Research in Outdoor Mixed and Augmented Reality. Workshop
at the International Symposium on Mixed and Augmented Reality 2009
(ISMAR 2009), 19 October 2009, Orlando, Florida, USA.<br />
[6] GS1 Trusted Source of Data, Project Report, GS1, July 2012 [<a href="http://www.gs1.org/docs/b2c/GS1_TSD_Project_Report.pdf">pdf</a>]Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com12tag:blogger.com,1999:blog-6723836170967808000.post-74112073679722407822012-12-11T15:47:00.002+01:002012-12-12T09:07:18.997+01:00Dr. Irena Pletikosa Cvijikj, well done!<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV2mHhwTZvvww5ji0mGRAmN9_zNxzRwLTw0B3jgQZ8ggcXUsMYEHROcpczUiBYDau4FbS2jMhSnKEEdB_mfPDHDOeG7g-Kw-vuf3FqUO7qSXVmcSYn2q-H_IgYvxsIGpCdq9ZqPpUgQdo/s1600/IMG_20121211_102844.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiV2mHhwTZvvww5ji0mGRAmN9_zNxzRwLTw0B3jgQZ8ggcXUsMYEHROcpczUiBYDau4FbS2jMhSnKEEdB_mfPDHDOeG7g-Kw-vuf3FqUO7qSXVmcSYn2q-H_IgYvxsIGpCdq9ZqPpUgQdo/s200/IMG_20121211_102844.jpg" width="200" /></a></div>
<a href="http://www.im.ethz.ch/people/ipletikosa">Irena Pletikosa Cvijikj</a> has defended her PhD thesis on "<i>Evaluation Framework for Social Media Brand Presence</i>" (the thesis will online <a href="http://e-collection.ethbib.ethz.ch/">here</a> in a few months from now). Irena started in 2009 with her first project about using Facebook to connect things [1]. She really got fascinated by social media and started publishing quite an impressive series of papers investigating the content users share on Facebook brandpages [2], emotions and motivation of users to engage on such pages, effectiveness of moderator activities to increase number of fans [3,4,5], detection of trending topics on Facebook [6], and an evaluation framework [7] summarizing her findings as best practices for practitioners (two more are under review). It is a bit ironic that <a href="http://downrightnow.com/facebook">Facebook has been down since her defense</a>, I'm glad she didn't plan for a demo;)<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOYT710eEbiJKaotYvExxctvR8B7vruOaWcsxiTww0FK4vkLBgBbreR4XWn4gdKF6gVbwhm8Y5RzG20_PrBFkfKk07DWWlNNIysnmtmir6piU6EmfqjdDWsRcs2FkDM3K3hY3sEZYkAzU/s1600/IMG_20121211_102903.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOYT710eEbiJKaotYvExxctvR8B7vruOaWcsxiTww0FK4vkLBgBbreR4XWn4gdKF6gVbwhm8Y5RzG20_PrBFkfKk07DWWlNNIysnmtmir6piU6EmfqjdDWsRcs2FkDM3K3hY3sEZYkAzU/s200/IMG_20121211_102903.jpg" width="200" /></a><br />
It was again fascinating to see how single papers which appeared to be rather diverse and unrelated in the beginning, could be put together into a comprehensive and coherent thesis deriving both lessons for literature and practitioners of social media. After <a href="http://florian-michahelles.blogspot.ch/2009/11/phd-defense-of-mikko-lehtonen.html">Mikko Lehtonen</a>, <a href="http://albrecht-schmidt.blogspot.ch/2010/05/felix-von-reischach-phd-defence.html">Felix von Reischach</a> and <a href="http://florian-michahelles.blogspot.ch/2011/08/erica-dubachs-dissertation-about-social.html">Erica Dubach</a>, Irena is the fourth student receiving a PhD from our lab (the next candidate is due in a couple of days!).<br />
<br />
I'm glad Irena will stay in our lab and start forming her own group on social media-related research within the next months.<br />
<br />
Congralutions to your great work! Good luck, and thank you very much for the opportunity to working with you, Irena!<br />
<br />
<b>[1] </b>Irena Pletikosa Cvijikj, Goekmen Cetin, Stephan Karpischek, Florian Michahelles: <b>Influence of Facebook on Purchase Decision Making</b>, <a href="http://www.autoidlabs.org/events/ciot2010" target="_blank">What can the Internet of Things do for the Citizen (CIoT) Workshop</a> at The Eighth International Conference on Pervasive Computing (<a href="http://www.pervasive2010.org/" target="_blank">Pervasive 2010</a>), Helsinki, Finland, May 2010 [<a href="http://www.im.ethz.ch/publications/ThingBook">PDF</a>].<br />
[2] Irena Pletikosa Cvijikj, Florian Michahelles: <b>Understanding Social Media Marketing: A Case Study on Topics, Categories and Sentiment on a Facebook Brand Page</b>, In Proceedings of the
15th International Academic MindTrek Conference: Envisioning Future
Media Environments (<a href="http://www.mindtrek.org/2011/" target="_blank">MindTrek '11</a>). ACM, New York, NY, USA, 175-182. DOI: 10.1145/2181037.2181066. URL: <a href="http://doi.acm.org/10.1145/2181037.2181066" target="_blank">http://doi.acm.org/10.1145/2181037.2181066</a>. [<a href="http://www.im.ethz.ch/publications/Pletikosa-MindTrek11" target="_blank">PDF</a>] <br />
<b>[3] A Case Study of the Effects of Moderator Posts within a Facebook Brand Page</b>,
Irena Pletikosa Cvijikj, Florian Michahelles, In: Datta, Anwitaman,
Shulman, Stuart, Zheng, Baihua, Lin, Shou-De, Sun, Aixin, Lim, Ee-Peng
(eds.) <i>Social Informatics</i>. Lecture Notes in Computer Science,
Springer Berlin / Heidelberg, 2011, Volume 6984/2011, 161-170, DOI:
10.1007/978-3-642-24704-0_21. URL: <a href="http://dx.doi.org/10.1007/978-3-642-24704-0_21" target="_blank">http://dx.doi.org/10.1007/978-3-642-24704-0_21</a> [<a href="http://www.im.ethz.ch/publications/Pletikosa-SocInfo_11" target="_blank">PDF</a>]<br />
<b>[4] </b>Irena Pletikosa Cvijikj, Erica Dubach Spiegler, Florian Michahelles: <b>The Effect of Post Type, Category and Posting Day on User Interaction Level on Facebook</b>,
Privacy, Security, Risk and Trust (PASSAT '11), 2011 IEEE Third
International Conference on and 2011 IEEE Third International Conference
on Social Computing (SocialCom '11) , pp.810-813, 9-11 Oct. 2011. DOI:
10.1109/PASSAT/SocialCom.2011.21. URL: <a href="http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6113221&isnumber=6113084" target="_blank">http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6113221&isnumber=6113084</a> [<a href="http://www.im.ethz.ch/publications/Pletikosa-SocialCom11" target="_blank">PDF</a>]<br />
<b>[5] </b>Irena Pletikosa Cvijikj: <b>Usability Testing of a Facebook Brand Page</b>, <a href="http://www.worldusabilityday.org/world-usability-day-2011-slovenia" target="_blank">World Usability Day 2011 Slovenia</a>, Kranj, Slovenia, 10th November 2011. [<a href="http://www.im.ethz.ch/publications/pletikosa_wud2011.pdf" target="_blank">PDF</a>]<br />
<b>[6] </b> Irena Pletikosa Cvijikj,
Florian Michahelles: <b>Monitoring Trends on Facebook</b>,Dependable, Autonomic and Secure Computing (DASC),
2011 IEEE Ninth International Conference on, pp.895-902, 12-14 Dec.
2011. DOI: 10.1109/DASC.2011.150. URL: <a href="http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6118886&isnumber=6118342" target="_blank">http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6118886&isnumber=6118342</a> [<a href="http://www.im.ethz.ch/publications/pletikosa_sca2011.pdf" target="_blank">PDF</a>] <br />
<b>[7] </b>Irena Pletikosa Cvijikj, Florian Michahelles: <b>Understanding the User Generated Content and Interactions on a Facebook Brand Page</b>, , International Journal of
Social and Humanistic Computing (IJSHC) Special Issue "Contemporary
Social Media Topics in Business and Public Organizations", Inderscience
Publishers, 2012. [<a href="http://www.im.ethz.ch/people/ipletikosa/IJSHC_Manuscript.pdf" target="_blank">PDF</a>]Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com0tag:blogger.com,1999:blog-6723836170967808000.post-89455650350684275482012-12-11T13:48:00.003+01:002012-12-12T13:56:18.226+01:00Mobile and Ubiquitous Multimedia Conference 2012 in Ulm<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYRJqaSl1s239Xfk-IqQP8IVtmdXMYYUJfHW1D1faAz8X2lFtL52dzV8Hrv7qX-BEHAR5JG2Vq2ugSJhyISguJWgvX_0YxbZ1bCsQxy8eRq_Tv0gejqJEdu4Bg7A_DjvTX1rElF9VCobw/s1600/IMG_20121204_094714.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="80" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYRJqaSl1s239Xfk-IqQP8IVtmdXMYYUJfHW1D1faAz8X2lFtL52dzV8Hrv7qX-BEHAR5JG2Vq2ugSJhyISguJWgvX_0YxbZ1bCsQxy8eRq_Tv0gejqJEdu4Bg7A_DjvTX1rElF9VCobw/s200/IMG_20121204_094714.jpg" width="60" /></a></div>
<a href="http://www.uni-ulm.de/in/mi/mi-mitarbeiter/enrico-rukzio.html">Enrico Rukzio</a> did a fabulous job in organizing <a href="http://www.mum2012.org/">MUM2012 </a>in Ulm this year. Together with the PC-Co chairs <a href="http://www.cs.tut.fi/%7Ekaisavvm/">Kaisa Väänänen-Vainio-Mattila</a> and <a href="http://markbillinghurst.com/">Mark Billinghurst</a> I could coordinate the collection of 389 reviews from 69 PC members for the 126 paper submissions we received from 359 authors out of 32 countries.
<iframe frameborder="0" height="300" src="http://prezi.com/embed/wyjo_0w7an0x/?bgcolor=ffffff&lock_to_path=0&autoplay=no&autohide_ctrls=0" width="400"></iframe><br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjopwMwSoi-q2qHQuuEeg3HmGQx_rCW1cgom7ve6DOsEaKCH0x_hbeszdFqPMcgEtlOpdG5ayuYYlBszQvPd8_o_1-ciXHJrjEtO3qCIp3ppaZowBI5mSyLiW5_07GtYYa5YclYCc7YnXg/s1600/IMG_20121204_092834.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjopwMwSoi-q2qHQuuEeg3HmGQx_rCW1cgom7ve6DOsEaKCH0x_hbeszdFqPMcgEtlOpdG5ayuYYlBszQvPd8_o_1-ciXHJrjEtO3qCIp3ppaZowBI5mSyLiW5_07GtYYa5YclYCc7YnXg/s200/IMG_20121204_092834.jpg" width="200" /></a><a href="http://www.icg.tugraz.at/Members/schmalstieg">Dieter Schmalstieg</a> opened the conference with his keynote <i>Augmented Reality Technology for Smartphones</i>. He nicely showed how this technology has evolved from expensive, bulky and immature platforms towards everyday AR in today's mobile phones. Ironically, though, all the AR systems of today (<a href="http://www.layar.com/">LayAR</a>, <a href="http://www.wikitude.com/">Wikitude</a>, <a href="http://peaks-app.ch/">Swisspeaks</a> etc.) are simply based on compass and acceleration without taking any developments about visual and natural markers into account. Dieter showed some very impressive videos how AR experience can be improved significantly by stabilizing the digital overlays using markers extracted by image processing. Futhermore, he showed systems which could also recognize 'free space', e.g. blue sky, for placing digital overlays there instead of occluding important information from the real-world. Indeed fascinating was the presentation of the recording of a skate-board stunt which was recorded life, separated from the background and replayed and introduced as an AR layer in another setting over and over again.<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4FfgldX9qlCIcX8esgHvTDcjCd_FRp3J5BehlmElKAgBnqFCjvZW_t4yS8ThWclmYoLWb5ForMqzdu7uCi4CP8BBtNxH-8mFAO4htAEpsiLTtPR1eu_RCO-_Azj6t9y2aaJwcYcvAq5s/s1600/IMG_20121204_095825.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4FfgldX9qlCIcX8esgHvTDcjCd_FRp3J5BehlmElKAgBnqFCjvZW_t4yS8ThWclmYoLWb5ForMqzdu7uCi4CP8BBtNxH-8mFAO4htAEpsiLTtPR1eu_RCO-_Azj6t9y2aaJwcYcvAq5s/s200/IMG_20121204_095825.jpg" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSWPAwEcv6ZFefbKgKC1_22tfjhgW9XKGHpazPZWGIQxkVYOYfrHViupqN62KzH9FTKmTkhqT_17WxAxLqjeKWkMsfLxg_CoIVccYEc5ocZAbkhxuLSQwxVDvDurCmS8vVZu4t5nUGb-A/s1600/IMG_20121204_100842.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSWPAwEcv6ZFefbKgKC1_22tfjhgW9XKGHpazPZWGIQxkVYOYfrHViupqN62KzH9FTKmTkhqT_17WxAxLqjeKWkMsfLxg_CoIVccYEc5ocZAbkhxuLSQwxVDvDurCmS8vVZu4t5nUGb-A/s200/IMG_20121204_100842.jpg" width="200" /></a>While I was absolutely amazed about the technical achievements of AR research I'm still struggling with recognizing meaningful applications of this technologies. In the subsequent session Dieter mentioned replacing today's habit googeling for keywords on the mobile by instant web searches based on context and situations the users is in and pointing to: AR could replace the text-field of Google search...<br />
<br />
I believe AR is a fascinating research area and also a great tool. Combining the advancements of visual markers/sensors/localization should help to make AR a useful and intuitive experience for accessing digital services in mobile user contexts.<br />
Throughout the three days there was interesting work presented on novel design, mobile interaction, social interaction, security, mobile augmented reality, tools, audio, field studies, and public displays (see <a href="http://www.mum2012.org/program.html">program</a>). <iframe align="right" allowfullscreen="allowfullscreen" frameborder="0" height="169" src="http://www.youtube.com/embed/Qw9e61E_dmE" width="300"></iframe>As part of these sessions I was presenting our work <i>object circles</i> which proposes to use the Google+ Circle concept for visualizing and managing data streams of smart items as an intuitive metaphor for everyday users. The underlying principle is to use the established interface of social media to also manage and interact with items and devices [1].
In addition to that, as part of the industry track, I presented our evaluation of<iframe align="left" allowfullscreen="allowfullscreen" frameborder="0" height="113" src="http://www.youtube.com/embed/Pzqe6jhONSg" width="200"></iframe> the <a href="http://www.dacuda.com/">Dacuda scanmouse</a> where could prove the more effective use of this device for everyday scanning tasks compared to multi-function printers, personal scanners, and mobile phone image taking [2]. Instead of a prototype I could actually show the working product which clearly showed to me the power of demonstrations. Let's see how many visitors will buy such a mouse;)<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieX4IgXwWR9jvYlLgB2NmqjjuW9FmkfVz2QXprE2QcxFHsd4UO54fvjUwXiDZSMvhByebVUYnSFNOppHx6hoQ5v1S1E1oG8vM6pP-IGE9H98UEVis5tzezGZZSlOYFjNEmXV1v_5SAgpo/s1600/mum1.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieX4IgXwWR9jvYlLgB2NmqjjuW9FmkfVz2QXprE2QcxFHsd4UO54fvjUwXiDZSMvhByebVUYnSFNOppHx6hoQ5v1S1E1oG8vM6pP-IGE9H98UEVis5tzezGZZSlOYFjNEmXV1v_5SAgpo/s200/mum1.jpg" width="138" /></a>Finally, <a href="http://www.linkedin.com/pub/flavius-kehr/21/9b6/8b9">Flavius Kehr</a> presented our field study on evaluating capturing of driving behavior via smart-phone vs. built-in fixed unit [3]. His statistical analysis showed that the fixed unit has more accuracy, however, the measurements of the phone are still significant to provide feedback to driver about his driving behaviour. Thus, Flavius could conclude with the clear finding that mobile devices are well suited to elicit driving behavior. This opens the space for many other players, e.g. insurance companies, to provide driving feedback in addition to the built-in systems of car manufacturers.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXXG5vp9UYnwgG7E3_0Jghs6XlYqJWybJ2-TLsq2m742w8NZv9oDaBicKRYznD0LDuKcHIRFt593f5fPbvQuFTyA7DmTMAH1EcsRtpagrod2qwUgty7MfWytvQBU0qTD5yeLm23e977CA/s1600/IMG_20121206_093744.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXXG5vp9UYnwgG7E3_0Jghs6XlYqJWybJ2-TLsq2m742w8NZv9oDaBicKRYznD0LDuKcHIRFt593f5fPbvQuFTyA7DmTMAH1EcsRtpagrod2qwUgty7MfWytvQBU0qTD5yeLm23e977CA/s200/IMG_20121206_093744.jpg" width="200" /></a><a href="http://www.comp.lancs.ac.uk/%7Enigel/">Nigel Davies</a> provided the second keynote of the conference, he showed his passion about public displays as part of his involved into the <a href="http://pd-net.org/">PD-net project</a>. He started off with the general benefits of giving a keynote: it allows you to present results without being bound to a strict scientific methodology. Despite the ubiquitous emergence of displays in public areas all these devices still suffer major short-comings: people feel disturbed by aggressive ads, the systems are passive and don't allow for interaction. There are much smarter ways of using these expensive installations: build toolkits to allow interactivity, implement context sensitive information, support audit-trails and hand-over for strolling users across several displays. Nigel also showed how ideas and concepts may quickly become obsolete: the idea of setting bluetooth-friendly usernames appears to be ridiculous today but seemed to be completely reasonable a few years ago [4].<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTUjBD2mVLUvqy_hqlKs91x6aodjzV8MzN3ZmRvSE2gSJY2A8QA4vyTgjc8JvsHmPJdYjiVaviyA9BMN7eIv4vaXU9P1BvCCPANtsNiH8EHM3vjUBua1pxqZSe0s92ibFJ2D_9aURwsmk/s1600/mum.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="88" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTUjBD2mVLUvqy_hqlKs91x6aodjzV8MzN3ZmRvSE2gSJY2A8QA4vyTgjc8JvsHmPJdYjiVaviyA9BMN7eIv4vaXU9P1BvCCPANtsNiH8EHM3vjUBua1pxqZSe0s92ibFJ2D_9aURwsmk/s400/mum.jpg" width="400" /></a>As scenarios for more interactive displays he proposed emergency search for missing children, emergency announcements, behavior changes (e.g. collect vouchers by by-passing) and local marketing. Public displays should be open for users he concluded. Challenged by the question of why display providers would open up their systems Nigel responded with the proposal of radically re-thinking the concept of how displays are being used today: instead of catching eyballs based on impressions they would be more integrated into users needs. Nigel drew the analogy of Google embedding ads into search results rather than catching eyeballs on the front page. Whether the ad companies are already ready for this now is hard to say, Nigel admitted, but it would be worth trying.Public displays (sometimes also referred to as digital signage) is a growing field, a research community with its own conference has already been formed: <a href="http://pervasivedisplays.org/2013/">The International Symposium on Pervasive Displays</a>,
4-5 June, 2013 - Mountain View, California.
