Главная > Документ


Mobile Web Design & Development Bibliography

University of Washington Extension Course WEB 345

I've always loved bibliographies, and have been creating my own since about 3rd grade. A good bibliography should point you at excellent foundational materials, thought-provoking secondary works, and at least some works you might not ever find on your own. Any bibliography that doesn't challenge as well as enlighten is a waste of effort for all concerned. (Thank goodness I'm getting some mileage from all those reference courses I took in my MLIS program!)

Unless otherwise noted, abstracts and review comments are from journal, publisher or bookseller websites.

If you download this as a Microsoft Word document to your computer, you can use the weblinks. You may also print it out as an Adobe PDF file. This version is approximately ## pages in length.

This is a work in progress, so items will be added over time; Web resources are included, but I dislike the term "webliography". As is the nature of all things Web, some links may be dead when you try them. If you encounter a permanently dead link, please let me know. Likewise, if you have a great resource you'd like added, let me know. Thanks!

3point7designs (2007): Ways to Test Your Site for the Mobile Web

/blog/2007/01/08/ways-to-test-your-site-for-the-mobile-web/

AccuraCast (2006): Mobile Websites

-- Design (/seo-weekly/mobile-web.php)

-- Optimization (/services/mobile-search-marketing/optimisation.php)

Adas M. (2006): Dominance by Design: Technological Imperatives and America’s Civilizing Mission. (Belknap Press, 2006. ISBN 0-674-01867-2) Long before the United States became a major force in global affairs, Americans believed in their superiority over others because of their inventiveness, productivity, and economic and social well-being. U.S. expansionists assumed a mandate to “civilize” non-Western peoples by demanding submission to American technological prowess and design. Pursues the history of this mission through America’s foreign relations over nearly four centuries from North America to the Philippines, Vietnam, and the Persian Gulf.

Adcock N. (2007): Mobilize Your Blog: Ways to make sure your blog displays well on the smaller screens found on mobile devices. Smartphone & Pocket PC Magazine. Feb-Mar 2007:45-49.

Adobe Systems Inc. (2005): Creating SVG with Adobe Illustrator CS2. Tutorial.

(2007): Professional Mobile Portal Web Layout. Tutorial. /articles/2820/1/Professional-Mobile-Portal-Web-Layout

Agar J. (2005): Constant Touch: A Global History of the Mobile Phone. (Totem Books; ISBN 1840465417) Compact history of the rise and spread of mobile phones.

Aiello M., Platzer C., Rosenberg F., Tran H., Vasko M., Dustdar S. (2006): Web service indexing for efficient retrieval and composition. Proc Joint Conference 8th IEEE Intl Conf on e-Commerce and Technology/3rd IEEE Intl Conf on Enterprise Computing, e-Commerce and e-Services/3rd IEEE Intl Workshop on Mobile Commerce and Wireless Services/Joint Workshop 2nd Intl Workshop on Business Service Networks/2nd Intl Workshop On Service Oriented Solutions for Cooperative Organizations.

Akkiraju R., Srivastava B., Ivan A., Goodwin R., Syeda-Mahmood T. (2006): Semantic matching to achieve Web service discovery and composition. Proc Joint Conference 8th IEEE Intl Conf on e-Commerce and Technology/3rd IEEE Intl Conf on Enterprise Computing, e-Commerce and e-Services/3rd IEEE Intl Workshop on Mobile Commerce and Wireless Services/Joint Workshop 2nd Intl Workshop on Business Service Networks/2nd Intl Workshop On Service Oriented Solutions for Cooperative Organizations.

Al-Hawamdeh S. (2003): Usability Issues and Limitations of Mobile Devices (Ch X in Shi (Ed.): Wireless Communications and Mobile Commerce. Hershey, PA: Idea Group Publishing, 2004; ISBN 1-59140-164-4)

Anastasi G., Conti M., Gregori E., Pelusi L., Passarella A. ( ): An energy-efficient protocol for multimedia streaming in a mobile environment. International Journal of Pervasive Computing and Communications 1(4):Paper 6. Pervasive services and smart environments are becoming more and more popular as an ever-increasing number of people enjoy these services typically by means of portable devices. These devices are battery-fed and, thus, energy efficiency is a critical factor for the deployment of pervasive services. In this paper we focus on multimedia streaming services for mobile users. Specifically, we consider a scenario where mobile users with Wi-Fi devices access the Internet to receive audio files from a remote streaming server. We propose a proxy-based architecture and an energy-efficient streaming protocol that minimize the energy consumption of the Wi-Fi interface at the mobile device, while guaranteeing the real-time constraints of the audio streaming. The experimental analysis performed on a prototype implementation shows that our solution allows an energy saving ranging from 76% to 91% of the total consumption due to the network interface. Moreover, it also preserves a good user-level Quality of Service.

Anderson C.R., Domingos P., Weld D.S. (2001): Personalizing web sites for mobile users. Proc 10th Intl Conf on the World Wide Web, pp 565-575.

Anderson J.B., Johannesson R. (2005): Understanding Information Transmission. (Wiley-IEEE Press: Understanding Science & Technology Series. ISBN 0471679100) Aimed at students and consumers, introduces the entire field of information technology. Seven chapters span: the nature, storage, transmission, networking, and protection of information. Presents the history of information technology, profiles incredible inventions and fascinating inventors, and their dramatic impact on society. Features include problem sets, key points, suggested reading, review appendices, and a full chapter on mathematical methods.