<br />
<br />
<b style="font-weight: normal;">[1] </b>Florian Michahelles, Philip Probst: <b>Object Circles: Modeling physical objects as social relationships</b>, Proceedings of the 10th ACM SIGMOBILE Conference on Mobile and Ubiquitous Multimedia (<a href="http://www.mum2012.org/" target="_self">MUM'12</a>), Ulm, Germany, December 2012 [<a href="http://www.im.ethz.ch/publications/" target="_self">PDF</a>].<br />
[2] Matthias Wyss, Alexander Ilic, Florian Michahelles: <b>The scanner at your finger tips - analysis of the effectiveness of the scan mouse device</b>, Proceedings of the
10th ACM SIGMOBILE Conference on Mobile and Ubiquitous Multimedia (<a href="http://www.mum2012.org/" target="_self">MUM'12</a>), Ulm, Germany, December 2012 [<a href="http://www.im.ethz.ch/publications/" target="_self">PDF</a>].<br />
[3]<b> Driving Behavior Analysis with Smartphones: Insights from a Controlled Field Study</b>,
Johannes Paefgen, Flavius Kehr, Yudan Zhai, Florian Michahelles,
Proceedings of the 10th ACM SIGMOBILE Conference on Mobile and
Ubiquitous Multimedia (<a href="http://www.mum2012.org/" target="_self">MUM'12</a>), Ulm, Germany, December 2012 [<a href="http://www.im.ethz.ch/publications/" target="_self">PDF</a>].<br />
[4] Nigel Davies, Adrian Friday, Peter Newman, Sarah Rutlidge, and Oliver
Storz. 2009. <a href="http://dl.acm.org/citation.cfm?id=1555832">Using bluetooth device names to support interaction in smart environments</a>. In <i>Proceedings of the 7th international conference on Mobile systems, applications, and services</i> (MobiSys '09). ACM, New York, NY, USA, 151-164.<br />
<br />Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com1tag:blogger.com,1999:blog-6723836170967808000.post-73491823835941384332012-12-03T21:50:00.001+01:002012-12-14T08:45:07.339+01:00Panel Discussion: "How do users find my app?"<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:RelyOnVML/>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:HyphenationZone>21</w:HyphenationZone>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>DE-CH</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0cm;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMyoUOZ2fpYEpeZEt22vYv85UAFEtt903kCulpPxKBFooSeF77wTfmx47s9mdpts2TmhZRbUYCl3nIKiM578Ubpk5XeGJBLGG7o3HLPo4N20V6kDvA9k0FKsx-L17QUVeRM_gUezlRLaQ/s1600/IMG_20121129_055123.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a> <br />
<div class="MsoNormal">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsD90SBNEylQBJWvFToXmKzbTEt41GgpHMUP2n5rSyEJZfZi6l26NFUoEcNPhuFyE2MyL404UKyI1l9XTd5z_1ibWZvcixmgtOi3NWhNrz0wkM_XO0knPyLRY0fPHz_Btfp36xsdHaELE/s1600/DSCN1413.JPG" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="56" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsD90SBNEylQBJWvFToXmKzbTEt41GgpHMUP2n5rSyEJZfZi6l26NFUoEcNPhuFyE2MyL404UKyI1l9XTd5z_1ibWZvcixmgtOi3NWhNrz0wkM_XO0knPyLRY0fPHz_Btfp36xsdHaELE/s320/DSCN1413.JPG" width="320" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTCTOW_dpUrpRe78vbfyBNCopttSVv_K2kleq3TQWQvXf__9BOVY1KTco8CIHMA0cr5djZyUl26o_-4eFfK8y6pn7MEGqTz-esAjy48-7nFIAEKEf6BTrwUZV5YElZ7vAR4Ax_0zrkQzw/s1600/IMG_20121201_173806.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTCTOW_dpUrpRe78vbfyBNCopttSVv_K2kleq3TQWQvXf__9BOVY1KTco8CIHMA0cr5djZyUl26o_-4eFfK8y6pn7MEGqTz-esAjy48-7nFIAEKEf6BTrwUZV5YElZ7vAR4Ax_0zrkQzw/s200/IMG_20121201_173806.jpg" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzWIPCUtlyyY6fDBsk_WwQ2rK3InrZ5U46WpvFIrmhXA9RPMtiUa5PKJ7ZUXZm9SQw3DuNp8V5wJCyhgvWQccMiiBxk9Y49BvF8wa70L6KlTNdGtYtnMZhxrkKLnzJM_6Qp8rGssygr8A/s1600/IMG_20121201_102123.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzWIPCUtlyyY6fDBsk_WwQ2rK3InrZ5U46WpvFIrmhXA9RPMtiUa5PKJ7ZUXZm9SQw3DuNp8V5wJCyhgvWQccMiiBxk9Y49BvF8wa70L6KlTNdGtYtnMZhxrkKLnzJM_6Qp8rGssygr8A/s200/IMG_20121201_102123.jpg" width="200" /></a><span lang="EN-US">Thanks to
<a href="http://www.linkedin.com/pub/lars-erik-holmquist/33/b38/a45">Lars Erik Holmquist</a> from <a href="http://research.yahoo.com/">Yahoo Labs</a> I had the opportunity to host a panel on
“<a href="http://www.siggraph.org/asia2012/symposium-detail?id=100-752&session=soa">The curse of choice – how do users find your apps</a>” at <a href="http://www.siggraph.org/asia2012">Siggraph Asia 2012</a>. Together with my follow
colleagues from previous Research in the Large workshop <a href="http://hcramer.wordpress.com/">Henriette</a></span><span lang="EN-US" style="mso-ansi-language: EN-US;"><a href="http://hcramer.wordpress.com/"> Cramer</a>, <a href="http://web.mit.edu/bentley/www/">FrankBentley</a> and <a href="http://nhenze.net/?page_id=2">Niels Henze</a>, and with Jaden Choi from <a href="http://www.tgrape.com/en/index.jsp">TGrape</a> we had an interesting
discussion on apps. </span></div>
<div class="MsoNormal">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBk6Dd_rUvzThx8oGmhsyJf0v7nTANJg_67ni9OrKsIJz4n5N7-I-Me7n_iskOueUe-Lu_nQ01WmUaIuhDvj-bUKHpSuikK8DfJS1ZT6I15qW22d69akyOVcj6dBy0fQVCJaTTYZ-qwAk/s1600/IMG_20121201_092227.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLDtXzWawBft-Fin-0MSIgFKrWZv4WDHjToJoD6APA5jsssvimyYJiol8HFH0qB3mkDbx6og5FPj7KBfMI5xpYmxLGpD6-OoycpFHVHLpgr37X_fidlW_r-Anu4GJHQXz1yvyg1C-me2A/s1600/IMG_20121201_090915.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMyoUOZ2fpYEpeZEt22vYv85UAFEtt903kCulpPxKBFooSeF77wTfmx47s9mdpts2TmhZRbUYCl3nIKiM578Ubpk5XeGJBLGG7o3HLPo4N20V6kDvA9k0FKsx-L17QUVeRM_gUezlRLaQ/s1600/IMG_20121129_055123.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><br /></a></div>
<span lang="EN-US">Nan Zhong, master student at ETH Zurich, opened the panel
with a general introduction to the head and longtail nature of markets (<a href="http://www.im.ethz.ch/publications/SIGGRAPH_talk.pdf">slides</a>). Head
markets follow the so-called Pareto-principle which builds upon the fact that
shelf space is usually limited, such that the merchant has to choose wisely
which products to put on displays. The general rule is that only 20% out of all
products generated a 80% of total revenue, thus niche products have a hard
chance to appear on the shelf. Opposite to that are longtail </span><span lang="EN-US">markets which
generated most of the revenue out of a huge variety of less popular niche
products. However, this is only possible in digital markets were shelf-space is
virtually unlimited and transaction costs of managing all these products can be
kept low. </span><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLDtXzWawBft-Fin-0MSIgFKrWZv4WDHjToJoD6APA5jsssvimyYJiol8HFH0qB3mkDbx6og5FPj7KBfMI5xpYmxLGpD6-OoycpFHVHLpgr37X_fidlW_r-Anu4GJHQXz1yvyg1C-me2A/s1600/IMG_20121201_090915.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLDtXzWawBft-Fin-0MSIgFKrWZv4WDHjToJoD6APA5jsssvimyYJiol8HFH0qB3mkDbx6og5FPj7KBfMI5xpYmxLGpD6-OoycpFHVHLpgr37X_fidlW_r-Anu4GJHQXz1yvyg1C-me2A/s200/IMG_20121201_090915.jpg" width="200" /></a><span lang="EN-US">Nan investigated [1] the nature of the Google Play market based on
data-set of <a href="http://www.appaware.com/">Appaware</a> and – surprisingly – found: in contrast to most other
digital markets (Netflix, amazon…), Google play is a clear Head market with
even stronger characteristics than traditional retail. Thus, Nan’s conclusion
was that developers should clearly focus on developing blockbuster.
Furthermore, he found that the average capacity of users to install apps is
limited by average to 40 apps. This means an app has to be really good in order
to make it most user’s phone. What’s more, only 28% of all users would download
</span><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBk6Dd_rUvzThx8oGmhsyJf0v7nTANJg_67ni9OrKsIJz4n5N7-I-Me7n_iskOueUe-Lu_nQ01WmUaIuhDvj-bUKHpSuikK8DfJS1ZT6I15qW22d69akyOVcj6dBy0fQVCJaTTYZ-qwAk/s1600/IMG_20121201_092227.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBk6Dd_rUvzThx8oGmhsyJf0v7nTANJg_67ni9OrKsIJz4n5N7-I-Me7n_iskOueUe-Lu_nQ01WmUaIuhDvj-bUKHpSuikK8DfJS1ZT6I15qW22d69akyOVcj6dBy0fQVCJaTTYZ-qwAk/s200/IMG_20121201_092227.jpg" width="200" /></a><span lang="EN-US">not more than one paid app. Thus, free apps are much more likely to be
successful. Furthermore, successful apps are rated better in general, whereas
niche apps are used by expert users who are more critical give lower scores.
Nan closed his talk with the suggestion to develop mechanisms that allow niche
to be found more easily, as current collaborative filtering techniques would
rather push successful apps even further.</span><br />
<div class="MsoNormal">
<span lang="EN-US" style="mso-ansi-language: EN-US;">Inspired by
these insights we discussed various strategies of how developers could foster
that their apps get found. Niels proposed to focus on search engine
optimization by trying to understand how Google would rank apps. Thus, building
up a history of a developer account releasing several successful apps overtime
might help as well as tweaking the description of apps. Frank reported about
his experience [2] of professionally marketing apps as any other product by
approaching influential blogs launch posts that could trigger the demand for
the app. Henriette proposed [4] to build upon the sharing friends by making apps
social and allowing to be propagated by digital word of mouth. </span></div>
<div class="MsoNormal">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5AhSC55QlR6L3ZlVTX17-DiPO3JWm4aa5eovjqvrMIjnBR9V_sqjO4sE6u82G5lU0EvdxsQlwZ8DX-r1pPi_SDTbX61UvyxYPExIOi20ZM73TX8Nmctr5ayauJZcvICJGZITUBaMdVyQ/s1600/IMG_20121201_172719.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5AhSC55QlR6L3ZlVTX17-DiPO3JWm4aa5eovjqvrMIjnBR9V_sqjO4sE6u82G5lU0EvdxsQlwZ8DX-r1pPi_SDTbX61UvyxYPExIOi20ZM73TX8Nmctr5ayauJZcvICJGZITUBaMdVyQ/s200/IMG_20121201_172719.jpg" width="200" /></a><span lang="EN-US">We
continued with the question of the price and Jaden Choi disclosed that he sees
price rather </span><span lang="EN-US" style="mso-ansi-language: EN-US;">following quality of the app. Price wouldn’t really matter so
much, is rather a decision between paid and free app. Nan confirmed this finding
saying that the 99cent price would be rather a relict of itunes than based on
rational thinking. Also his research didn’t really reveal much experimentation
of developers with adapting the price of apps. Jaden added that especially in
Korea in-app payment for virtual gadgets would be strong opportunity and even
more successful than having a paid app.</span></div>
<div class="MsoNormal">
<span lang="EN-US" style="mso-ansi-language: EN-US;">Niels
disclosed his experience of releasing apps on Sunday [3] evening as the most
effective measure getting users’ attention. Based on our experience with
AppAware I mentioned that creating localized clones yourself from or own could
be another approach to be found more easily in various languages and to get
better positions in local app markets.</span></div>
<div class="MsoNormal">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeP8cXeR36mDVyw2eG_49PPqAQZqrsIpX24lLywqBm177TZXz6yQ50u1jqNeTiE_fK3B7U_FClVTNFPwwWDVLZ_nnbBDmAuzW2kzghhTsmX-giXJmaYrFSB9OvPLSz677az0hLYLIS4uw/s1600/IMG_20121129_085542.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeP8cXeR36mDVyw2eG_49PPqAQZqrsIpX24lLywqBm177TZXz6yQ50u1jqNeTiE_fK3B7U_FClVTNFPwwWDVLZ_nnbBDmAuzW2kzghhTsmX-giXJmaYrFSB9OvPLSz677az0hLYLIS4uw/s200/IMG_20121129_085542.jpg" width="200" /></a><span lang="EN-US">The
fundamental question of developing interesting and new apps in the plethora of
existing apps</span><span lang="EN-US" style="mso-ansi-language: EN-US;"> Frank answered by reverting on established methods of ethnography
and experimentation. One approach would be to go out and observe users in order
to get a glance what they might need. The next step then would be to “fail
early”, meaning to release in short cycles and to learn from user comments to
improve quickly.</span></div>
<div class="MsoNormal">
<span lang="EN-US">Another
in</span><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMyoUOZ2fpYEpeZEt22vYv85UAFEtt903kCulpPxKBFooSeF77wTfmx47s9mdpts2TmhZRbUYCl3nIKiM578Ubpk5XeGJBLGG7o3HLPo4N20V6kDvA9k0FKsx-L17QUVeRM_gUezlRLaQ/s1600/IMG_20121129_055123.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMyoUOZ2fpYEpeZEt22vYv85UAFEtt903kCulpPxKBFooSeF77wTfmx47s9mdpts2TmhZRbUYCl3nIKiM578Ubpk5XeGJBLGG7o3HLPo4N20V6kDvA9k0FKsx-L17QUVeRM_gUezlRLaQ/s200/IMG_20121129_055123.jpg" width="200" /></a><span lang="EN-US">teresting insight to me was that more expensive devices might also allow for
more expensive apps. Finally, we had some </span><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsAZ2GHALw-7eeTT71ubGV5iILh_ko5FgXlkWHtEN2mYepi5Jee6JuuvZv4JeLYlKp1FhBCiijIlEQe-rtrdnmEwtpXycWQLleaDPuW2H5gXTqcG9gDl2OQv3u3j0chAzsBMRj7-wOTRQ/s1600/IMG_20121130_121013.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsAZ2GHALw-7eeTT71ubGV5iILh_ko5FgXlkWHtEN2mYepi5Jee6JuuvZv4JeLYlKp1FhBCiijIlEQe-rtrdnmEwtpXycWQLleaDPuW2H5gXTqcG9gDl2OQv3u3j0chAzsBMRj7-wOTRQ/s200/IMG_20121130_121013.jpg" width="200" /></a><span lang="EN-US" style="mso-ansi-language: EN-US;">controversy discussion about whether
apps would prevail or rather be replaced by HTML5 web apps. The arguments by
Frank (pro apps) and Niels (pro web-apps) where along the lines of barrier to
install apps and technical flexibility of accessing hardware functions on the
phone.</span></div>
<div class="MsoNormal">
<span lang="EN-US" style="mso-ansi-language: EN-US;">Overall,
the panel together with about 50 visitors seemed to have been a good add-on at
the Siggraph Asia conference. The App Symposium will be continued as a <a href="http://s2013.siggraph.org/submitters/siggraph-mobile">SiggraphMobile in 2013</a>.</span></div>
<div class="MsoNormal">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhnij0lkCPx_Fxieu0xsSZqA8ypAVvzpI1wAdVMfXbtpZdHb9Y8QA9THuSC18oDgLbxsoPAgrcJ2k8gGcSb8VWuJdWPjrDg8P5qmm6wUB4zo2P8xeZO_Be5BEto2I15nNn7WJ0ZzAarGw/s1600/sig.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="104" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhnij0lkCPx_Fxieu0xsSZqA8ypAVvzpI1wAdVMfXbtpZdHb9Y8QA9THuSC18oDgLbxsoPAgrcJ2k8gGcSb8VWuJdWPjrDg8P5qmm6wUB4zo2P8xeZO_Be5BEto2I15nNn7WJ0ZzAarGw/s320/sig.jpg" width="320" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTdlxncHbfiGq-Ov4gifrg6hyphenhyphen0LudJPCSZTMC0dA5yKgJT0wqx3jZ9cD08WuhUe8bMZLmEqvza-_XgZQhE-AIQ8nLNkyUpXEl1Aj1Rm9whCw7Pnx_i9w8_LZdQqmjWbxkJTG72pGMIKX8/s1600/IMG_20121201_172937.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTdlxncHbfiGq-Ov4gifrg6hyphenhyphen0LudJPCSZTMC0dA5yKgJT0wqx3jZ9cD08WuhUe8bMZLmEqvza-_XgZQhE-AIQ8nLNkyUpXEl1Aj1Rm9whCw7Pnx_i9w8_LZdQqmjWbxkJTG72pGMIKX8/s200/IMG_20121201_172937.jpg" width="200" /></a><span lang="EN-US">Additionally,
Siggraph Asia was featuring an <a href="http://www.siggraph.org/asia2012/emerging-technologies">Emerging Technologies</a> section. </span><span lang="EN-US">Different demos
could be tried out proving new developments or also art and entertainment
projects. My takes were controlling and seeing through a drone by a head-mounted
display, “tasting” a website's ingredients (lin</span><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdRGuUWro8wfm1C2Vym5-3MN563q9Y-YnSJ5zYE7esdjXOUgVw13uQr6t88PsT7OhXVxUVeL05hph64ILacSIG8WkzeAt9eWBaQE8WPH0wf7waSKuCEIkeAx5DcWz1wIoUdYWgzB13UBY/s1600/IMG_20121201_230255.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdRGuUWro8wfm1C2Vym5-3MN563q9Y-YnSJ5zYE7esdjXOUgVw13uQr6t88PsT7OhXVxUVeL05hph64ILacSIG8WkzeAt9eWBaQE8WPH0wf7waSKuCEIkeAx5DcWz1wIoUdYWgzB13UBY/s200/IMG_20121201_230255.jpg" width="200" /></a><span lang="EN-US">ks, pics, bandwidth) as mi</span><span lang="EN-US" style="mso-ansi-language: EN-US;">xed liquor, an interface for controlling dancing robots, a force-sensitive display, an actuator game, and breath-awareness through a baloon.</span></div>
<div class="MsoNormal">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8T9BJ3Lc_bmyPrFuxri0B_9cgn_lF6HSBzoQSZfGRJafw5jYIOJYV8U7Quml4Z9zRwmCnQXMChhNjYZtoGMuMRpJKPHRDRUXYlHafUgFb091NS5go4GV98xL3niRb-CIuUOpUQ55MRyQ/s1600/IMG_20121130_122305.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8T9BJ3Lc_bmyPrFuxri0B_9cgn_lF6HSBzoQSZfGRJafw5jYIOJYV8U7Quml4Z9zRwmCnQXMChhNjYZtoGMuMRpJKPHRDRUXYlHafUgFb091NS5go4GV98xL3niRb-CIuUOpUQ55MRyQ/s200/IMG_20121130_122305.jpg" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8T9BJ3Lc_bmyPrFuxri0B_9cgn_lF6HSBzoQSZfGRJafw5jYIOJYV8U7Quml4Z9zRwmCnQXMChhNjYZtoGMuMRpJKPHRDRUXYlHafUgFb091NS5go4GV98xL3niRb-CIuUOpUQ55MRyQ/s1600/IMG_20121130_122305.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMyoUOZ2fpYEpeZEt22vYv85UAFEtt903kCulpPxKBFooSeF77wTfmx47s9mdpts2TmhZRbUYCl3nIKiM578Ubpk5XeGJBLGG7o3HLPo4N20V6kDvA9k0FKsx-L17QUVeRM_gUezlRLaQ/s1600/IMG_20121129_055123.jpg"></a><span lang="EN-US">Additionally, the Siggraph exhibition</span></div>
featured a humanoid robot demo where a user's face gets project onto a mannequin representing a proxy of the user in meeting. <
<br />
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdRGuUWro8wfm1C2Vym5-3MN563q9Y-YnSJ5zYE7esdjXOUgVw13uQr6t88PsT7OhXVxUVeL05hph64ILacSIG8WkzeAt9eWBaQE8WPH0wf7waSKuCEIkeAx5DcWz1wIoUdYWgzB13UBY/s1600/IMG_20121201_230255.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"></a><span lang="EN-US">Apart from
that, Singapore is a fascinating place, an island of wealth, luxury, and
strange rules in the heart of Asia. I really enjoyed the visit of the
conference in Singapore. </span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span lang="EN-US">[1] </span><b>Where should You Focus: Long Tail or Superstar?, An analysis of app adoption on the Android Market</b>, Nan Zhong, Florian Michahelles. <a href="http://www.siggraph.org/asia2012/symposium-apps">Symposium on Apps</a> at <a href="http://www.siggraph.org/as%0Aia2012/en">Siggraph Asia</a>, Singapore, November, 2012. [<a href="http://www.im.ethz.ch/publications/siggraph.pdf">pdf</a>] [<a href="http://www.im.ethz.ch/publications/SIGGRAPH_talk.pdf">slides</a>]</div>
<div class="MsoNormal">
<span lang="EN-US">[2] </span><a href="http://dl.acm.org/authorize?6776524" title="StoryPlace.Me: the path from studying elder communication to a public location-based video service"><span style="font-family: Gill Sans,verdana,arial,sans-serif;"></span></a><span style="font-family: Gill Sans,verdana,arial,sans-serif;"><a href="http://dl.acm.org/author_page.cfm?id=81502708797">Frank Bentley</a>, <a href="http://dl.acm.org/author_page.cfm?id=81435611903">Santosh Basapur: </a></span><span style="font-family: Gill Sans,verdana,arial,sans-serif;"> </span><span style="font-family: Gill Sans,verdana,arial,sans-serif;"><a href="http://dl.acm.org/authorize?6776524" title="StoryPlace.Me: the path from studying elder communication to a public location-based video service">StoryPlace.Me: the path from studying elder communication to a public location-based video service</a>, </span>CHI EA '12, CHI '12 Extended Abstracts on Human Factors in Computing Systems, 2012 </div>
<div class="MsoNormal">
[3] Niels Henze, Susanne Boll: <a href="http://nhenze.net/uploads/Finding-the-Best-Time-to-Deploy-Apps.pdf">Release Your App on Sunday Eve: Finding the Best Time to Deploy Apps</a> (<a href="http://nhenze.net/uploads/Release-Your-App-on-Sunday-Eve-Finding-the-Best-Time-to-Deploy-Apps-poster.pdf">poster</a>), Adjunct proceedings of <a href="http://www.mobilehci2011.org/">MobileHCI</a>, 2011 </div>
<div class="MsoNormal">
[4] Henriette Cramer, Mattias Rost, Lars Erik Holmquist (2011) Performing a
Check-in: Emerging Practices, Norms and ‘Conflicts’ in Location-Sharing
Using Foursquare. Proc. MobileHCI’11, Stockholm, Sweden. <a href="http://hcramer.files.wordpress.com/2011/06/crameretal4sqmobilehci-camerareadyfinal1.pdf">pdf</a></div>
Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com3tag:blogger.com,1999:blog-6723836170967808000.post-24602287231785978992012-12-03T21:00:00.004+01:002012-12-03T21:00:44.616+01:00NFC Congress 2012 <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwApEotjd5y9E3H8ODTVBK28rxsqLh_7jnbiP7jhI77XnVLd2DS8ztsjkg6Ilz-pIRKbfrNEKmFjTMV-WeHG16uuBh_2uX9nZq_4u5FJvPF5vm0ej-jf7EhSOrQOsXXJ_Adnr_XrDc8Bs/s1600/pic1.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="125" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwApEotjd5y9E3H8ODTVBK28rxsqLh_7jnbiP7jhI77XnVLd2DS8ztsjkg6Ilz-pIRKbfrNEKmFjTMV-WeHG16uuBh_2uX9nZq_4u5FJvPF5vm0ej-jf7EhSOrQOsXXJ_Adnr_XrDc8Bs/s200/pic1.jpg" width="200" /></a>It was the third time I attended the <a href="http://www.nfc-research.at/index.php?id=217">NFC Congress</a> at <a href="http://www.nfc-research.at/">FH Hagenberg</a>. I was happy to meet so many people still believing in the opportunities of this technology even though actual deployment is still progressing slowly. I attended the congress one day before the announcement of Apple’s iphone, but there seemed to be pretty much consensus that Apple will not be a driver of this technology either.<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcuKt64463m6t9DZBzHrFr2wrjHTQBQVShHI4ufVPWbIuW9kmed1xwEq_FEg-b8mw5XLq9sjopLzZDeTpT56dbqIPjaBif0BHWi4ybnvvDMl7mFne25vmAtADlohuAw5JODGUVly2lFoY/s1600/pic3.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="132" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcuKt64463m6t9DZBzHrFr2wrjHTQBQVShHI4ufVPWbIuW9kmed1xwEq_FEg-b8mw5XLq9sjopLzZDeTpT56dbqIPjaBif0BHWi4ybnvvDMl7mFne25vmAtADlohuAw5JODGUVly2lFoY/s200/pic3.jpg" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijf_z00HnHexHEHTW7kdpA8AN8YKneioxSsRQpLc1RuixNo59r38EGtWbjzOjp7o6HBVzmgKWxOOs3r6FZIhgmoBX0nC9J1RDYmMhOYN4YMsmn9SMclgiMUcN_Xop4buRm5UVt1rzYZ5Q/s1600/pic4.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="149" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijf_z00HnHexHEHTW7kdpA8AN8YKneioxSsRQpLc1RuixNo59r38EGtWbjzOjp7o6HBVzmgKWxOOs3r6FZIhgmoBX0nC9J1RDYmMhOYN4YMsmn9SMclgiMUcN_Xop4buRm5UVt1rzYZ5Q/s200/pic4.jpg" width="200" /></a> It was good to see how Nokia’s development of NFC finally got integrated into Microsoft’s Proximity API of Windows 8 which markets NFC as user experience instead of technical modes and parameters. However, the importance of windows mobile among Android and iOS still remains speculation.
Payment is still seen as the main driver – or currently the main show stopper – of NFC. Several talks pointed out the roadmap for NFC as starting with wireless cards being rolled out mainly in eastern and southern Europe, next would be NFC stickers on phones, and finally the full integrated into the phone.<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh19q8nb5FKmkeRgseNVXl91I-ycPbaZtkLRanGQzGPfp0GPaukPo2y42yFpnOPJYV63MwAiviRGus33IY1LCMi6E7ZnnyAqiMe0C6A2XlB8m6YJLbu5toOlmQc0b8mpSuB8ES1BW_2-lw/s1600/pic2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="143" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh19q8nb5FKmkeRgseNVXl91I-ycPbaZtkLRanGQzGPfp0GPaukPo2y42yFpnOPJYV63MwAiviRGus33IY1LCMi6E7ZnnyAqiMe0C6A2XlB8m6YJLbu5toOlmQc0b8mpSuB8ES1BW_2-lw/s200/pic2.jpg" width="200" /></a>There the challenge will be to group service around payment such as coupons, loyalty, promotion, transport in order to incentivize consumers to switch from established payment methods – in Germany mainly cash – to mobile payments.<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnysolrMXVOAoyAGpin8mq8DKEh2CrYAKcEgR_hX3xLZ6DYLgeMQ4cWHElpvLHG0c1LrYke7K5b8ydRJ3JYIVG_lTab0hbxpBVCdffFI9sNPXA4PI9_cTo6iBRTCXlU2NY-Xguf8U-irI/s1600/pic5.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnysolrMXVOAoyAGpin8mq8DKEh2CrYAKcEgR_hX3xLZ6DYLgeMQ4cWHElpvLHG0c1LrYke7K5b8ydRJ3JYIVG_lTab0hbxpBVCdffFI9sNPXA4PI9_cTo6iBRTCXlU2NY-Xguf8U-irI/s200/pic5.jpg" width="150" /></a>Finally, NFC was also proposed for micro-merchants as an alternative to transaction terminals, I enjoyed the split screen application for taxi-drivers presented by the Sparkassen Verlag
Overall, the time horizon of greater adoption still remains unclear. Most participants, however, shared the believe that NFC would come sooner or later, mostly driven by the introduction of wireless cards which might be substituated by NFC later.
Thus, I’m already looking forward to the <a href="http://www.nfc2013.org/">NFC 2013 workshop</a> which is technically co-sponsored by IEEE Switzerland Section and will take place in Zurich, Switzerland.
Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com2tag:blogger.com,1999:blog-6723836170967808000.post-75179152517103555492012-12-03T20:45:00.003+01:002012-12-03T21:51:53.497+01:00Technology Transfer in Poland<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:HyphenationZone>21</w:HyphenationZone>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>DE-CH</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0cm;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<br />
<div class="MsoNormal">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKE3wSHPhOLKtIrgQXPl1Xx0SbXgx4TLb_oc96ZZ74xUpgHjSG3RL9F5Hr6h4uZgEZGojH9TowuLhRUk-1AqsubDDooaQCvMmWBOjg4SIrD8rPaXuOhJwB_sXmbcLuimW7Yec14SN5L1Q/s1600/IMG_20120914_091019.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKE3wSHPhOLKtIrgQXPl1Xx0SbXgx4TLb_oc96ZZ74xUpgHjSG3RL9F5Hr6h4uZgEZGojH9TowuLhRUk-1AqsubDDooaQCvMmWBOjg4SIrD8rPaXuOhJwB_sXmbcLuimW7Yec14SN5L1Q/s320/IMG_20120914_091019.jpg" width="150" /></a><span lang="EN-US" style="mso-ansi-language: EN-US;">Poznan was
my first visit of Poland. I was invited to talk about the technology transfer
practice at ETH Zurich as part of the <a href="http://www.opencodetransfer.pl/">Opencode Transfer</a> project which deals with the
development of a new technology transfer process for Polish universities in
greater Poznan region.<br />
<iframe allowfullscreen="allowfullscreen" frameborder="0" height="150" src="http://www.youtube.com/embed/ZM3ATHk-V-U" width="200"></iframe>
<span lang="EN-US"> I was <a href="http://prezi.com/gzpphmvql3y_/swiss-practises-on-the-technology-transfer-licensing-and-encoding-methods/?kw=view-gzpphmvql3y_&rc=ref-85822">presenting</a> on the characteristics of ETH Zurich’s spin-offs
such as longer survival rates, job creation, and value generation as the main
motivation for fostering entrepreneurship at universities.</span></span></div>
<div class="MsoNormal">
<div class="prezi-player">
<style media="screen" type="text/css">.prezi-player { width: 420px; } .prezi-player-links { text-align: center; }</style><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" height="350" id="prezi_gzpphmvql3y_" name="prezi_gzpphmvql3y_" width="420"><param name="movie" value="http://prezi.com/bin/preziloader.swf"/><param name="allowfullscreen" value="true"/><param name="allowFullScreenInteractive" value="true"/><param name="allowscriptaccess" value="always"/><param name="wmode" value="direct"/><param name="bgcolor" value="#ffffff"/><param name="flashvars" value="prezi_id=gzpphmvql3y_&lock_to_path=0&color=ffffff&autoplay=no&autohide_ctrls=0"/><embed id="preziEmbed_gzpphmvql3y_" name="preziEmbed_gzpphmvql3y_" src="http://prezi.com/bin/preziloader.swf" type="application/x-shockwave-flash" allowfullscreen="true" allowFullScreenInteractive="true" allowscriptaccess="always" width="420" height="350" bgcolor="#ffffff" flashvars="prezi_id=gzpphmvql3y_&lock_to_path=0&color=ffffff&autoplay=no&autohide_ctrls=0"></embed></object><br />
<div class="prezi-player-links">
<a href="http://prezi.com/gzpphmvql3y_/swiss-practises-on-the-technology-transfer-licensing-and-encoding-methods/" title="Swiss practises on the technology transfer, licensing and encoding methods">Swiss practises on the technology transfer, licensing and encoding methods</a> on <a href="http://prezi.com/">Prezi</a></div>
</div>
<div class="MsoNormal">
<span lang="EN-US" style="mso-ansi-language: EN-US;">Throughout
the following panel discussion I learned about significant differences between
Poland, Switzerland and US.