Anderson N.: Ars Technica columns

-- CALEA: It doesn't apply to universities and libraries after all.

/news.ars/post/20070517-calea-it-doesnt-apply-to-universities-and-libraries-after-all.html

-- House Dems: Broadband isn't broadband unless its 2 Mbps.

/news.ars/post/20070517-house-dems-broadband-isnt-broa

dband-unless-its-2-mbps.html

-- The RFID Guardian: A Firewall for Your Tags

/articles/culture/rfid-guardian.ars

-- Cable lobby group: Gutting the FCC would be better for everyone.

/news.ars/post/20070516-cable-lobby-group-gutting-the-fcc-would-be-better-for-everyone.html

-- Wireless Network Neutrality Opponents: The status quo is good enough.

/news.ars/post/20070503-wireless-network-neutrality-opponents-the-status-quo-is-good-enough.html

Andreas (2005): Serving content to mobiles: XHTML 1.0 or XHTML Basic?

/mtarchive/001504.php

Andrews D. (2005): 101 Cool Smartphone Techniques: Covers Series 60 Phones from Nokia, Samsung, Siemens, Panasonic, Sendo and more! (Wiley; ISBN 0764579428) is the key that unlocks tricks you never guessed your phone could do. Find out how to blacklist unwanted calls, set your camera features on “fast draw” so you never miss a shot, create your own ringtones, send video, encrypt data on your phone, install and remove software, and: get expert advice on buying a smartphone, configuring it, and transferring data from your old phone; send automatic text message responses to callers; replace your phone’s wallpaper with your own images; create an e-book you can read on your phone; quickly locate files and multimedia; super-size your caller ID; use shortcuts to fast-forward, rewind, or play back video; connect to your PC via Bluetooth or infrared technology; lock your memory card and back up data stored there or in your phone memory; and open zipped files on your phone.

Armstrong T., Trescases O., Amza C., de Lara E. (2006): Efficient and transparent dynamic content updates for mobile clients. MobiSys2006. The Fourth International Conference on Mobile Systems, Applications and Services, pp 56-68.

Arnheim R. (1969): Visual Thinking. (Reissue: Berkeley: University of California Press, 2004; ISBN 0520242262) " asserts that all thinking (not just thinking related to art) is basically perceptual in nature, and that the ancient dichotomy between seeing and thinking, between perceiving and reasoning, is false and misleading. An indispensable tool for students and for those interested in the arts."

Artymiak, J. (2002): Flash on Mobile and Embedded Devices

/pub/a/javascript/2002/08/02/flash_embedded.html

Asakura Y., Iryo T. (2007): Analysis of tourist behaviour based on the tracking data collected using a mobile communication instrument. In Transportation Research Part A: Policy and Practice. 41(7):684-690. Detailed and accurate travel data are useful for understanding travel behaviour and evaluating the actual effects of transport policy such as traffic demand management. This paper studies a simple index of a tourist behaviour using tracking data collected with a mobile instrument. Based on data collected in Kobe, cluster analysis is applied to find the topological characteristics of tourist behaviour.

Aspinall C. (2006): Do I make you uncomfortable? Reflections on using surgery to reduce the distress of others. In Parens (Ed.): Surgically Shaping Children: Technology, Ethics, and the Pursuit of Normality.

Ashok BabuRaj C., Thabasu Kannan S. (2006): Effective and efficient mining of data in mobile computing. IAENG Intl J Comp Sci 32(4):414-418. "Highlights the data mining techniques applied to mine for location and mobility management. Location management is a very important and complex problem in today's mobile computing environments. There is a need to develop algorithms that could capture this complexity, yet can be easily implemented and used to solve a wide range of location management scenarios. In the reporting cell location management scheme, the mapping is done on the basis of classification. Some cells in the network are designated as reporting cells: mobile terminals update their positions (location update) upon entering one of these reporting cells. The remaining cells are designated as non-reporting cells. In the proposed scheme, an supervised learning technique is being introduced which maintains the history or mobility pattern (of size h) of the last visited reporting cell. The updation does not take place, when the user roams with in the reporting cells of his mobility pattern. The location management is updated when the user enters in to the new reporting cell, which is not in his history.

Artificial life techniques have been used to solve a wide range of complex problems in recent times. The power of these techniques stems from the capability in searching large search spaces, which arise in many combinatorial optimization problems very efficiently. To create such a planner, genetic algorithm has been implemented to show that the total cost is less when compared with the existing cost based updation and searching scheme."

Aspinall C.: Do I Make You Uncomfortable? Reflections on Using Surgery to Reduce the Distress of Others. In E. Parens (Ed.): Surgically Shaping Children: Technology, Ethics, and the Pursuit of Normality. (See below.)

Auletta V., Blundo C., De Cristofaro E., Raimato G. (2006): A lightweight framework for Web services invocation over Bluetooth. IEEE International Conference on Web Services.