<iframe allowfullscreen="allowfullscreen" frameborder="0" height="150" src="http://www.youtube.com/embed/5yl_AMIydAc" width="200"></iframe>
Whereas ETH transfer mainly functions as a service
center supporting ETH employees to commercialize scientific results, in Poland
university rather see transfer offices as profit centers which should generate
surpluses out of licenses, patents and shares of spin-offs. Also other
participants underlined that this approach might be hardly successful when
looking at the numbers of US universities such as Stanford or Univ. of
Illinois, where only 4% of submitted patents finally materialize in transferred
licenses. </span></div>
<div class="MsoNormal">
<span lang="EN-US" style="mso-ansi-language: EN-US;">Overall, I
was fascinated by the entrepreneurial spirit and the strong ambition of
technology transfer from research to practice in Poznan. <span style="mso-spacerun: yes;"> </span></span></div>
</div>
Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com1tag:blogger.com,1999:blog-6723836170967808000.post-12893171254930919412012-11-20T17:06:00.002+01:002012-11-20T17:09:55.392+01:00GS1 Technology Day: Nano, robots, humanoid reproduction<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSD4usM1hveS6f_uccs6a4fkIMzwfrmwxOQeVF29jHoq6dif8_OpsBSfHxKo5BEP19R1WXTKSN8fEGU1oiL9oUdI1RG2SvlQjf706ZuHiXI3JoXtOyhZhRTj1OPwBEKqpwKcNiZK6HaZ0/s1600/IMG_20121109_113018.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSD4usM1hveS6f_uccs6a4fkIMzwfrmwxOQeVF29jHoq6dif8_OpsBSfHxKo5BEP19R1WXTKSN8fEGU1oiL9oUdI1RG2SvlQjf706ZuHiXI3JoXtOyhZhRTj1OPwBEKqpwKcNiZK6HaZ0/s200/IMG_20121109_113018.jpg" width="160" /></a>For the first time the leaders of the <a href="http://www.gs1.org/epcglobal/about/governance">GS1 EPCglobal Board of Governors</a> met at ETH Zurich for discussing future directions of RFID and barcode technologies. As part of this meeting, we organized a technology day which featured current develops of our labs associated companies and groups (find presentations and detailed agenda <a href="http://www.autoidlabs.org/events/gs1-technology-day-eth-zurich/page.html">here</a>).<br />
In addition to our own work we could also invite renown keynote speakers from ETH Zurich.<br />
<a href="https://www.bi.id.ethz.ch/personensuche/link.do?actionname=detailNameSch&schnellsuche=batlogg&action=Suchen">Prof. Dr. Bertram Batlogg</a> talked about recent developments of nano-technology and shared some insights about emerging display technologies.<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhK-dJ257QWgN6T46uPs75kluAvn1Z7ToTKw8lPyzakBoJLi9vYyzQnZV_s7ZQE-IUb9CdpSZOJVgk8i_xLyM58iwzsj5SuLR2z9vzXXMJ1csyN_VAmSR9l7bumTWVQDzh4BDXpj12-9zc/s1600/IMG_20121109_113006.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhK-dJ257QWgN6T46uPs75kluAvn1Z7ToTKw8lPyzakBoJLi9vYyzQnZV_s7ZQE-IUb9CdpSZOJVgk8i_xLyM58iwzsj5SuLR2z9vzXXMJ1csyN_VAmSR9l7bumTWVQDzh4BDXpj12-9zc/s200/IMG_20121109_113006.jpg" width="160" /></a>As part of this program we had also the chance to meet <a href="http://raffaello.name/" target="_blank">Prof. Dr. Raffaello D’Andrea</a> who motivated his research on controlling robots by sensors by the example of the steam engine controlled by a speed limiter.<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8EhrJ3LxnMcrh-nT3Ekg81I1N4nJ-m0Zq9Gp0kiubEny3OfEymF1AvuaCnl6lSPus11AcolCPPYyQg__YKnFAB4vAEmEkhwtHpzjyBVMOTXxHuJ1NRa01Du0anWA1M7EXnf9v99KQBDY/s1600/IMG_20121109_113641.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8EhrJ3LxnMcrh-nT3Ekg81I1N4nJ-m0Zq9Gp0kiubEny3OfEymF1AvuaCnl6lSPus11AcolCPPYyQg__YKnFAB4vAEmEkhwtHpzjyBVMOTXxHuJ1NRa01Du0anWA1M7EXnf9v99KQBDY/s200/IMG_20121109_113641.jpg" width="160" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioz-DcSOKTQfOi0Qy-MS-kWyiJzOuaO6EUN8nXn_ydnfSNMaC4pYHJiLD5zP4UtxURt-M50iGXb44-B3tjUSG4zB8BsgCjGHx9S14mOE-nYYYn_9lDOJkBx5bpnJBlp9uR6kgdtHmcRmI/s1600/IMG_20121109_113441.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioz-DcSOKTQfOi0Qy-MS-kWyiJzOuaO6EUN8nXn_ydnfSNMaC4pYHJiLD5zP4UtxURt-M50iGXb44-B3tjUSG4zB8BsgCjGHx9S14mOE-nYYYn_9lDOJkBx5bpnJBlp9uR6kgdtHmcRmI/s200/IMG_20121109_113441.jpg" width="160" /></a>Raffaello showed the tremendous developments regarding miniaturization when he compared their most recent quadrocopter with the table-sized model of a decade ago.<br />
However, during his robot air-show the title of his talk "Controlling the artificial" become even clearer: Raefaello showed his trust into his technologies when he took a seat in his <a href="http://www.flyingmachinearena.org/">Flying Machine Arena</a> and his students started the show, sometimes closely above his head.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfrHMV4yY1XBZo9JROi7GhZ9aZauGJaol1EysTWqXa0Xp0ay-SWfhoqfaSyszN6rQnFxy9Azn23ESfEYhsAYJUx2z-einAbdMXFDmAowlr6agNliQPgJrNe5bb8KVhRniFFWwTmU-WKiI/s1600/IMG_20121109_113536.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfrHMV4yY1XBZo9JROi7GhZ9aZauGJaol1EysTWqXa0Xp0ay-SWfhoqfaSyszN6rQnFxy9Azn23ESfEYhsAYJUx2z-einAbdMXFDmAowlr6agNliQPgJrNe5bb8KVhRniFFWwTmU-WKiI/s200/IMG_20121109_113536.jpg" width="160" /></a></div>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg07NshADS_vHUyBpiAZi9CcwNVw7frxZ2yDbynt2EBqF9S_8cr_K4foYoJnLIE-hW8KikZcujn3Rggs15IX0wqze6-K97TqRSIASjEk_QxiiKi2hbeTLHG8B2QnrObGYULX9Z1eS5xRyI/s1600/IMG_20121109_121119.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg07NshADS_vHUyBpiAZi9CcwNVw7frxZ2yDbynt2EBqF9S_8cr_K4foYoJnLIE-hW8KikZcujn3Rggs15IX0wqze6-K97TqRSIASjEk_QxiiKi2hbeTLHG8B2QnrObGYULX9Z1eS5xRyI/s200/IMG_20121109_121119.jpg" width="160" /></a>In the first demo our visitors could control the helicopter with a stick by gestures. The system ensured that the helicopters did not collide with the walls or crash down because of too hectic movements. Other demos showed the ability of balancing a standing stick on the helicopter, coordinated movements of groups, kinect gesture control and the famous ball juggling (see<a href="http://www.youtube.com/watch?v=3CR5y8qZf0Y&list=UUNmQHd2GSgw-y3hykUJ-sxA&index=3&feature=plcp"> here</a>). Thus, this demonstration made me confident about <a href="http://www.doenercopter.de/">getting the next <i>doener</i> delivered by drone</a> pretty soon....<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKAfJh-VRpeIevt9dubcwnKbg3E3CFrEnLTLEb56R0FhvrrIzwylpfVT-LuaNG8d1uhNbN4s8MBx5sw-jtROHAZgz1yv-MGCivfNxse8Dphk6Rm_PORdeTM9StFsaMcYG40WW6s3GVb0M/s1600/IMG_20121109_140638.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKAfJh-VRpeIevt9dubcwnKbg3E3CFrEnLTLEb56R0FhvrrIzwylpfVT-LuaNG8d1uhNbN4s8MBx5sw-jtROHAZgz1yv-MGCivfNxse8Dphk6Rm_PORdeTM9StFsaMcYG40WW6s3GVb0M/s200/IMG_20121109_140638.jpg" width="160" /></a>Finally, <a href="http://graphics.ethz.ch/%7Egrossm/">Prof. Dr. Markus Gross</a> talked about how to visually reproduce the real-world based on special effects in several animation movies. He reported about the ability of 3D-scanning of still faces and reproducing movements with 7 artificial muscles in contrast to the natural 35 muscles. His prophecy was that in about a five year's time horizon simulated face-movements would be indistinguishable from the real. Thus, Holywood stars would already start protecting the rights on the visual appearance of their bodies, as movements can be done by the computers later rather easily and more cost-efficient.<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxE03_GPStLbSca5mitLfw2-wkxHHi19HfWVp_Ts2dNKFc9wUZLh5cIi1pOVtoxQL4g0imjI8cKw1ACrm51WdqgxrzoEPa_sXcvlCWidT-xHZDwCkAQOHrF1NFRvsoizoktlrXDEy4_7E/s1600/IMG_20121109_143108.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxE03_GPStLbSca5mitLfw2-wkxHHi19HfWVp_Ts2dNKFc9wUZLh5cIi1pOVtoxQL4g0imjI8cKw1ACrm51WdqgxrzoEPa_sXcvlCWidT-xHZDwCkAQOHrF1NFRvsoizoktlrXDEy4_7E/s200/IMG_20121109_143108.jpg" width="160" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyCtoylxw5thvzW4XxpWaQMpfbyIWKKCxPRtxBIEV5bBjHCmbKkca63dCCD0VXddwFShRNxpxBR8QNJCuMworXT4hwRCY6KmkkKmXz154v9q5w9RCi2O_Z1MHHV4kRMRDcgd1ABVcI8cU/s1600/IMG_20121109_143727.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyCtoylxw5thvzW4XxpWaQMpfbyIWKKCxPRtxBIEV5bBjHCmbKkca63dCCD0VXddwFShRNxpxBR8QNJCuMworXT4hwRCY6KmkkKmXz154v9q5w9RCi2O_Z1MHHV4kRMRDcgd1ABVcI8cU/s200/IMG_20121109_143727.jpg" width="160" /></a>In the second part of his talk Prof. Gross talked about humanoid robots that would mimic actors in amusements parks. Based on 3D scans and 3D printing faces can be modeled quickly. As a commercialization of this technology he showed customized barbie puppets carrying faces of the corresponding children. Technological progress sometimes can be fascinating and scary...<br />
<br />
<br />
<br />Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com1tag:blogger.com,1999:blog-6723836170967808000.post-26663369758051427722012-11-16T15:58:00.003+01:002012-11-16T15:58:50.982+01:00White collar crime<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:HyphenationZone>21</w:HyphenationZone>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>DE-CH</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<w:DoNotOptimizeForBrowser/>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin:0cm;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<br />
<div class="MsoPlainText">
In my lecture <a href="http://www.im.ethz.ch/education/HS12/mis.htm">management information systems</a> <a href="http://www.winfobase.de/winfobase/cms_winfobase.nsf/%28ynDK_ContentByKey%29/MichaelSchermann">Michael Schermann</a> from Lehrstuhl für <a href="http://www.winfobase.de/" target="_self">Wirtschaftsinformatik of </a><a href="http://www.tum.de/">Technische Universität München</a> presented on the incentives of in-company crime and instruments for preventing it.</div>
<div class="MsoPlainText">
He started off with the traditional explanation of crime where criminals would simply balance between their crime incentive and the opportunity of being punished. Thus, high punishment would be enough to move the balance and ban crime...</div>
<div class="MsoPlainText">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYF-aNvY3eQXA46XoHKZm5oaCc5FFtHRKfDBhUG-AWhHpIcSqgk2PlOi4zASQcj3UdCa5xIZF4yyqSbuGYlgPTGLG7ZcAchjtxFTNnUMmjN2Sh-Fj6yQt_9tLKgQfCo7le1iC2-1lMP2o/s1600/IMG_20121113_081622.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYF-aNvY3eQXA46XoHKZm5oaCc5FFtHRKfDBhUG-AWhHpIcSqgk2PlOi4zASQcj3UdCa5xIZF4yyqSbuGYlgPTGLG7ZcAchjtxFTNnUMmjN2Sh-Fj6yQt_9tLKgQfCo7le1iC2-1lMP2o/s320/IMG_20121113_081622.jpg" width="320" /></a>However, from practice and from recent experiments we know this does not really hold. People rather have a moral account from where they withdraw and upload credits for their activities: if you buy green, you're more likely to steal...[1].</div>
<div class="MsoPlainText">
Furthermore, the simple cost/benefit analysis of fraud is also overwritten by an inner concept relating to fraud of users. It could be shown that fraud outside one's peer-group is less accepted than one's inside peer-group [2].</div>
As example of fraud Michael listed corruption, higher billing of services/products, and non-cash fraud, e.g. manipulation of salaries - he said 15% of salaries would be adjusted higher than they should be. This shows that the traditional concept of incentive-punishment does not hold and is rather being replaced with an inner self-concept of values: if people park illegally, they are more prone to donate to beggar - in order to compensate their wrong behavior by adjusting their moral inner account.<br />
Interestingly, most fraud is detected by hints of others. Thus, companies have started introducing whistle blower channels in order to collect these hints in a more systematic way. Michael proposed to translate business strategy into core values, which have to be lived up by top-management. There should be a clear list of don'ts to be avoided in companies. Control in companies can focus either on input (if output is hard to measure, e.g. as in research) or on input (e.g. sales).<br />
The practical challenge, however, is to smartly balance between burden and effect. IT can help to better manage and control performance and coherence in order to be more responsive to risks, e.g. software can help to crunch down 126k of suspect emails down to a 1,2k messages.<br />
Michael's slides can be found <a href="http://www.im.ethz.ch/education/HS12/mis12/MIS_ETH_2012_09_wchc_msc.pdf">here</a>. <br />
<div class="MsoPlainText">
<span class="cit-title">[1] Nina Mazar and Chen-Bo Zhong: D<a href="http://web.missouri.edu/%7Esegerti/capstone/GreenProducts.pdf">o Green Products Make Us Better People?</a> </span> <cite><abbr class="site-title" title="Psychological Science">Psychological Science</abbr> <span class="cit-print-date">February 2010 </span><span class="cit-sep cit-sep-after-article-pages">, </span><span class="cit-ahead-of-print-date"><span class="cit-sep cit-sep-before-article-ahead-of-print-date">first published on </span>March 5, 2010 </span></cite><br />
</div>
<div class="MsoPlainText">
[2] Gino, F., Ayal, S. & Ariely, D. (2009). <a href="http://people.duke.edu/%7Edandan/Papers/Cheating/contagion.pdf">Contagion and differentiation in unethical behavior: The effect of one bad apple on the barrel</a>. Psychological Science, 20 (3), 393-398.<br />
</div>
<div class="MsoPlainText">
ariely: coke was gone, dollar where there -) distance to
money increases crime</div>
<div class="MsoPlainText">
<br /></div>
Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com0tag:blogger.com,1999:blog-6723836170967808000.post-82858506774515312012-11-06T16:09:00.000+01:002012-12-07T10:19:56.722+01:00Internet of Things 2012 in Wuxi<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFPxvKL5KN-YTHmz10KOu94rzodNzvByvuwUd5YZAvqn4IAML1vt3svrIbe2-JNC1hbpaO9qVOHB81LsiDYMvdPi3dVzdtinhQSYMLOgoUUzT_MsCd5wbeav8TBAaOqg2knI3b0ISA93Y/s1600/IMG_20121025_091240.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="75" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFPxvKL5KN-YTHmz10KOu94rzodNzvByvuwUd5YZAvqn4IAML1vt3svrIbe2-JNC1hbpaO9qVOHB81LsiDYMvdPi3dVzdtinhQSYMLOgoUUzT_MsCd5wbeav8TBAaOqg2knI3b0ISA93Y/s200/IMG_20121025_091240.jpg" width="150" /></a></div>
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEic4H17RmDDftLDvs9WCtTTqgLJkz6QFu2yCUizOC5qRe0Zelw4qgF-KMXxapK2ArW1RCB2dszBrk3t4baCA-lSWpDNs6E3MUnQhZdjkT4fgG4KGMiMZt-na_I7js__F0R5bF8Mh4pzRL0/s1600/IMG_20121024_181147.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="75" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEic4H17RmDDftLDvs9WCtTTqgLJkz6QFu2yCUizOC5qRe0Zelw4qgF-KMXxapK2ArW1RCB2dszBrk3t4baCA-lSWpDNs6E3MUnQhZdjkT4fgG4KGMiMZt-na_I7js__F0R5bF8Mh4pzRL0/s200/IMG_20121024_181147.jpg" width="100" /></a>As a program co-chair I had the opportunity to visit the recent IoT conference hosted by Fudan University in Wuxi.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8XZVtL5uwI6oO0kHmh0sv6VFjECWAD6o6DPVNC5rTH_DaQB17JB_bSAc0DycArRVFxcSzCxowSrBLstHlqGp_5P_i05Tbi8A3ivTNxXoo60RqP7jDMsgKf2t1wkYUHrGpcfV8qhzQCQw/s1600/IMG_20121025_090326.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="160" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8XZVtL5uwI6oO0kHmh0sv6VFjECWAD6o6DPVNC5rTH_DaQB17JB_bSAc0DycArRVFxcSzCxowSrBLstHlqGp_5P_i05Tbi8A3ivTNxXoo60RqP7jDMsgKf2t1wkYUHrGpcfV8qhzQCQw/s200/IMG_20121025_090326.jpg" width="116" /></a></div>