AVID Wireless (2001): 8 Steps to Successful Wireless Projects

/library/8StepsWirelessApplications.pdf

Axup J. (2006): Methods of Understanding and Designing for Mobile Communities. (University of Queensland: PhD Thesis; available online as 429 page PDF (text and images), /thesis/document/Thesis-Jeff_Axup-v.FINAL_SUBMISSION.pdf)

Axup J., Viller S. (2006): Sampling mobile opinion: A contextual postcard questionnaire study. First Monday 11(9) 2006. "Understanding requirements of mobile communities is challenging because of their geographical distribution and frequent movement. We present a study of backpackers travelling in Australia which utilizes a research method called contextual postcard questionnaires. The method uses brief, open-ended questions to solicit contextual responses from backpackers that are relevant for development of tourism and mobile communication technologies. Eight hundred postcards were distributed via hostels and a travel agent, questioning travellers about their current situation.

Questions asked how they had heard about their present location, what kinds of virtual~graffiti they would leave there, and what their greatest worry currently was, among others. Results indicated that backpackers have a great deal of practical and serious concerns to contend with as they travel. They are physically cut off from family and friends and rely on a range of communications media to stay in touch and exchange emotional support. They have a great deal of practical travel experience that would be useful to other travellers, but which is currently only conveyed haphazardly via word-of-mouth. Practical usage of the contextual postcard questionnaires is discussed and design recommendations for mobile group products are offered."

Bagues M.I., Bermudez J., Burgos A., Goni A., Illarramendi A., Rodriguez J., Tablado A. (2006): An innovative system that runs on a PDA for a continuous monitoring of people. Proc 19th IEEE Intl Symposium on Computer-Based Medical Systems, pp 151-156.

Bahai A. (2006): Roadmap to Ubiquitous Connectivity. Center for Information Technology Research in the Interests of Society (CITRIS). CITRIS in Europe, June 20, 2006.

Ballard B. (2007): Designing the Mobile User Experience. (Wiley, 2007; ISBN 0470033614) provides the experienced product development professional with an understanding of the users, technologies, devices, design principles, techniques and industry players unique to the mobile and wireless space. Describes the different components affecting the user experience and principles applicable to the mobile environment, enabling the reader to choose effective technologies, platforms, and devices, plan appropriate application features, apply pervasive design patterns, and choose and apply appropriate research techniques.

Barth G. (2003): Spectrum for Mobile Communications in the World. (Harvard University: PIRP Research Draft; http://pirp.harvard.edu/pubs_pdf/barth%5Cbarth-draft-03.pdf) organizes some facts, observations, thoughts and issues regarding radio spectrum (i.e. radio frequencies) used or to be used for terrestrial mobile communications. It does not examine spectrum as a scarce commodity, nor as infinitely layered « plots of land »; but focuses on the allocation of specific frequency bands to various mobile systems and applications, in different parts of the world. What are the implications for the prime stakeholders? The manufacturers, the operators and the more or less mobile end-users?

Baudisch P. (2003): Halo: Supporting Spatial Cognition on Small Screens. UIST'03, Vancouver, British Columbia, Canada, November 2003.

Baudisch P. (2005): Making Sense on Small Screens. (Slide presentation; /publications/2005-Baudisch-SmallScreens.ppt

Baudisch P., Xie X., Wang C., Ma W.-Y. (2004): Collapse-to-Zoom: Viewing Web Pages on Small Screen Devices by Interactively Removing Irrelevant Content. Proc UIST 2004, Santa Fe, New Mexico, November 2004.

Baumgartner J. (2006): Browsers: Beyond IE and FireFox. InformationWeek 1073:48-52.

Bay S., Ziefle M. (2003): Performance on mobile phones: Does it depend on proper cognitive mapping? In Harris, Duffy, Smith and Stephanidis (Eds.): Human Centred Computing: Cognitive, Social and Ergonomic Aspects. (Mahwah, NJ: Lawrence Erlbaum, 2003)

Bay S., Ziefle M. (2003): Design for all: User characteristics to be considered for the design of phones with hierarchical menu structures. In H. Luczak and K.J. Zink (Eds.): Human Factors in Organizational Design and Management IV (Santa Monica, IEA, 2003)

Bay S., Ziefle M. (2004): Effects of menu foresight on information access in small screen devices. Proc 48th Annual Meeting of the Human Factors and Ergonomics Society, pp 1841-1845.

Bay S., Ziefle M. (2005): Children using cellular phones. The effects of shortcomings in User Interface design. Human Factors 47(1):158-168.

Beardon ?? (1995): Discourse Structures in Iconic Communication. Artificial Intelligence Review 9(2-3).

Beattie, R. (mobile blog)

-- (2006): Browsing: The Mobile Data Killer App (blog post)

/notebook/1008744.html

-- (2006): Handheld Stylesheets (blog post)

/notebook/1008914.html

-- (2005): Getting to the Mobile Web (blog post)

/notebook/1008430.html

-- (2004): The Mobile Web (blog post)

/notebook/1008162.html

-- (2004): Mobile Web Page Thoughts (blog post)

/notebook/1005647.html

Becchetti L., Adriani F. (2003): Does the Digital Divide Matter? The Role of Information and Communication Technology in Cross-country Level and Growth Estimates? CEIS Tor Vergata Research Paper No. 4. The bulk of ICT is made of weightless, implementable and infinitely reproducible knowledge products (such as software and databases). These products are transferred by telephone lines, accessed through Internet hosts and processed and exchanged through personal computers. In this work, the coefficient of the labor augmenting factor in the aggregate production function has been estimated using proxies of variables crucially affecting the diffusion of (non rivalrous and almost non excludable) knowledge products. This specification provides interesting answers to some of the open issues in the existing growth literature. The most recent information, even though available for a limited period, shows that telephone lines, personal computers, mobile phones and internet hosts significantly affect levels and growth of income per worker across countries. The result is robust to changes in sample composition, econometric specification and estimation approach.