<a href="http://www.im.ethz.ch/people/efleisch">Elgar Fleisch</a> opened <a href="http://www.iot2012.org/">IoT2012</a> by reviewing the potential of IoT to add things-generated data to the gulf of human-generated data. He listed standards, biz models, ownership management, and human behavior change as future research topics within the IoT domain.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgsGYXkXwk1g6P5oav_KFsMUmviMb2BK8xgZ8UawFJ16TwVoJAeaT5f57ADl7xwehH38QBQO9tD0UhUHog9kzYsPbNRW53Pny9jGrpSGYr2A0icbN2iqYEeJDDU9dUZHr1lptc_1NKrMo/s1600/IMG_20121025_091230.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgsGYXkXwk1g6P5oav_KFsMUmviMb2BK8xgZ8UawFJ16TwVoJAeaT5f57ADl7xwehH38QBQO9tD0UhUHog9kzYsPbNRW53Pny9jGrpSGYr2A0icbN2iqYEeJDDU9dUZHr1lptc_1NKrMo/s200/IMG_20121025_091230.jpg" width="117" /></a></div>
<a href="http://www.it.fudan.edu.cn/en/show.aspx?info_lb=25&info_id=78&flag=5">Li-rong Zheng</a>, general chair IoT2012, thanked the various organizers and conference chairs. Then, Junyu Wang reflected on the importance of <a href="http://en.wuxi.gov.cn/sitePages/subPages/1300350001333726.html">Wuxi as the center of IoT in China</a> walked through the <a href="http://iot2012.org/page.asp?id=144">program</a>. A rigor selection of papers yielded an acceptance rate of only 24.7%.<br />
Finally, I had the pleasure to introduce <a href="http://www.theinternetofthings.eu/stefan-ferber">Stefan Ferber</a> from Bosch who is not only a professional but also passionate private user of IoT technology (see his smart home <a href="http://dieferbers.net/2011/10/02/meteoplug-meteohub-dreamplug-online/">here</a>). In his opening keynote of IoT2012<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3ptchjZ_FAYcT0dVEBDsKwS_WnEht0NtMW_9Vikl46bKyl1B6AqZ-Qy_lucd63NcPMwT1Rq7qzkawSj0igMz_OdSk-7WV9H60OnLDhWRw8n9TPJIsh7e6wiYAgM-Ri82pHJbYbQpBCo8/s1600/IMG_20121025_091846.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="190" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3ptchjZ_FAYcT0dVEBDsKwS_WnEht0NtMW_9Vikl46bKyl1B6AqZ-Qy_lucd63NcPMwT1Rq7qzkawSj0igMz_OdSk-7WV9H60OnLDhWRw8n9TPJIsh7e6wiYAgM-Ri82pHJbYbQpBCo8/s200/IMG_20121025_091846.jpg" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRmLlQLAUG_UQHLPZ6WWMPjySyZsfJGTMD6QWmmaNr7XfoujdIMXIwphOEHeRcL2zadi8lSq195t8uUp13WuyY1fYUJ3JAmjx99cmmVl1UMTpw093d3wbw_1wjJ5hyphenhyphenl40vIIOPa7xm4tM/s1600/IMG_20121025_092834.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRmLlQLAUG_UQHLPZ6WWMPjySyZsfJGTMD6QWmmaNr7XfoujdIMXIwphOEHeRcL2zadi8lSq195t8uUp13WuyY1fYUJ3JAmjx99cmmVl1UMTpw093d3wbw_1wjJ5hyphenhyphenl40vIIOPa7xm4tM/s200/IMG_20121025_092834.jpg" width="105" /></a>Stefan Ferber (see his <a href="http://blog.bosch-si.com/PDF/20121025V09-Bosch-Control2Purpose-IoTS-Print.pdf">slides</a>) introduced to various IoT projects going on within Bosch and reflected on the significant differences between old and new economy in terms of organization structure, decision processes and effectiveness. He showed how technology finally helped to disrupt established hierarchies allowing for more flexible and dynamic patterns of collaboration. By refering to <a href="http://en.wikipedia.org/wiki/Conway%27s_law">Conway's law</a> ("<i>organizations which design systems ... are constrained to produce
designs which are copies of the communication structures of these
organizations") </i>he underlined the importance of changing organizations correspondingly along the technological innovations. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw_BJvVoVbSgrul55sQdrUGcqsX6rO5bPMth-Z3KdEi6fO9N6mM2ouDVW5LAdJTgFj94vlFdPEf20ylsTI5VfaD37J1B5TaAXgeXrOHcHnHFLacFvJ-9daxGI7eX6cgJkGmT8l6du0GNI/s1600/IMG_20121025_091904.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="168" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw_BJvVoVbSgrul55sQdrUGcqsX6rO5bPMth-Z3KdEi6fO9N6mM2ouDVW5LAdJTgFj94vlFdPEf20ylsTI5VfaD37J1B5TaAXgeXrOHcHnHFLacFvJ-9daxGI7eX6cgJkGmT8l6du0GNI/s200/IMG_20121025_091904.jpg" width="200" /></a></div>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_-vzR2VIf2XBRAsdPt47qsr697CcfyTceO08v9ed1xRtOOBHRduRqH5xbBJ_r3YeluOLVw1HypEHhQQ6q6AjCKYfdguZkqnSAxnjwYfs-nhp80K-jRwPKVCH0jRhpqPYZNnFt8WeVtoA/s1600/IMG_20121024_131719.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="75" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_-vzR2VIf2XBRAsdPt47qsr697CcfyTceO08v9ed1xRtOOBHRduRqH5xbBJ_r3YeluOLVw1HypEHhQQ6q6AjCKYfdguZkqnSAxnjwYfs-nhp80K-jRwPKVCH0jRhpqPYZNnFt8WeVtoA/s200/IMG_20121024_131719.jpg" width="100" /></a>Stefan used the very strong metaphor <a href="https://www.youtube.com/watch?v=Cd9cBlvfjow">colliding galaxies</a> to express the impact of IoT to organizations. He introduced the <a href="http://japan.failedrobot.com/">geigermaps project</a> as an example of how a grassroot movement of people connecting their sensors to each other can provide a much faster and more fine-graine picture on radiation than the official authorities could or wanted to provide during the Fukushima accident. As a second example of grassroot movement he refered to the <a href="http://openiotassembly.com/document/">iot bill of rights</a> signed during the <a href="http://openiotassembly.com/">open iot assembly</a> by various stakeholders of IoT as a free movement of concerned individuals outside regulatory bodies.<br />
Stefan went on reflecting on the properties of IoT-enabled products. Originally, <a href="http://en.wikipedia.org/wiki/Russell_L._Ackoff#Purposeful_systems">purposeful systems</a> were handled and controlled by their owners: the owner was responsible, the producer only provided the tool. However, once the tool becomes smart this might change: the tool's functionality grows outside its original physical purpose and follows the digital configuration the producer has set-up. Thus, the producer becomes responsible as well (see also his <a href="http://blog.bosch-si.com/wuxi-iot-week-12-my-journey-starts-why-iot-in-wuxi/">blog post</a> on his <a href="http://blog.bosch-si.com/PDF/20121025V09-Bosch-Control2Purpose-IoTS-Print.pdf">talk</a>).<br />
<br />
<br />
<br />
<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5flILBWpTOBT68yXQ1FnFy9J5Zo8niVLtWX91n1N49U2mlGWALkkx7WDPuoa7gUH5DTxCVtMX07QQTkkgK_kKzBHdQ-dBUbbIQUIHYT_AvJwxZSp5cpGSw9FkarpQdkSAc-9SnIZfrW4/s1600/IMG_20121025_110729.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="161" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5flILBWpTOBT68yXQ1FnFy9J5Zo8niVLtWX91n1N49U2mlGWALkkx7WDPuoa7gUH5DTxCVtMX07QQTkkgK_kKzBHdQ-dBUbbIQUIHYT_AvJwxZSp5cpGSw9FkarpQdkSAc-9SnIZfrW4/s200/IMG_20121025_110729.jpg" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRBox6UzUa6JR8gl2dUvrXRD5uhT6tXHF1AVcIuiVaaWrUd6yS9GXOMfjjaxHQoCI-xfT3h9vpzDW-YrBcADaRc-cfvtQwMgaIimlm0YNLXmzv7KN1cF1zTul9pdefNCbI62iTda2O3mM/s1600/IMG_20121025_111340.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRBox6UzUa6JR8gl2dUvrXRD5uhT6tXHF1AVcIuiVaaWrUd6yS9GXOMfjjaxHQoCI-xfT3h9vpzDW-YrBcADaRc-cfvtQwMgaIimlm0YNLXmzv7KN1cF1zTul9pdefNCbI62iTda2O3mM/s200/IMG_20121025_111340.jpg" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzeQ086w80w0kh2FdpOkIKbbvqZ3pXnUATcrcdmV1RnqTXT3e0xLhi-dE6_fRUzPJy7zQSBb6iiZ7b7ppRvO4xk_1VLdwobqgTqfk1SxLNM9UK7yEjufYzMRDJVTxyOHycKhRN_AZPWak/s1600/IMG_20121025_105423.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="172" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzeQ086w80w0kh2FdpOkIKbbvqZ3pXnUATcrcdmV1RnqTXT3e0xLhi-dE6_fRUzPJy7zQSBb6iiZ7b7ppRvO4xk_1VLdwobqgTqfk1SxLNM9UK7yEjufYzMRDJVTxyOHycKhRN_AZPWak/s200/IMG_20121025_105423.jpg" width="200" /></a>Haitao Liu, <a href="http://www.wsn.cn/"><span class="st"><i>Wuxi SensingNet</i> Industrialization Research Institute</span></a> talked about IoT projects in China which focus on standardization and applications, such as resolving traffic jams, better public transportation and parking guide systems. As part of public security initiatives he mentioned the "Golden Shield Project" which aims at improving communication of security data and management of capturing technology as cameras in public areas. He also mentioned smart homes as an emerging trend in China which would pose challenges of integration and interoperability. There would be also several activities of environment monitoring where single measurements stations are being gradually replaced by swarms of collective pollution meters. Furthermore, IoT projects in China would also focus improving efficiency of agriculture and food safety.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1mt82zLTVM5cLocXN4gqfMhSb8hgI7L6tCPJXhm5NvZoGRvvElq6KFDYkEjcw0if1foKMiAWCHhhSHjt9WXpsIQzKNZmutfd9x6qugNR3r2WV0HjlZBSlRFTAZoLQrqD_iXujonRnggY/s1600/IMG_20121025_111919.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="173" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1mt82zLTVM5cLocXN4gqfMhSb8hgI7L6tCPJXhm5NvZoGRvvElq6KFDYkEjcw0if1foKMiAWCHhhSHjt9WXpsIQzKNZmutfd9x6qugNR3r2WV0HjlZBSlRFTAZoLQrqD_iXujonRnggY/s200/IMG_20121025_111919.jpg" width="200" /></a></div>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdK0kzaPH7dGMV2X_FT6OFDEi0ToH2XXrsv38Tpso80p5JENItrpmK49M7ACxvVv6QHvU15s-_5gfAgL4MJntxciZrrSQxceCz_4s5dcESCoVwF6znZjF4utaINy5l-B2i0R3-doMIrtM/s1600/IMG_20121025_164525.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdK0kzaPH7dGMV2X_FT6OFDEi0ToH2XXrsv38Tpso80p5JENItrpmK49M7ACxvVv6QHvU15s-_5gfAgL4MJntxciZrrSQxceCz_4s5dcESCoVwF6znZjF4utaINy5l-B2i0R3-doMIrtM/s200/IMG_20121025_164525.jpg" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLDtaFNJQsjcEuMCdDxbRvoiTa2V7Wes0pbufJP2enI9nd6Kt2rEkWrM6Zf07z1D3ZwIxEVR9xUx6BCB6lgUqO5MF6iWUImXU6DSMLB5Yr_QL7Gg5ly6zmNTNm4-wGIpBUn7pspUDvuR8/s1600/IMG_20121025_111021.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="175" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLDtaFNJQsjcEuMCdDxbRvoiTa2V7Wes0pbufJP2enI9nd6Kt2rEkWrM6Zf07z1D3ZwIxEVR9xUx6BCB6lgUqO5MF6iWUImXU6DSMLB5Yr_QL7Gg5ly6zmNTNm4-wGIpBUn7pspUDvuR8/s200/IMG_20121025_111021.jpg" width="200" /></a>Overall, it became pretty obvious that IoT in China clearly relies on central power and control leveraging the the central governance system. I'm pretty sure that sooner or later this approach will collide with the rather distributed technical nature of IoT. Mr. Liu concluded his talk by referring to the current bottlenecks of limited understanding of requirements, insufficient standards and prevailing information silos. He mentioned IoT as a big market for Chinese companies for transiting from traditional manufacturing to highter value IT businesses. The Chinese government sees IoT as new enginge to accelerate the development of Smart City construction for upgrading the industrialization in China.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCerhrq97iWR7QKfCWvUsG3PuzzsH7ySa86Uz72qVH5PO1g38GpjLpEfXFwmVKyua2LAdmdwqJEdz8qPi7Ofx7k3HanJKTE6AVFWIQ0PLFJhjGrRmvw2_XJGKjGjuvoBc8vhaX89PBgrI/s1600/IMG_20121025_112711.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="80" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCerhrq97iWR7QKfCWvUsG3PuzzsH7ySa86Uz72qVH5PO1g38GpjLpEfXFwmVKyua2LAdmdwqJEdz8qPi7Ofx7k3HanJKTE6AVFWIQ0PLFJhjGrRmvw2_XJGKjGjuvoBc8vhaX89PBgrI/s400/IMG_20121025_112711.jpg" width="400" /></a></div>
Then the technical program started, the proceedings can be found <a href="http://ieeexplore.ieee.org/search/searchresult.jsp?newsearch=true&queryText=internet+of+things+conference&x=47&y=4">here</a>. Overall, the conference had about 300 visitors. According to comments I received from visitors the mix between large variety of <a href="http://iot2012.org/page.asp?id=142">scientific</a> and <a href="http://iot2012.org/page.asp?id=162">industrial</a> workshops, <a href="http://iot2012.org/page.asp?id=160">demos</a> and <a href="http://iot2012.org/page.asp?id=165">posters</a> was highly appreciated.<br />
Finally, the show goes on in 2014: see you all at <a href="http://www.facebook.com/iot2014">IoT2014</a> hosted by <a href="http://web.mit.edu/lmp/people/sarma.html">Prof. Sanjay Sarma</a> at <a href="http://web.mit.edu/lmp/index.html">MIT</a>.Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com0tag:blogger.com,1999:blog-6723836170967808000.post-46463235198339949272012-10-05T12:20:00.001+02:002012-12-03T21:54:40.782+01:00Semiotics and Internet of Things<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVy87AjWGoSiKXSOr2h47TFs6NVBh8_9_6h9pJu__9YAAN2rtX9GS6eXEOZ6a9nmObgX6-6DDhboRFnLWrKHUJOfSTwnaUg-UdaCAp1PV5-8xbgAO6j-489nCZuxzKgXnkuCgUJcp6A7Y/s1600/IMG_20121004_000955.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVy87AjWGoSiKXSOr2h47TFs6NVBh8_9_6h9pJu__9YAAN2rtX9GS6eXEOZ6a9nmObgX6-6DDhboRFnLWrKHUJOfSTwnaUg-UdaCAp1PV5-8xbgAO6j-489nCZuxzKgXnkuCgUJcp6A7Y/s200/IMG_20121004_000955.jpg" width="200" /></a>I first had to find out about <a href="http://en.wikipedia.org/wiki/Semiotics">Semiotics</a> before I could participate in the Panel on "<span class="normalSessionText"><i>Semiotics and Informatics: Syntax, Semantics and Pragmatics of Knowledge Management in a Social Context"</i></span> at <a href="http://www.ic3k.org/">IC3K'12</a> conference in Barcelona.<br />
I was really curious about how semiotics - studying about properties and functions of sign - could be applied to guide interpretation of phenomena in context. <a href="http://uk.linkedin.com/pub/kecheng-liu/21/272/ba1">Kecheng Liu</a> illustrated how different semiosis between system user and system analysist can create a gap of understanding which may cause many IT projects to fail.<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj704NYW2-ZhzBUfT0VSm1yXMG3PRy0lwil-qx2o-lKdGYIQx_iDKu9HuprLHHw28Gv5gZWMDmp0zbpBfSNk2_8K1rH9IFjqh5erlC4ZY9ggOE5WzgjbAOL_ERxjwwt96gKLyXvojz9ZrU/s1600/IMG_20121004_000904.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj704NYW2-ZhzBUfT0VSm1yXMG3PRy0lwil-qx2o-lKdGYIQx_iDKu9HuprLHHw28Gv5gZWMDmp0zbpBfSNk2_8K1rH9IFjqh5erlC4ZY9ggOE5WzgjbAOL_ERxjwwt96gKLyXvojz9ZrU/s200/IMG_20121004_000904.jpg" width="200" /></a>In my contribution I proposed to apply Semiotics for interpreting things as parts of situations and contexts of use. Furthermore, by analyzing available <a href="http://msdn.microsoft.com/en-us/library/bb190163.aspx">Master Data of products</a> Semiotics could help to derive possible uses of objects which could instruct robots about how to use those - as an alternative to ontologies.<br />
Finally, in I used the opportunity in my keynote to draw the attention of knowledge management to thing-generation data (in addition to people-generated they work on today).<br />