Beck J.C., Wade M. (2002): DoCoMo—Japan's Wireless Tsunami: How One Mobile Telecom Created a New Market and Became a Global Force. (American Management Association; ISBN 0-8144-0753-6) A large percent of Japan's population already works, plays, and shops with wireless, continuously connected to a universe of data, services, and communities. The force responsible is a young company with a name that means "anywhere" in Japanese: DoCoMo. This work takes a look at the world’s second-largest mobile phone service that had a customer base as big as AOL’s in its first two years. An inside look at how creativity and innovation were nurtured at one of the world’s stodgiest companies--Nippon Telephone and Telegraph--and how a small team of committed visionaries never said "Never" and created DoCoMo’s extraordinarily popular I-mode technology.

Bellardo J., Savage S. (2003): 802.11 Denial-of-Service attacks: Real vulnerabilities and practical solutions. Proc USENIX Security Symposium, pp 15-28.

Beresford A.R., Stajano F. (2003): Location privacy in pervasive computing. IEEE Pervasive Computing 2(1).

Berg Insight: Smartphone Operating Systems. VAS Research Series.

Berger A.A. (1989): Seeing is Believing: An Introduction to Visual Communication. (Mountain View, CA: Mayfield)

Berman F., Fox G., Hey T. (2003): Grid Computing: Making the Global Infrastructure a Reality. (Chichester: John Wiley & Sons; ISBN 0-470-85319-0)

Bernhaupt R., Eckschlager M., Tscheligi M. (2007): Methods for evaluating games: How to measure usability and user experience in games? Proc Intl Conf on Adv in Comp Entertainment Tech. ACM Intl Conf Proc Series 203:309-310. "Addresses current needs in the games developers' community and games industry to evaluate the overall user experience of games. New forms of interaction techniques, like gestures, eye-tracking or even bio-physiological input and feedback present the limits of current evaluation methods for user experience, and even standard usability evaluation used during game development." (Workshop abstract)

Berresford J.W. (2004): How Government Can Bring New Communications to All Americans: Six Lessons of History (Harvard University Center for Information Policy Research: Program on Information Resources Policy; http://pirp.harvard.edu/pubs_pdf/berresf%5Cberresf-p04-2.pdf) examines what governments in the U.S. have done with new communications technologies in the past. Four "case histories" are examined – the achievement of universal telephone service, the creation of radio broadcasting, the creation of television broadcasting, and the taming of the Bell System (which allowed new, non-Bell technologies to flourish). From these histories, six lessons are drawn about what actions by government produced, and did not produce, good results. "Good results" are defined as putting into the hands of the greatest number of American consumers, quickly and cheaply, high-quality service with maximum choice, innovation, and freedom of expression.

Best E.L. (1933): The Change from Manual to Dial Operation in the Telephone Industry. (Washington D.C.: U.S. Dept of Labor-Women's Bureau, 1933; special collection at Harvard University Library, available online at http://pds.harvard.edu:8080/pdx/servlet/pds?id=2573378) relates the shift from operator-handled local calls to customer-dialed calls just before the onset of the Great Depression. Women who lost their jobs due to the technology shift were interviewed regarding their options (to shift to other work within the telephone industry, move to jobs outside the industry, stop working altogether, etc.) and the author discusses various aspects of technology change on women workers and the impact of the greater social upheaval of the period.

Bickmore T., Schilit B. (1997): Digestor: Device-Independent Access to the World Wide Web. Proc 7th Intl WWW Conf 1997, pp 655-663.

Bills D.B., Holliman S., Lowe L., Ochola J.E., Park S.-E., Reed E.J., Wolfe C., Zieglowsky L.T. (2006): The new mobile scholar and the effective use of information and communication technology. First Monday 11(4) 2006 (/issues/issue11_4/bills/index.html) "Our goal in this article is to understand how scholars--who need to collect, organize, analyze, and present large amounts of information in a short period of time—can use mobile information and communication technology (ICT) to work more efficiently and effectively. We argue that wireless fidelity (Wi~Fi) and universal serial bus (USB) technologies have made it possible for social scientists to work more productively outside of their own offices, but that many lack the kinds of practical knowledge needed to do so. We discuss ways in which understanding and using some basic and generally inexpensive ICT devices can help the "new mobile scholar" take full advantage of emerging ICTs."

Blackwell G. (2007): Wi-Fi and the Origins of the Universe. The Large Hadron Collider (LHC), part of the massive particle physics lab at CERN, the European Organization for Nuclear Research (and the birthplace of the Internet), will later this year host some of the most audacious scientific experiments ever conceived. And Wi-Fi will play a vital role ... (Wi-Fi Planet)

Blow J. (2004): Game Development: Harder Than You Think. Game Development 1(10).

Blue Flavor (2006): Designing for Mobile: Bringing Design Down to Size (PDF, 3.6MB, 103 slides)

/blog/mobile/designing_for_mobile.php "My workshop focused on the mobile ecosystem, some of the basic fundamentals as well as dispel myths and jargon common to the mobile industry. As this information can be incredibly hard to come by outside of the mobile industry, it seemed like a good place to start."

Borisov N., Goldberg I., Wagner D. (2001): Intercepting mobile communications: The insecurity of 802.11. Proc 7th Annual ACM Intl Conf on Mobile Computing and Networking (MobiCom'01), pp. 180-189.

Borodin Y., Mahmud J., Ramakrishnan I.V. (2007): Context browsing with mobiles—when less is more. MobiSys 2007.

Bouquet P., Giunchiglia F., van Harmelen F., Serafini L., Stuckenschmidt H. (2004): Contextualizing ontologies. In Web Semantics: Science, Services and Agents on the World Wide Web. 1(4):325-343 (/doi:10.1016/j.websem.2004.07.001). Ontologies are shared models of a domain that encode a view which is common to a set of different parties. Contexts are local models that encode a party’s subjective view of a domain. In this paper, we show how ontologies can be contextualized, thus acquiring certain useful properties that a pure shared approach cannot provide. We say that an ontology is contextualized or, also, that it is a contextual ontology, when its contents are kept local, and therefore not shared with other ontologies, and mapped with the contents of other ontologies via explicit (context) mappings. The result is Context OWL (C-OWL), a language whose syntax and semantics have been obtained by extending the OWL syntax and semantics to allow for the representation of contextual ontologies.

Bouquet P., Serafini L., Zanobini S. (2004): Peer-to-peer semantic coordination. In Web Semantics: Science, Services and Agents on the World Wide Web. 2(1):81-97 (/doi:10.1016/ j.websem.2004.07.004). Semantic coordination--finding an agreement on the meaning of heterogeneous schemas--is one of the key issues in the development of the Semantic Web (SW). Propose a method for discovering semantic mappings across hierarchical classifications based on shifting the problem of semantic coordination from the problem of computing linguistic or structural similarities (what most other proposed approaches do) to the problem of deducing relations between sets of logical formulae that represent the meaning of concepts belonging to different schema. Show how to apply the approach and the algorithm to an interesting family of schemas, hierarchical classifications, and present the results of preliminary tests on two types of HCs (web directories and catalogs).

Bullis K. (2006): Cheap, transparent, and flexible displays. New high-performance transistors could lead to windows and helmet visors that double as high-quality displays. MIT Technology Review (October 2006)

Bunch B., Hellemans A. (Eds.) (1994): The Timetables of Technology: A Chronology of the Most Important People and Events in the History of Technology. (New York: Touchstone / Simon & Schuster; ISBN 0-671-88767-X

Burnham J.B. (2007): Telecommunications policy in Turkey: Dismantling barriers to growth. Telecom-munications Policy 31(3-4):197-108. Modern telecommunications technology is now widely seen as a critical driver in economic development. However, the issues involved in the rapid deployment of this technology are complex and frequently highly controversial. While some issues are technical, the most difficult ones involve changing an institutional framework originally designed for different times and different technologies. The process of changing this framework necessarily involves disruptive change for existing infrastructure and service providers as well as substantial benefits for the economy at large. This paper, based on an extensive series of interviews in Turkey in 2005 and published sources, discusses these issues in light of Turkey's progress to date in taking advantage of advanced available telecommuni-cations technology and the myriad productivity-enhancing services that are associated with it.

Bush V. (1945): As We May Think. In Atlantic Monthly (July 1945). Available online at /History/1945/vbush/

Buyukkoten O., Garcia-Molina H., Paepcke A. (2000): Focused web searching with PDAs. Intl Conf on the World Wide Web 2000.

Buyukkoten O., Garcia-Molina H., Paepcke A., Winograd T. (2000): Power browser: Efficient web browsing for PDAs. Proc CHI 2000, pp 430-437.

Caceres C., Fernandez A., Ossowski S., Vasirani M. (2006): Agent-based semantic service discovery for healthcare: an organizational approach. IEEE Intelligent Systems 21(6):1541-1672. DOI:10.1109/ MIS.2006.107. "Information and communication technologies offer great potential for society to quickly adopt e-services for economic and social development. Healthcare activities based on these technologies (e-health) are probably the most prominent of these e-services. However, e-health is evolving into such entities as m-health (mobile) or u-health (ubiquitous), which focus on applications that provide healthcare to people anywhere, anytime using broadband and wireless mobile technologies. This semantic-service-discovery mechanism considers relevant parts of the organizational context in which e-health services are used, to improve a service-discovery system's usability in medical emergencies."