<div class="prezi-player">
<style media="screen" type="text/css">.prezi-player { width: 440px; } .prezi-player-links { text-align: center; }</style><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" height="350" id="prezi_gz8tvd7phqy_" name="prezi_gz8tvd7phqy_" width="440"><param name="movie" value="http://prezi.com/bin/preziloader.swf"/><param name="allowfullscreen" value="true"/><param name="allowFullScreenInteractive" value="true"/><param name="allowscriptaccess" value="always"/><param name="wmode" value="direct"/><param name="bgcolor" value="#ffffff"/><param name="flashvars" value="prezi_id=gz8tvd7phqy_&lock_to_path=0&color=ffffff&autoplay=no&autohide_ctrls=0"/><embed id="preziEmbed_gz8tvd7phqy_" name="preziEmbed_gz8tvd7phqy_" src="http://prezi.com/bin/preziloader.swf" type="application/x-shockwave-flash" allowfullscreen="true" allowFullScreenInteractive="true" allowscriptaccess="always" width="440" height="350" bgcolor="#ffffff" flashvars="prezi_id=gz8tvd7phqy_&lock_to_path=0&color=ffffff&autoplay=no&autohide_ctrls=0"></embed></object><br />
<div class="prezi-player-links">
<a href="http://prezi.com/gz8tvd7phqy_/internet-of-things-towards-new-frontiers-of-knowledge-management/" title="Internet of Things – Towards New Frontiers of Knowledge Management">Internet of Things – Towards New Frontiers of Knowledge Management</a> on <a href="http://prezi.com/">Prezi</a><br />
<br />
<div style="text-align: left;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidqQ2sRU7ue6Ic0Mtw8n14JCdyLNXxE_Dbzg-0M5FNk3BF-XtBg8PUJbsnqoExsWtzs5xqGanNDVw6HfAsBb4bwKLEMxo1MVWr04LjoeLxdpZBTa3vSpTVrTttYe3H41FAzMaLcfBiN7U/s1600/IMG_20121004_000915.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidqQ2sRU7ue6Ic0Mtw8n14JCdyLNXxE_Dbzg-0M5FNk3BF-XtBg8PUJbsnqoExsWtzs5xqGanNDVw6HfAsBb4bwKLEMxo1MVWr04LjoeLxdpZBTa3vSpTVrTttYe3H41FAzMaLcfBiN7U/s200/IMG_20121004_000915.jpg" width="200" /></a>I also liked the <a href="http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CE8QFjAA&url=http%3A%2F%2Fwww.barcelo.com%2FBarceloHotels%2Fen_GB%2Fhotels%2FSpain%2FBarcelona%2Fhotel-barcelo-sants%2Fgeneral-description.aspx&ei=RbNuUJqqGsSBhQeTj4HICw&usg=AFQjCNHW4s8GbQdJnyWMRVaIzMqEeMpfYQ">Barcelo Sants</a> hotel which clearly relyed on Semiotics to be make you feel being in space ship.... </div>
</div>
</div>
<br />Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com3tag:blogger.com,1999:blog-6723836170967808000.post-39016426340272577302012-09-27T12:45:00.001+02:002012-09-27T14:25:56.031+02:00RobIoT @PICNIC12 - when robots meet IoT<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj64Vv5HVTRJUquWR0qlA0ixjYSlejn-77K2G2ZOhCV0L8DC9D9ioXrYfq2bml29Q-lSgSCojH1dhZV-0e1e_N0yD6wPQSAdTXvTwEk1oodGVhQKsf44qAwxJdgRstJBar7_x2se_kEijw/s1600/IMG_20120917_095151.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj64Vv5HVTRJUquWR0qlA0ixjYSlejn-77K2G2ZOhCV0L8DC9D9ioXrYfq2bml29Q-lSgSCojH1dhZV-0e1e_N0yD6wPQSAdTXvTwEk1oodGVhQKsf44qAwxJdgRstJBar7_x2se_kEijw/s200/IMG_20120917_095151.jpg" width="200" /></a>Organizing <a href="http://www.picnicnetwork.org/conference_sessions/314">RobIoT</a> at <a href="http://www.picnicnetwork.org/PICNIC12">Pic-Nic 2012</a> provided me the opportunity to visit the Pic-Nic Festival for a first time. It took place in the <a href="http://eyefilm.nl/en">Eye</a> in Amsterdam. I was asking continuously but apparently it is hard to say who the audience of this conference is: it is not really business, not really academia, it is more about hackers and artists presenting work to people from creative media.<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7FBgB-_yzh_7UfC_SkRIUcbDtCPAYyUq5vhTwY33AcDRDBrj-y_Y4RP3CkGTefSTUOw1RWivTUmD7Ibr8kwmLNPpMzDbYgngyI8oA0cpli9D79AFx_3NTNFQfe3ROAzYOiuubONWGbJs/s1600/IMG_20120917_095902.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7FBgB-_yzh_7UfC_SkRIUcbDtCPAYyUq5vhTwY33AcDRDBrj-y_Y4RP3CkGTefSTUOw1RWivTUmD7Ibr8kwmLNPpMzDbYgngyI8oA0cpli9D79AFx_3NTNFQfe3ROAzYOiuubONWGbJs/s200/IMG_20120917_095902.jpg" width="200" /></a> <br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbo94wwk_F4Aou4-gzCVU_r8yVctRSXCiQvaLcJH0RoGsX8_kkLH7gM6pv9YBde4K2S8h6hVPUHjBYACdJjVBQZ0MxHyPqTPxpE9_ZyUmGuHeTirdJy0B38LPlI3VilZFriM2BNiswJ8w/s1600/IMG_20120917_100458.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbo94wwk_F4Aou4-gzCVU_r8yVctRSXCiQvaLcJH0RoGsX8_kkLH7gM6pv9YBde4K2S8h6hVPUHjBYACdJjVBQZ0MxHyPqTPxpE9_ZyUmGuHeTirdJy0B38LPlI3VilZFriM2BNiswJ8w/s200/IMG_20120917_100458.jpg" width="200" /></a>Before our workshop started I could attend an opening talk of <a href="http://en.wikipedia.org/wiki/George_Dyson_%28science_historian%29">George Dyson</a>
who gave a fantastic talk about the history of IT and the continuous
battle of good vs. evil in research, as IT in a way was also part of the
development of the nuclear bomb. <a href="http://www.linkedin.com/in/byronreese">Byron Reese</a>
gave a rather frantic talk about how IT and media has freed our lifes
from pre-defined marriages/jobs/hobbies/styles. I liked this
introduction but was a bit disappointed about the following yes-we-can
gobbledygook, such as technology would keep our society alive and his
rather cynical finding of "hunger is just a technological problem".<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGB_id6BLeUqSH3ADpaOACYanUaGs1d3nvtGTKSFmWLxnWc-dhphi1CZrj8ADaH85B8cxJsegADBffk6tOmajbSfmTa2Zly0TkQvUNBmna3hhNVQ4iDMKZJxYxMoD575mj7pnMgP2FwS4/s1600/IMG_20120917_102540.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGB_id6BLeUqSH3ADpaOACYanUaGs1d3nvtGTKSFmWLxnWc-dhphi1CZrj8ADaH85B8cxJsegADBffk6tOmajbSfmTa2Zly0TkQvUNBmna3hhNVQ4iDMKZJxYxMoD575mj7pnMgP2FwS4/s200/IMG_20120917_102540.jpg" width="200" /></a><a href="http://www.linkedin.com/pub/richard-pell/1a/358/49%20">Rich Pell</a> from the <a href="http://www.postnatural.org/">Center for Postnatural History</a>
talked about life which was less natural but more cultural. He called
intentionally altering of biological life as animal hacking. He
emphasized how cooperations as Syngenta etc. would secure their
gene-modified seeds: through obscurity, <a href="http://www.nd.edu/%7Echem191/f2.html">terminator gene</a>
preventing an organism from reproduction, and a non-breeding agreement
preventing the farmer from breeding seeds through a legal contract
becoming effecting after the seeds' bag has been opened...<br />
<br />
<div class="p1">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwOzzp8YGrWJMygGxy1vCFNyC4x9j2_Q-tfRSDiO-dpkN-5fUp8AifwHG8f5FES3qlsDQqnis2u7XDrJ4GsslVJAMwN5GJrdcSlbpSh6LMg3I7N47MhL3tLAjBU3nh0kM5bTpERKRPpKY/s1600/IMG_20120917_102136.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwOzzp8YGrWJMygGxy1vCFNyC4x9j2_Q-tfRSDiO-dpkN-5fUp8AifwHG8f5FES3qlsDQqnis2u7XDrJ4GsslVJAMwN5GJrdcSlbpSh6LMg3I7N47MhL3tLAjBU3nh0kM5bTpERKRPpKY/s200/IMG_20120917_102136.jpg" width="150" /></a>Additionally, I could also visit some interesting Demos such as <a href="http://www.sndrv.nl/mobilethrill/">Mobile Thrill</a> which provides experience to your mobile phone: you place your phone on a conveyor build with video switched on, the phone disappears and comes back with its "impressions". Additionally, I also liked the mobile bench.</div>
<br />
<br />
<div class="p1">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaJTCsmmLbcGwu5h5JaMY__yqiXYYl0m5lNMztXUPALHG4jlBu1IqhQwMAyDnxdp9tRiOfH0TzXRZNsDGzaOzU8030UGvPX-Rv55l678g8g8-FtUotiWDD3OPv6F_I40jMUVQ1MuxPNYM/s1600/IMG_20120917_133138.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaJTCsmmLbcGwu5h5JaMY__yqiXYYl0m5lNMztXUPALHG4jlBu1IqhQwMAyDnxdp9tRiOfH0TzXRZNsDGzaOzU8030UGvPX-Rv55l678g8g8-FtUotiWDD3OPv6F_I40jMUVQ1MuxPNYM/s200/IMG_20120917_133138.jpg" width="200" /></a><a href="http://www.theinternetofthings.eu/content/rob-van-kranenburg">Rob van Kranenburg</a> opened <a href="http://www.picnicnetwork.org/conference_sessions/314">RobIoT</a> by predicting the advent of robots in our daily lifes anytime soon. Thus, instead of building nightmarish scenarios of mean robots taking over the world, he proposed thinking more proactively about how we can turn robots into something useful and joyful as the topic for this one day workshop. How can we fuel thr vision of robots and Internet of things with positive scenarios?</div>
<div class="p1">
<a href="http://be.linkedin.com/in/geraldsantucci">Gerald Santucci</a> was talking about future robots<span style="color: black; font-family: Verdana; font-size: small;"> as easily programmable devices that will</span> <span style="color: black; font-size: small;">empower people to write
apps for them the way they do with PCs and smart phones.</span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyXix0mkYK_o7Xy062bWA7q8wZhQq9q3sd-GN7BEVDjRYAIkZP37EUouUJ19cYKZwELhowlcLa6LpI8LsxMwticDs8rmwqQI9IlfzawruQ8qVYhFZjeFpEzfC66AHSOLRpkWzvBktXOsg/s1600/IMG_20120917_155415.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyXix0mkYK_o7Xy062bWA7q8wZhQq9q3sd-GN7BEVDjRYAIkZP37EUouUJ19cYKZwELhowlcLa6LpI8LsxMwticDs8rmwqQI9IlfzawruQ8qVYhFZjeFpEzfC66AHSOLRpkWzvBktXOsg/s200/IMG_20120917_155415.jpg" width="200" /></a></div>
<a href="http://fr.linkedin.com/pub/alessandro-bassi/0/48/24a">Alessandro Bassi </a>compared <a href="http://en.wikipedia.org/wiki/Three_Laws_of_Robotics">Asimov<span style="color: black;"><span style="font-size: small;">'s</span></span> Laws of Robots </a>with the “IoT laws” of <a href="http://en.wikipedia.org/wiki/Adam_Greenfield">Adam Greenfield</a>. He also reminded us that Asimov's Laws, e.g. "A robot may not injure a human being", are not obeyed if we look at the drones killing people in Middle East.</div>
<div class="p1">
<a href="http://www.teco.uni-karlsruhe.de/%7Estefan/">Stefan Gessler</a> gave an overview on the variety of robots of today starting from the dumb vacuum cleaner robot to the humanoid robot. How was elaborating on how to link robots and proposed IoT as a technology for reducing costs for letting also robots communicate.</div>
<div class="p1">
</div>
<div class="p1">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTTX7Nm_03mD2N8VuwtRortNJxiAa7CWb6OK_ZUFx0wynfJY5k8x9Jk6QbDN8JO19LHlPOAAz7wKRZQpKEafGkuL7jshCH3K9ypHJhEVca97-rPx_ggdLGM5Vfcqz8sOcOrpvCRnaZx3w/s1600/IMG_20120917_155408.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTTX7Nm_03mD2N8VuwtRortNJxiAa7CWb6OK_ZUFx0wynfJY5k8x9Jk6QbDN8JO19LHlPOAAz7wKRZQpKEafGkuL7jshCH3K9ypHJhEVca97-rPx_ggdLGM5Vfcqz8sOcOrpvCRnaZx3w/s200/IMG_20120917_155408.jpg" width="200" /></a><a href="http://viad.zhdk.ch/de/people/karmen-franinovic">Karmen Franinovic</a> talked about active material as the basis for activating things. I liked her more integrated perspective of making things active
themselves instead of only having robots as separated mediators for actions.</div>
<div class="p1">
</div>
<div class="p1">
<a href="http://nl.linkedin.com/pub/heico-sandee/1/404/390">Heico Sandee</a> talked about how robots can give hands to the internet and how active actuators could "actify" passive
objects. In order to make that happen research would have to focus on representing, exporting, discovering, executing and matching robot capabilities to real-world tasks and needs.</div>
<div class="p1">
Finally, I <a href="http://prezi.com/s_deadqv1frd/arms-and-legs-for-the-internet-of-things/">talked</a> about how robots could provide the arms and legs for the Internet of Things. I proposed to start with an initial set of basic activities robots could provide, such as moving or searching things. Then, from those basic activities atomic tasks as press/touch/carry/etc. should be derived. Additionally, infrastructure requirements such as localization, hand-over to robots should be solved. And finally, robots should be integrated with Internet of Things, e.g. deriving object use from barcode master data.</div>
<div class="prezi-player">
<style media="screen" type="text/css">.prezi-player { width: 420px; } .prezi-player-links { text-align: center; }</style><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" height="300" id="prezi_s_deadqv1frd" name="prezi_s_deadqv1frd" width="420"><param name="movie" value="http://prezi.com/bin/preziloader.swf"/><param name="allowfullscreen" value="true"/><param name="allowFullScreenInteractive" value="true"/><param name="allowscriptaccess" value="always"/><param name="bgcolor" value="#ffffff"/><param name="flashvars" value="prezi_id=s_deadqv1frd&lock_to_path=0&color=ffffff&autoplay=no&autohide_ctrls=0"/><embed id="preziEmbed_s_deadqv1frd" name="preziEmbed_s_deadqv1frd" src="http://prezi.com/bin/preziloader.swf" type="application/x-shockwave-flash" allowfullscreen="true" allowFullScreenInteractive="true" allowscriptaccess="always" width="420" height="300" bgcolor="#ffffff" flashvars="prezi_id=s_deadqv1frd&lock_to_path=0&color=ffffff&autoplay=no&autohide_ctrls=0"></embed></object><br />
<div class="prezi-player-links">
<a href="http://prezi.com/s_deadqv1frd/arms-and-legs-for-the-internet-of-things/" title="Arms and Legs for the Internet of Things">Arms and Legs for the Internet of Things</a> on <a href="http://prezi.com/">Prezi</a></div>
</div>
<div class="p1">
<br /></div>
<div class="p1">
In the very active discussion with our roughly 40 participants I learned that it probably will not be so so much about robots but rather about actuated materials as pointed out by Karmen. Concerning tasks it may more about tasks humans do not want do, e.g. ironing/car-driving. However, this of course highly depends on personally preferences, too. Robots may also used in combination with persuasive technologies to persuade human users to achieve a personally set goal.<br />
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:HyphenationZone>21</w:HyphenationZone>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>DE-CH</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin:0cm;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:10.0pt;
font-family:"Times New Roman","serif";}
</style>
<![endif]--><span style="font-size: small;"><span style="font-family: "Times New Roman","serif";">There were also critical comments about why we would only think of privileged situations. Are there other cases, too. Or robots the machine staff of the rich? Are disabled not interesting when it comes to business cases?</span> </span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPfHpTNFi-pQ4fObq62jg3pJ8v1TBqySPvUbzAA4NjjFYEkxOz2HUsbG0kko1awdi_krPvt7ylko0IyYZWYdQhX-9WUCNthlHtjxvDWE_VXNO4Put1E1FUxVwW47I0Ksz7Wgs3xp2VUsM/s1600/xxc.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="149" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPfHpTNFi-pQ4fObq62jg3pJ8v1TBqySPvUbzAA4NjjFYEkxOz2HUsbG0kko1awdi_krPvt7ylko0IyYZWYdQhX-9WUCNthlHtjxvDWE_VXNO4Put1E1FUxVwW47I0Ksz7Wgs3xp2VUsM/s200/xxc.jpg" width="200" /></a></div>