Calhoun K. (2006): The Changing Nature of the Catalog and Its Integration with Other Discovery Tools.

http://www.loc.gov/catdir/calhoun-report-final.pdf

Castells M., Fernandez-Ardevol M., Qiu J.L., Sey A. (2006): Mobile Communication and Society: A Global Perspective. (MIT Press; ISBN 0262033550) explores who has access to wireless technology, and why, and analyze the patterns of social differentiation seen in unequal access; the social effects of wireless communication--what it means for family life, for example, when everyone is constantly in touch, or for the idea of an office when workers can work anywhere. Is the technological ability to multitask further compressing time in our already hurried existence? Considers the rise of a mobile youth culture based on peer-to-peer networks, with its own language of texting, and its own values. Examines the phenomenon of flash mobs, and the possible political implications. Looks at the relationship between communication and development and the possibility that developing countries could "leapfrog" directly to wireless and satellite technology. This sweeping book--moving easily in its analysis from the United States to China, from Europe to Latin America and Africa--answers the key questions about our transformation into a mobile network society.

Cederholm D. (2007): Microformats for Designers

/presentations/MicroformatsForDesigners.pdf

Chan M., Ramjee R. (2004): Improving TCP/IP performance over third generation wireless networks. Proc IEEE Infocom 2004.

Chandler A.D.Jr (2005): Inventing the Electronic Century: The Epic Story of the Consumer Electronics and Computer Industries. (Harvard Univ Press, 2005. ISBN 0-674-01805-2) Consumer electronics and computers redefined life and work in the 20th century. Traces their origins and worldwide development from electronics prime mover RCA in the 1920s to Sony and Matsushita's dramatic rise in the 1970s; from IBM's dominance in computer technology in the 1950s to Microsoft's stunning example of the creation of competitive advantage. “Thought provoking ... develops the history of the consumer electronics and computer industries with the questioning attitude of a teacher: always searching for the lessons behind the story.” —Andrew S. Grove, Chairman of the Board, Intel “Offers a rich cast of characters and companies, compelling stories, and deep understanding of economic forces.” —Hal Varian, School of Information Management and Systems, University of California, Berkeley

Chandler A.D., Cortada J.W. (Eds.) (2003): A Nation Transformed by Information: How Information has Shaped the United States from Colonial Times to the Present. (Oxford University Press USA; ISBN 0195128141) makes the startling case that North Americans were getting on the "information highway" as early as the 1700's, and have been using it as a critical building block of their social, economic, and political world ever since. By the time of the founding of the United States, there was a postal system and roads for the distribution of mail copyright laws to protect intellectual property, and newspapers, books, and broadsides to bring information to a populace that was building a nation on the basis of an informed electorate. In the 19th century, Americans developed the telegraph, telephone, and motion pictures, inventions that further expanded the reach of information. In the 20th century they added television, computers, and the Internet, ultimately connecting themselves to a whole world of information. From the beginning North Americans were willing to invest in the infrastructure to make such connectivity possible. This book explores what the deployment of these technologies says about American society. The editors assembled a group of contributors who are experts in their particular fields and worked with them to create a book that is fully integrated and cross-referenced.

Chao L. (2006): User preferences, information transactions and location-based services: A study of urban pedestrian wayfinding. Comp Environ Urb Systems 30(6):726-740. "Though research into location-based services (LBS) is being carried out across a number of disciplines, user aspects of LBS remains a cross-cutting theme. In this paper, the research focuses on investigating the user information requirements from LBS at individual level, with emphasis on the interactive nature of information transactions between environments, individuals and mobile devices. Based on a proposed conceptual model, urban pedestrian wayfinding experiments have been implemented in an immersive virtual reality test environment. Automated and semi-automated methods of data collection have allowed an integrated picture of participant behaviour and information preferences to be constructed and analysed. The results of this study show that there are clear user preferences in information requirements in completing wayfinding tasks. However, changes in user preferences during the wayfinding tasks do occur in response to levels of confidence, different spatial layouts and the wayfinding situations individuals encounter. The outcomes indicate that the proposed conceptual interaction model and adopted implementation approach assist in understanding user behaviour and information preferences for LBS. (DOI:penvurbsys.2006.02.008)

Chau J. (2006): Security issues around the deployment of VoIP and multimedia protocols in wireless and firewalled environments. Computer Fraud & Security 2006(8):14-16.

Chen Y., Ma W.-Y., Zhang H.-J. (2003): Detecting Webpage Structure for Adaptive Viewing on Small Form Factor Devices. Intl Conf on the World Wide Web 2003, pp 225-233.

Chen Y., Xie X., Ma W.-Y., Zhang H.-J. (2005): Adapting Web Pages for Small-Screen Devices. IEEE Internet Computing Jan-Feb 2005, pp 50-56. /internet/

Chesire S., Gast M., Zimmerman P. (2006): VoIP: Quality, Ease of Use, Security. (IT Conversations, MP3)

/shows/detail1711.html

Chokvasin T.: Mobile Phone and Autonomy. In Hongladaram S., Ess C. (Eds.): Information Technology Ethics: Cultural Perspective. (See below.)

Chorost M. (2005): Rebuilt: How Becoming Part Computer Made Me More Human. (NY: Houghton Mifflin, 2005. ISBN 0618378294) Memoir about author's hearing loss, prefaced with the operating-room experience and activation of a cochlear implant with a recollection of his childhood diagnosis in the late 1960s of a severe hearing deficit, probably caused by rubella fever. In 2001, Chorost abruptly went totally deaf. Portraying his recovery, Chorost imagines his body as the playing field pitting human against mechanical qualities, describing what it's like to be controlled by a computer. He relays his perception of the sound created by the cochlear implant, re-creates conversations and music, and tells how each software upgrade to the implant affected his experiences. His social interactions were also changed by the mechanical device, and he muses on his fortunes in navigating the dating scene. An artfully frank account, Chorost's story will vitally engage people interested in the increasingly prevalent surgical procedure. © American Library Association

Chudakov B. (2002): Making the Page Think like a Network, Part 1. PeachPit Press. /articles/printerfriendly.asp?p=29590&rl=1

Church K., Smyth B. (2007): Mobile content enrichment. Proc 12th Intl Conf on Intelligent User Interfaces, Honolulu, Hawaii; pp 112-121. /10.1145/1216295.1216320 "Delivering an effective mobile search service is challenging for many reasons. Certainly small-screen mobile handsets with limited text input capabilities do not make ideal search devices. In addition, the brevity of Mobile Internet content hampers effective indexing and limits retrieval opportunities. In this paper we focus on this indexing issue and describe an approach that leverages Web search engines as a source of content enrichment. We present an evaluation using a mobile news service that demonstrated significant improvements in search performance compared to a standard benchmark system."

Church K., Smyth B., Cotter P., Bradley K. (2007): Mobile information access: A study of emerging search behavior on the mobile Internet. ACM Trans on the Web (TWEB). 1(1). "It is likely that mobile phones will soon come to rival more traditional devices as the primary platform for information access. Consequently, it is important to understand the emerging information access behavior of mobile Internet (MI) users especially in relation to their use of mobile handsets for information browsing and query-based search. In this article, we describe the results of a recent analysis of the MI habits of more than 600,000 European MI users, with a particular emphasis on the emerging interest in mobile search. We consider a range of factors including whether there are key differences between browsing and search behavior on the MI compared to the Web. We highlight how browsing continues to dominate mobile information access, but go on to show how search is becoming an increasingly popular information access alternative especially in relation to certain types of mobile handsets and information needs. Moreover, we show that sessions involving search tend to be longer and more data-rich than those that do not involve search. We also look at the type of queries used during mobile search and the way that these queries tend to be modified during the course of a mobile search session. Finally we examine the overlap among mobile search queries and the different topics mobile users are interested in." (/10.1145/1232722.1232726)

Ciarkowski A., Czyzewski A. (2006): Multimedia mobile services for the semantic Web. 17th Intl Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No. 06TH8881).

Colbert M., Livingstone D. (?2007?): Important context changes for talking and text messaging during homeward commutes. Behaviour & Information Technology 25(5):433-441. /10.1080/01449290500330240

Cole S.A. (2002): Suspect Identities: A History of Fingerprinting and Criminal Identification. (Harvard University Press; ISBN 0-674-01002-7) reveals that the history of criminal identification is far murkier than we have been led to believe. Traces the modern system of fingerprint identification to the nineteenth-century bureaucratic state, and its desire to track and control increasingly mobile, diverse populations whose race or ethnicity made them suspect in the eyes of authorities. In an intriguing history that traverses the globe, taking us to India, Argentina, France, England, and the United States, the author excavates the forgotten history of criminal identification--from photography to exotic anthropometric systems based on measuring body parts, from fingerprinting to DNA typing. He reveals how fingerprinting ultimately won the trust of the public and the law only after a long battle against rival identification systems.

Consumer's League of Eastern Pennsylvania (1913): Pamphlet No. 2: Occupations for Philadelphia Girls: Telephone Operating. (Special collection at Harvard University Library, available online at http://pds.harvard.edu:8080/pdx/servlet/pds?id=2580921&n=7&s=4) Slightly later and somewhat similar to Girls Trade Education League item (1911, see below), this pamphlet explains more about the actual work done by operators, descriptions of technology, training, career opportunities, wages, and includes some contemporary Bell System statistics and the types of testing that operator-hopefuls and working operators faced.

Costa A. (2003): Lua Scripting 101: The Basics.

Cranor L., Garfinkel S. (2005): Security and Usability: Designing Secure Systems that People Can Use. (San Francisco: O'Reilly & Associates; ISBN 0596008279) is the first book-length work describing the current state of the art in this emerging field treats: Realigning Usability and Security (attention to user-centered design principles); Authentication Mechanisms; Secure Systems (how system software can deliver or destroy a secure user experience); Privacy and Anonymity Systems (methods for allowing people to control the release of personal information); Commercializing Usability; and Vendor Perspectives (e.g., IBM, Microsoft, Lotus, Firefox, and Zone Labs) addressing usability.

Critical Friends of Technology (2003): A Social Ecology of Wireless Technology. First Monday 8(8) (Online at /issues/issue8_8/critical/) "Technological advances begin in the inventor’s garage and the laboratory and are eventually offered in the market place. Once adopted, they are followed by laws and regulations, sometimes years later and only in response to perceived crises. In the current economic downturn, one of the bright spots has been the spread of wireless communication technologies for telephone and data services. This paper is the initial effort of CFT to provide an overview of wireless technologies, those that use the radio spectrum for transmission."