Also, some participants mentioned that actuation to a large extend might not be really so much different from screens when it comes to present information or notify the user in more subtle ways (e.g. tapping on ones shoulder).<br />
We also had some good discussion about what we do not want robots to do, what about
taking care of your kids? Could robots allow you to work more, which counters
of <a href="http://www.slp.org/pdf/others/high_tech.pdf">Karl Marx</a>' initial idea of robots allowing you actually to work
less.</div>
<div class="p1">
We discussed whether DIY-robots would be necessary to spark innovation. Certaintly, DIY robots prove
the state of maturity of a technology. We even had a moving plant-robot in the workshop which was build for less then 5 EUR...</div>
<div class="p1">
And finally the discussion closed with questions about responsibility of robots, whether it would be the user, owner or manufacturer, what about garage doors killing people?<br />
I see robots as an emerging topic to be considered with in IoT, see also here [1,2]. <br />
<br />
[1] Kevin Ashton: <a href="http://www.rfidjournal.com/article/articleview/9913/1/82/">Humanizing Robots</a>, RFID Journal, September, 2012.<br />
[2] F. Michahelles, Rob van Kranenburg and Markus Waibel : <a href="http://www.rfidjournal.com/article/view/9773/">Enlisting Robots - Once robots are integrated into the Internet of Things, they can perform tasks automatically.</a>, Inside the labs column in <a href="http://www.rfidjournal.com/">RFID Journal</a>, August, 2012. </div>
<div class="p1">
</div>
Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com0tag:blogger.com,1999:blog-6723836170967808000.post-49629594131054061872012-09-23T23:56:00.000+02:002012-09-26T13:41:04.618+02:003rd Research in the large workshop, this time at MobileHCI2012Having visited already the previous serious of Research in the Large (<a href="http://large.mobilelifecentre.org/2010/">2010</a>, <a href="http://large.mobilelifecentre.org/2011/">2011</a>) I was very much looking forward to meeting the large researchers again investing approaches, tools, research questions for conducting research by deploying apps.<br />
This year I was talking about three topics. In the first paper [1] we investigated the compliance of users of updating their mobile apps. We analyzed the lifecycle of various versions of a released app and found that after one week still half of the users run an old version. Thus, we recommend that developers actively notify their users inside the app to conduct an update.<br />
<a href="http://farm9.staticflickr.com/8457/7993137910_7bc952eef2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="188" src="http://farm9.staticflickr.com/8457/7993137910_7bc952eef2.jpg" width="320" /></a>Throughout the workshop we received interesting comments regarding whether could differentiate within the non-updaters between active and no-longer active users. Furthermore, it could be interesting to cluster the users by age, categories of apps etc. in order to find out whether updaters and non-updaters share certain characteristics. Finally, it would be interesting to track whether the newly introduced 'update all' feature in Android increases the compliance. We might also collect updates histories of apps from <a href="http://appbrain.com/">appbrain.com</a> and compare our results with other apps.<br />
Then I talked about our analysis of apps [2] (based on <a href="http://appaware.com/">appaware.com</a> stats) available in the Android market. We analyzed the volumes of apps being downloaded corresponding to the overall sales. In contrast to amazon which largely live on the<i> longtail </i>of products, the Android market clearly is a <i>hit market</i>, where the most popular products contribute the largest parts of the sales. Our conclusion was that niche apps are still hard to find on the Android market (in contrast to the recommender systems revealing niches in amazon), thus research should focus on developing recommender systems. Furthermore, we found there is a significant amount apps generating large revenues with rather low download numbers by premium prices. Thus, developers should consider to increase the price of their apps significantly.<br />
Finally, I presented NFC Heroes [3] we motivates users by a card trading fight game to upload information about deployed NFC tags.<br />
The feedback we received from the workshop to give more hints to users where NFC tags are, e.g. information about local deployment activities as NFC tags at bus stops in San Francisco. Later, we might also building a service listing places and services of NFC tags in order to educate and inform users where they could use the NFC feature. Finally, we should consider to also listen to NFC intends from other apps on the phone in order to capture any NFC interaction of the user's phone.<br />
<br />
In the workshop we had <a href="http://large.mobilelifecentre.org/2012/?page_id=50">7 talks</a> in total which all latest for only 7min followed by 7min of discussion. This gave us enough time in the afternoon for some more in depth discussion about how to recruit users and what to learn form app stores.<br />
To start off the discussion <a href="http://web.mit.edu/bentley/www/">Frank Bentley</a> first motivated why to do field studies at all (compared to lab studies): investigate real usage, impact of new systems, usability, inspiration, qualitative understanding, or quantitative confirmation of a previous small study.<br />
Then Frank listed various option for recruiting users: in addition to the practice of small studies via <a href="https://www.mturk.com/">mechanical turk</a>, craigslist, posters in stores, snowball sampling, classmates and lab-mates, in the large we can populate the what's new section app stores, app store ads, targeted Facebook ads, re-tweets, personal tweets, presentation, and advertising. Another idea mentioned was to treat user's privacy as the user currency, the user owns and can decide to release for receiving specific services/benefits in return. Finally, our discussions revealed that either way user are recruited it is essential that papers clearly document how this was done. This is the only way that readers and reviewers can judge on the validity of the results.<br />
The second part of the discussion focused on what kind of data and which research questions could be specifically tackled by doing research using app stores. On the one hand we get stats about downloads and locations of apps, logs of button presses, and partly demographics. However, what we don't get is the context of use and insights into why people did or didn't an activity. Overall, we are limited to tasks users in the wild want to do which may limit to tasks which are fun or particularly useful. Finally, a remaining question is as the number of apps in the markets develops and matures, whether the effort of releasing a decent app would be still feasible in near future.<br />
<a href="http://research.yahoo.com/David_Ayman_Shamma">David Aymann Shamma </a>reported about his experience collecting and analyzing data from a chatting app for watching videos remotely together. David focused a lot on responsibility and ethics of treating the data being gathered throughout the project. Handling this massive amounts of data and also highly sensitive data would be a new dimension of what we as researchers would be usually used to. David also recommended to be generous and consider deleting all the session which appear to be odd or incomplete.<br />
<br />
Overall, I really enjoyed meeting all these people sharing an interest for doing research in the large. I'm looking forward to help running this next year again. It's probably also time to come with a manifesto or guidelines describing how to do research in the large. Collective experience of researchers in the domain (e.g. [4]) should motivate the community to consider this new research method going far beyond the established modes of user studies. <br />
<br />
[1] <strong>Update Behavior in App Markets and Security Implications: A Case Study in Google Play</strong>, Andreas Möller, Florian Michahelles, Stefan Diewald, Luis Roalter, Matthias Kranz, <a href="http://large.mobilelifecentre.org/2012/" target="_self">3rd workshop on Research in the large</a> (at <a href="http://www.mobilehci2012.org/" target="_self">MobileHCI 2012</a>), San Francisco, September 21, 2012. [<a href="http://www.im.ethz.ch/publications/large30_submission_3.pdf" target="_self">pdf</a>]<br />
[2]<b> </b><b>Examining the Long Tail of Android Market</b>, Nan Zhong, Florian Michahelles, <a href="http://large.mobilelifecentre.org/2012/" target="_self">3rd workshop on Research in the large</a> (at <a href="http://www.mobilehci2012.org/" target="_self">MobileHCI 2012</a>), San Francisco, September 21, 2012. [<a href="http://www.im.ethz.ch/publications/longtail_zhong_michahelles.pdf" target="_self">pdf</a>]<br />
[3] <b>NFC Heroes – Observing NFC Adoption through a Mobile Trading Card Game</b>, Lukas Murmann, Florian Michahelles, Matthias Kranz, <a href="http://large.mobilelifecentre.org/2012/" target="_self">3rd workshop on Research in the large</a> (at <a href="http://www.mobilehci2012.org/" target="_self">MobileHCI 2012</a>), San Francisco, September 21, 2012. [<a href="http://www.im.ethz.ch/publications/MobileHCI-Workshop-NFCHeros_final.pdf" target="_self">pdf</a>]<br />
<div class="MsoBibliography">
[4] <span lang="EN-US" style="mso-bidi-font-family: "Times New Roman"; mso-no-proof: yes;"><b><a href="http://pielot.org/wp-content/uploads/2011/03/Henze2011-ResearchInTheLarge.pdf">My App is My Experiment: Experience Studiesin Mobile App Stores</a>, </b></span><span lang="IT" style="mso-ansi-language: IT; mso-bidi-font-family: "Times New Roman"; mso-no-proof: yes;">Henze, N., Pielot, M., Poppinga, B.,
Schinke, T., & Boll, S. (2011)</span><span lang="EN-US" style="mso-bidi-font-family: "Times New Roman"; mso-no-proof: yes;">. <i>International Journal of Mobile Human Computer
Interaction</i> <i>, 3</i> (4), 21.</span></div>
Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com0tag:blogger.com,1999:blog-6723836170967808000.post-62000616927949651842012-09-23T19:29:00.000+02:002012-09-23T23:23:54.210+02:00Talking about the state of RFID at RFID Sec 2012<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmocJfkMsmB7PddRoA2FB9OGitYIFdZy2tgEq4OnjUMzeroHM1AFLXWNdDkequ1H68f8OCt4DnS5TYjqE75DqfhRASGPHcc0LG3sl4rUemCZuxQxNRY_JsyKVAbA7MEJ233pfB9QICi-4/s1600/DSC00970.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmocJfkMsmB7PddRoA2FB9OGitYIFdZy2tgEq4OnjUMzeroHM1AFLXWNdDkequ1H68f8OCt4DnS5TYjqE75DqfhRASGPHcc0LG3sl4rUemCZuxQxNRY_JsyKVAbA7MEJ233pfB9QICi-4/s320/DSC00970.JPG" width="320" /></a></div>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0f4ojyO9oMCI9oiEVX37jddt4eqzg_n6qcrNjL-bdBKiqr3wc3XTHE_H3UpyOKK_TRcAQKIEo7pYmyUilwU48Q0fSSxeZOa2xWtCmrR377WaPr2LXXsX8oulTUTTwh3h8HuElfxo1Ros/s1600/DSC00967.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0f4ojyO9oMCI9oiEVX37jddt4eqzg_n6qcrNjL-bdBKiqr3wc3XTHE_H3UpyOKK_TRcAQKIEo7pYmyUilwU48Q0fSSxeZOa2xWtCmrR377WaPr2LXXsX8oulTUTTwh3h8HuElfxo1Ros/s200/DSC00967.JPG" width="200" /></a><br />
I was invited by <a href="http://www.cs.ru.nl/%7Ejhh/">Jaap-Henk Hoepman</a> to give the keynote at <a href="http://rfidsec12.cs.ru.nl/">RFIDSec'2012</a> Nijmegen..<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsxh1NEkGYVvxBrNDAre0EJpN4lm5FZcoTITPhAiWn6LP9SRKf_tqOLeKrq1MuxGAm5wVHLZ7V9EuGPrJ9Tgxi8iOfy4e6-r2NhwGTI49dovKZFrgfSsUOsGBqxUyFOO25sfyPC6Zf4QA/s1600/DSC00969.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsxh1NEkGYVvxBrNDAre0EJpN4lm5FZcoTITPhAiWn6LP9SRKf_tqOLeKrq1MuxGAm5wVHLZ7V9EuGPrJ9Tgxi8iOfy4e6-r2NhwGTI49dovKZFrgfSsUOsGBqxUyFOO25sfyPC6Zf4QA/s200/DSC00969.JPG" width="200" /></a>RFIDSec has been established eight years ago as very focused series of workshops standing of their own emphasizing security under the lower-power, low-computing capabilities, low-cost of RFID technology. It has been quite a while ago I attended this workshop back then when we investigated RFID as a tool against anti-counterfeiting [1]. Giving the keynote provided me with the privilege to show the privacy slide first at the conference. Other speaks pulled out the very same slide later again...we should really think to draw a new slide about this topic;)<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRh6GjKSq7fXSl_n16rzuDUAlPjXYNxHShYhbLI7WEdbrXQwQQYkszrwlbWfsLijv6CvftQivw5b5oKmgDo2631OpRe07ZNjSzPDVocoEizc6M61TBIkmKnqYqPTOwXHabLNrF9-mUEMA/s1600/DSC00971.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRh6GjKSq7fXSl_n16rzuDUAlPjXYNxHShYhbLI7WEdbrXQwQQYkszrwlbWfsLijv6CvftQivw5b5oKmgDo2631OpRe07ZNjSzPDVocoEizc6M61TBIkmKnqYqPTOwXHabLNrF9-mUEMA/s200/DSC00971.JPG" width="200" /></a>Thus I reviewed the history and development of RFID in my talk "<span id="prezi_title">When will RFID embrace our everyday lifes?"</span> (see my <a href="http://prezi.com/ay2wmwjsdsvf/when-will-rfid-embrace-our-everyday-lifes/">prezi</a>). I should what happened and what not happened: no RFID tags on items in the retail stores. I provided some hope and asked for patience, as reviewing the history of barcode also revealed very long development and deployment cycles. Finally, I proposed to drive adoption by identifying clear business cases, providing out-of-the box tool for easing deployment and, ultimately, to focus on user experience. For more details see also the conference report of <a href="http://www.cs.ru.nl/%7Ejhh/">Jaap-Henk Hoepman</a> which almost provides a transcript of my talk (see <a href="http://blog.xot.nl/2012/07/03/rfidsec-2012-day-1-summary-of-presentations/">here</a>).<br />
<br />
[1] Lehtonen, M., Staake, T., Michahelles, F., Fleisch, E.: <a href="http://www.im.ethz.ch/people/mlehtonen/RFIDsec06.pdf">From Identification to Authentication - A Review of RFID Product Authentication Technique</a>, Workshop on RFID Security -- RFIDSec 06, July 2006.<br />
<br />Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com0tag:blogger.com,1999:blog-6723836170967808000.post-86253983481211294692012-09-20T00:37:00.000+02:002012-09-20T00:37:47.420+02:00Smart SysTech 2012 <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHWAKWIQWSE6iqpr9oXpC9QhqufWmGeuLL5Yc7_fFZRzG9STXqPHOkuTyf6fM6qC0uwAZ08mLW5ahPX5Hn74llQo6UE8935bPCdLWq9lutWTqImCZ5iMWiC9h5zPeW3_HbLxLVckCksT4/s1600/DSC00860.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHWAKWIQWSE6iqpr9oXpC9QhqufWmGeuLL5Yc7_fFZRzG9STXqPHOkuTyf6fM6qC0uwAZ08mLW5ahPX5Hn74llQo6UE8935bPCdLWq9lutWTqImCZ5iMWiC9h5zPeW3_HbLxLVckCksT4/s200/DSC00860.JPG" width="200" /></a><a href="http://smart-systech.eu/">SmartSysTech</a>, the former <a href="http://www.rfid-systech.eu/">RFIDSysTech</a> conference, has broadened its scope beyond RFID on sensor tags and smart objects.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg53RBOMJzdJYvdXTlBdnaVX7wfx9rihn9Xu7qJ_fmf_dv0CIaOXn8r6-bqs8_APv40earm7l6Lom0GCLM1MDuyp0m5mKKPskEChFDTZMYD55itU2jLO70vK-eTLxjegx_kUhs4_3h2yVk/s1600/DSC00859.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg53RBOMJzdJYvdXTlBdnaVX7wfx9rihn9Xu7qJ_fmf_dv0CIaOXn8r6-bqs8_APv40earm7l6Lom0GCLM1MDuyp0m5mKKPskEChFDTZMYD55itU2jLO70vK-eTLxjegx_kUhs4_3h2yVk/s200/DSC00859.JPG" width="200" /></a><a href="http://www.linkedin.com/profile/view?id=11787296&authType=NAME_SEARCH&authToken=VVsw&locale=en_US&srchid=644b970c-b276-4a6a-90df-25adab62dd57-0&srchindex=1&srchtotal=8&goback=.fps_PBCK_*1_Werner_Mohr_*1_*1_*1_*1_*2_*1_Y_*1_*1_*1_false_1_R_*1_*51_*1_*51_true_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2_*2&pvs=ps&trk=pp_profile_name_link">Werner Mohr</a>, Head of research alliances at Nokia/Siemens introduced to the emerging <a href="http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&ved=0CDMQFjAB&url=http%3A%2F%2Fwww.ericsson.com%2Fres%2Fdocs%2Fwhitepapers%2Fwp-50-billions.pdf&ei=akVaULeFMKiK4gSs-oGADA&usg=AFQjCNGh6Gnq2VeTrPOh5f2Bhwp2pOR9Hg">50 billion devices</a> being to te internet connected soon and the resulting challenges.Biggest growth in connectivity already today stems from mobile connections. Challenges will be managing the heterogeneity of networked objects, privacy and security. Main driver is the faster adressing of economic exploitation and societal challenges (logistics, agriculture, energy, health).<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipF-YnPv9HDbCIKmfw7rABCLKX6WfyHZPoNLa6wE2eMrhZ7vyew-i7R4AK8iGiHR0XnwVZ5193R9X0UwAhOe4DmfB7prRIHlfom-dAREmfuzy6BOBLin5KWod9m7Ad7GRzfesVMs8msG0/s1600/iot_ber_smartsys.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipF-YnPv9HDbCIKmfw7rABCLKX6WfyHZPoNLa6wE2eMrhZ7vyew-i7R4AK8iGiHR0XnwVZ5193R9X0UwAhOe4DmfB7prRIHlfom-dAREmfuzy6BOBLin5KWod9m7Ad7GRzfesVMs8msG0/s400/iot_ber_smartsys.jpg" width="132" /></a>Data has to be continuously processed in a distributed manner. Mohr outlined that Japan would mostly focus broadband, US on new protocols, and EU on combine various protocols. By presenting examples of fleet monitoring and energy distribution, Mohr described Internet of Things (IoT) as the generic enabler for multi-purpose application frameworks instead single applications focus as done by cloud computing.<br />
IoT - based on RFID, cyber physical systems,M2M, NFC - provides the building blocks for various applications (he didn't really tell which in particular;). As a result distributed intelligence would heavily contribute to the overall internet traffic growth such that new challenges emerge from scalability, security and privacy.<br />
<br />
<br />
Obviously, the acronym RFID in more than half of the titles of the papers being presented clearly documents the roots of this conference. Overall, I had the feeling that this conference could have the potential to establish itself as a major for German/European research on Smart Objects and Internet of Things. I'm looking forward to participating next year again.<br />
<br />
<br />Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com0tag:blogger.com,1999:blog-6723836170967808000.post-51673141656101447172012-09-20T00:17:00.001+02:002012-09-20T00:17:49.524+02:0010th and last Pervasive Conference: 2012 in Newcastle<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUd1SqVlEOglJXALsoRYcr7i4Us4EtSnOY2pTQxdowyVdG24Zr_rV2p6L7v90hKzFg1kFG63dl_ecFPjFZpEf41uiX5mp9oyMPPwECb-06A2h995pZiIkpFZEmVUyu2rbmkfNU8pFgLDQ/s1600/DSC00899.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUd1SqVlEOglJXALsoRYcr7i4Us4EtSnOY2pTQxdowyVdG24Zr_rV2p6L7v90hKzFg1kFG63dl_ecFPjFZpEf41uiX5mp9oyMPPwECb-06A2h995pZiIkpFZEmVUyu2rbmkfNU8pFgLDQ/s200/DSC00899.JPG" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiALLycEkKVd0zsDVAf9xrGQyWE_0n49kgZkBSPKJgQ0i8z43uZF4JfQ5hRrp_n_RIeITOP2kP3K1Ykf8S12pyBvZIrk89ugr8FTWriNROYnthpuR6Om5TY_vgQUaUTtiCIKvappKZa_Dk/s1600/DSC00897.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiALLycEkKVd0zsDVAf9xrGQyWE_0n49kgZkBSPKJgQ0i8z43uZF4JfQ5hRrp_n_RIeITOP2kP3K1Ykf8S12pyBvZIrk89ugr8FTWriNROYnthpuR6Om5TY_vgQUaUTtiCIKvappKZa_Dk/s200/DSC00897.JPG" width="200" /></a>Judy Kay announced the tenth and last Pervasive Conference (as it will be merged with Ubicomp and disappear in the name). Then I was surprised to see the Gaia paper [1] receiving the 10yrs impact award. Probably this paper would not have been accepted at any of the recent Pervasive conference as it misses a user study;)<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXxyloJNF9YbcxgACNcGjmgqFb7EbMudXAZR0vj7k6vbKHJZCv2dAEJtqEaZXx199yOAJLuHzKmCeMTvIhrt7v-1Yt62fNbHS7Lw3qGOtGJM_uykmeJAFFySl5ov_4bVsU6NlmjEV-Os8/s1600/perv12.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXxyloJNF9YbcxgACNcGjmgqFb7EbMudXAZR0vj7k6vbKHJZCv2dAEJtqEaZXx199yOAJLuHzKmCeMTvIhrt7v-1Yt62fNbHS7Lw3qGOtGJM_uykmeJAFFySl5ov_4bVsU6NlmjEV-Os8/s320/perv12.jpg" width="320" /></a><a href="http://www.linkedin.com/pub/sanjiv-nanda/0/317/900">Sanjiv Nanda</a>, vice president of engineering of <a href="http://www.qualcomm.com/">Qualcomm</a>, open the conference as the first keynote speaker about "Intelligent Devices and Smart Environments". His review of the history of the mobile phone starting as portable devices was quite charming but also a bit boring for conference audience. Pointing out the development of low power as a main challenge was not that surprising either. However, whereas his several examples of inferring day-in-the-life situations as a bottom up approach for achieving always-on intelligent devices were kind of common place, too, only later I understood that the actual mission of Qualcomm was to embed 10 years of activity recognition research on chip. Thus, positioning Qualcomm as the provider of context recognition technology in our future smart appliances did indeed convince me.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiW4XHMkCkC2CfbDFJX9ICrjJfsx_VYn8rhhCoo7fis_QkS7ny0o_CNfOBxWRvkRsn-hNWGg9dmbpkKsPD_J1MLL7FnwM5owjkmlJpj4MTHnDa4UnUjh0XlIR7U3_acZomRKUpexfY0Iw/s1600/DSC00896.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiW4XHMkCkC2CfbDFJX9ICrjJfsx_VYn8rhhCoo7fis_QkS7ny0o_CNfOBxWRvkRsn-hNWGg9dmbpkKsPD_J1MLL7FnwM5owjkmlJpj4MTHnDa4UnUjh0XlIR7U3_acZomRKUpexfY0Iw/s200/DSC00896.JPG" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkgHVIPvLE9cDaEdQxOqXAyP04JjyopNu5zJXodcQVAmJNy0xquuXHTpuHVGCOOxWrBIqqZDdijWabL6SGfvLQP_gbARlZaw2LBnOJauTcRgoVsln2D8_4m_sdHfmT9C0MD-wdyau-2Ps/s1600/perv122.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a>The organizers of the conference put huge efforts into providing "pervasive experience" with interaction kiosk for browsing the programm, active RFID badges taking pictures of participants in certain places, and a twitter display highlighting comments. Still I was surprised how much more it takes to even motivate the techie <br />
<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmcSTpcEhv3y0Vt0A7L6ezVQ6RjvRfTEr7YFSwOZ83xUmNEDuzD-daWlBwx8YwfiHzUTleDVPwrfQkdWjgtwfn-yJdrekZt8WuHWWxlwJHmgAvLnWX3lg-BsoU0lix4tOu5IIZThgJlt8/s1600/perv122.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="106" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmcSTpcEhv3y0Vt0A7L6ezVQ6RjvRfTEr7YFSwOZ83xUmNEDuzD-daWlBwx8YwfiHzUTleDVPwrfQkdWjgtwfn-yJdrekZt8WuHWWxlwJHmgAvLnWX3lg-BsoU0lix4tOu5IIZThgJlt8/s320/perv122.jpg" width="320" /></a>I really enjoyed the talk [2] of <a href="http://www.ifi.uzh.ch/zpac/people/mennicken.html">Sarah Mennicken</a> which reviewed the different roles of actors when smart homes would become reality. Of course, as always at ubicomp and pervasive, there were mixed opinions about this paper whether this type of ethnographic research is on pal with technical work of building systems. Nevertheless, I'm pretty sure if someone would look back on smart homes in a few years it will be rather the technical papers becoming outdated than this ethnographic studies revealing stereotypes and roles of people involved with smart homes.<br />
Close to the end of the conference I reported about our own work of deploying Facebook comments of Facebook Brand page of a retail store in the store itself [3]. We conducted interviews which were qualitatively and quantitatively analyzed in order to derive perceptions of consumers with regards to brand innovativeness and attractiveness. Finally, we could conclude that FB comments in store have a positive effect on sales, however, not as strong as traditional advertising. Overall, the project was positively received due to it practical implications and real world deployment.<br />
Pervasive crowd to put their comments on social media.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ_K1HElH_fi1pdAq0v0z4FxX-ZUHMVfTNnPQjms7Hz6PAF9sQZAF0x3cc5jm0GSEW1a-_h2U_t9II-_quLbnYxECqHKxYc3AVCFFUTH_LeZAjaQ7sovGj0BKavUikEOgtxmIef72klvU/s1600/DSC00911.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ_K1HElH_fi1pdAq0v0z4FxX-ZUHMVfTNnPQjms7Hz6PAF9sQZAF0x3cc5jm0GSEW1a-_h2U_t9II-_quLbnYxECqHKxYc3AVCFFUTH_LeZAjaQ7sovGj0BKavUikEOgtxmIef72klvU/s200/DSC00911.JPG" width="200" /></a>Passing through the exhibition space of the conference I spotted an interesting idea of finding each other in city [4]: localization based on images of each others mobile phone pictures.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfd4FoZ7kzfV6nxDtzTb81dq97SmtDcBITr0X7pjT6epRrC9oF3bm3VAAotPIbUq43l9yBGS20CXZ6LzPx-hjwFmC5a7Ve6w575L2qpcHS3-y-f8nwf0ae4NRXjGe5dDu-a9YJcEPE3ms/s1600/DSC00908.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfd4FoZ7kzfV6nxDtzTb81dq97SmtDcBITr0X7pjT6epRrC9oF3bm3VAAotPIbUq43l9yBGS20CXZ6LzPx-hjwFmC5a7Ve6w575L2qpcHS3-y-f8nwf0ae4NRXjGe5dDu-a9YJcEPE3ms/s200/DSC00908.JPG" width="200" /></a> My favourite however was [5] which proposed to enable crowdsourcing of microtasks (similar to mechnical turk) but with immediate rewards in the user's situation. The paper described an evaluation of deploying smart phone tasks for passengers of Riskha's in India and giving them a discount for the ride after completion of the task. I saw this a very refreshing and well elaborated new idea. <br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivmiDQ4fh05-l6LRyYC7T-g5LeNQORugJwD1maRyNdNIybP64NuOjJgFStnpB2tAOaZIetLTTy9DGT_x1vsCzuFQohnXsGc5bcCssON2oHTl_G8FreKFIRNqGjYmy88oJA58VxQ1avBSE/s1600/DSC00910.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="111" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivmiDQ4fh05-l6LRyYC7T-g5LeNQORugJwD1maRyNdNIybP64NuOjJgFStnpB2tAOaZIetLTTy9DGT_x1vsCzuFQohnXsGc5bcCssON2oHTl_G8FreKFIRNqGjYmy88oJA58VxQ1avBSE/s200/DSC00910.JPG" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHCIAcSwVwKMqzGSC-z3iLlINXbH2Y_G1sYlz1D4D2evu9XuZJjMUHdOXwIF7cCWhIzEvj-8p5t_SuAfOePNjJs0X81E2zXlSbaGHGleEQ_zY2gP4V9jABzOrJuBda9-T79RtM1p7pGs4/s1600/DSC00909.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHCIAcSwVwKMqzGSC-z3iLlINXbH2Y_G1sYlz1D4D2evu9XuZJjMUHdOXwIF7cCWhIzEvj-8p5t_SuAfOePNjJs0X81E2zXlSbaGHGleEQ_zY2gP4V9jABzOrJuBda9-T79RtM1p7pGs4/s200/DSC00909.JPG" width="200" /></a></div>
The RefrigerMeter [6] provided an interesting alternative to RFID for detecting what's in the fridge. The demo showed how to identify items by their foot print in the fridge measured by LED's.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb17izcy56bMuo9bFXs5rC6WPRha5sBX5CC5aoHqvoC6VXFRQGwSQJdITsaa0XOhZK4-SS8PruTtEeiWvbqEvacidsUWx9Bv0ld5KBEFoJXkX8m3NZeuGCx3GZ3iPw0_nzZnAjeYq7PkU/s1600/DSC00912.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb17izcy56bMuo9bFXs5rC6WPRha5sBX5CC5aoHqvoC6VXFRQGwSQJdITsaa0XOhZK4-SS8PruTtEeiWvbqEvacidsUWx9Bv0ld5KBEFoJXkX8m3NZeuGCx3GZ3iPw0_nzZnAjeYq7PkU/s200/DSC00912.JPG" width="200" /></a>Overall, I enjoyed this very lively and also last series of Pervasive Conferences. I couldn't quite follow the arguments of the steering committee of merging ubicomp and pervasive. I'd have rather proposed to work on making the differences of these two conference more explicit and separate between technical topics, e.g. activity recognition, and ethnographic studies. However, I could understand that in the end it's about prestige of the field where defining only one event per years as the hub of ubicomp research potentially could increase the visibility of the field. I'm looking forward how this works out, I'm pretty sure the merged conference in Zurich will be a success. However, I also expect former 2nd tier conferences, such as <a href="http://mum2012.org/">MuM</a>, <a href="http://mobiquitous.org/2011/">Mobiquitous</a>, <a href="http://www.mobilehci2012.org/">MobileHCI </a>catching up and filling the gap of Pervasive Conference quicker than expected. Thus, dynamics and organic growth should be refreshing.<br />
<br />
[1] Christopher K. Hess, Manuel Roman, and Roy H. Campbell. 2002. <a href="http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCYQFjAA&url=http%3A%2F%2Fgaia.cs.uiuc.edu%2Fpapers%2Fpervasive02.pdf&ei=YD1aUNGtLMr_4QTqrIDAAQ&usg=AFQjCNF3nQyimzIyFCpJh-UyZ4KmYF6-Jg">Building Applications for Ubiquitous Computing Environments</a>, Pervasive '02.<br />
[2] Sarah Mennicken, Elaine M. Huang, <a href="http://www.merlin.uzh.ch/publication/show/6875" target="_blank">Hacking the Natural Habitat: An in-the-wild study of smart homes, their development, and the people who live in them</a>, In: Pervasive 2012, Newcastle, UK, 2012-06-19.<br />
[3] Erica Dubach, Christian Hildebrand, Florian Michahelles: <a href="http://www.im.ethz.ch/publications/20120306_Displays_Experiment_Pervasive_33.pdf">Increasing Brand Attractiveness and Sales Through Social Media Comments on Public Displays – Evidence from a Field Experiment in the Retail Industry</a>,
Tenth International Conference on Pervasive Computing, Newcastle, UK,
June 2012. <br />
[4] Daisuke Kamisaka, Takafumi Watanabe, Shigeki Muramatsu, Arei Kobayashi, Hiroyuki Yokoyama: <a href="http://www.springerlink.com/content/k67073m6216qv801/">Estimating Position Relation between Two Pedestrians Using Mobile Phones</a>, Paper/Demo,
Tenth International Conference on Pervasive Computing, Newcastle, UK,
June 2012.<br />
[5] Navkar Samdaria, Akhil Mathur, Ravin Balakrishnan: <a href="http://www.springerlink.com/content/h55r050717602813/">Paying in Kind for Crowdsourced Work in Developing Regions</a>, Paper/Demo, Tenth International Conference on Pervasive Computing, Newcastle, UK,
June 2012.<br />
[6] Marina Mikubo, Koji Tsukada, Itiro Siio: <a href="http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CC8QFjAA&url=http%3A%2F%2Forange.siio.jp%2F%7Emarinam%2Fpdf%2Fpervasive2012demo_RefrigeMeter.pdf&ei=7EFaUN2NNIj44QSbxYDgAg&usg=AFQjCNFenvKF-b9SL9UdqIh_e2rCwjp8Ag">RefrigeMeter: Automatic Detect/Display System for Items in the Refrigerator</a>, Demo, Tenth International Conference on Pervasive Computing, Newcastle, UK,
June 2012. Florian Michahelleshttp://www.blogger.com/profile/01231342306670635336noreply@blogger.com0