Crofts S., Dilley J., Fox M., Retsema A., Williams B. (2005): Podcasting: A new technology in search of viable business models. First Monday 10(9) 2005 (/issues/issue10_9/ crofts/index.html; podcast at /issues/issue10_9/crofts/crofts.xml)

"Podcasting has become popular as it allows listeners to timeshift content, i.e., to listen--when it suits them--to radio-like programming on portable MP3 and related devices. Dissatisfaction with traditional radio--which has too much advertising and is perceived to have generic programming—is fueling interest in programming that better meets the individual needs and interests of consumers. Podcasting represents a shift from mass broadcasting to on-demand personalized media. We look at the development of podcasting technology, the social context within which this development has occurred, and outline the legal constraints that podcasters face. Then we examine some business models for podcasting."

Culler D., Estrin D., Srivastava M. (2004): Overview of Sensor Networks. IEEE Computer Special Issue in Sensor Networks.

Cummings M.L. (2004): Creating Moral Buffers in Weapon Control Interface Design

http://web.mit.edu/aeroastro/www/people/missyc/pdfs/Cummings_SSIT04.pdf

Dae Hyuck Park, Euisun Kang, ByongHee Lee, JongKeun Kim, Kunjung Sim, Meehwa Cho, Young Hwan Lim (2006): Selecting useful images from the Web for mobile services. Proceedings 2006 10th Interna-tional Conference on Computer Supported Cooperative Work in Design (IEEE Cat. No. 06EX1292).

Daly P.H. (2002): ITs Place in U.S. History: Information Technology as a Shaper of Society. (Harvard University: PIRP Research Report; ISBN 1-879716-68-2; http://pirp.harvard.edu/pubs_pdf/daly%5Cdaly-p02-3.pdf) Technological developments continue to inspire grandiose visions of the future. For better or worse, they remain the most popularly used milestones for measuring the course of human progress and there is never a shortage of glowing or terrifying social scenarios—from bringing an end to war to the sort of cataclysms found in Nostradamus's Quatraines-for the effects of this or that new development. The gravitational pull of the past often ignored in these scenarios, and the incredibly complex crosscurrents of history that in blending over the ages have created societal structures that remain fundamentally resistant even to the most ingenious and revolutionary silver bullets of technology often simplified.

Daum A. (2001): Mobile consumers: What do they want? How much will they pay? Gartner G2.

David, J.-L. (2004): Developing Wireless Content using XHTML Mobile

/pub/a/2004/04/14/mobile.html

Davies R., Krizova R., Weiss D. (2006): : games and mobile technology in learning. Innovative Approaches for Learning and Knowledge Sharing. Proc 1st European Conf on Technology Enhanced Learning (EC-TEL 2006). Lecture Notes in Computer Science 4227:103-10

Delbourgo J. (2006): A Most Amazing Scene of Wonders: Electricity and Enlightenment in Early America. (Harvard Univ Press, 2006. ISBN 0-674-02299-8) Benjamin Franklin's invention of the lightning rod is the founding fable of American science, but Franklin was only one of many early Americans fascinated by electricity. As a dramatically new physical experience, electricity amazed those who dared to tame the lightning and set it coursing through their own bodies. Thanks to its technological and medical utility, but also its surprising ability to defy rational experimental mastery, electricity was a powerful experience of enlightenment, at once social, intellectual, and spiritual. Moves beyond Franklin to trace the path of electricity through early American culture, exploring how the relationship between human, natural, and divine powers was understood in the 18th century. By examining the lives and visions of natural philosophers, spectacular showmen, religious preachers, and medical therapists, he shows how electrical experiences of wonder, terror, and awe were connected to a broad array of cultural concerns that defined the American Enlightenment. The history of lightning rods, electrical demonstrations, electric eels, and medical electricity reveals how early American science, medicine, and technology were shaped by a culture of commercial performance, evangelical religion, and republican politics from mid-century to the early republic. The first book to situate early American experimental science in the context of a transatlantic public sphere, offers a captivating view of the origins of American science and the cultural meaning of the American Enlightenment. In a story of shocks and sparks from New England to the Caribbean, brilliantly illuminates a revolutionary New World of wonder.

de Ruyter B., Saini P., Markopoulos P., van Breemen A. (2005): Assessing the effects of building social intelligence in a robotic interface for the home. Interacting with Computers 17(5):522-541.

DeVoss D. (2000): Rereading Cyborg(?) Women: The Visual Rhetoric of Images of Cyborg (and Cyber) Bodies on the World Wide Web. CyberPsychology & Behavior 3(5):835-845.

Di Filippo P. (1998): Ribofunk. (New York: Avon, 1996. ISBN 0-380-73076-6) "Tomorrow is wet and squishy; it's flesh and blood and fat and sinew and genetically/chemically modified bods and brains.'Splices' do the clean-up and the heavy lifting, as long as their genetic make-up is less than half-human and greater parts feline or lupine, bird or bull. And when they go renegade, like the terrorist construct Krazy Kat, it's up to the Protein Police to hunt them down like the dogs-or stallions, or rabbits-that they are, at least in part ... This is no brave new world ... Welcome to a future that will swallow you whole." (Back cover)

Dixon, D. (2005): Mobile Video: Working with MPEG-4 Clips on Mobile Phones



Скачать документ

Похожие документы:

  1. University of texas at arlington

    Документ
    ... bibliography tool, tutoring services, and a gradebook and course ... of Mobile- ... Web Address Extensions to Determine the Purpose of Web sites Web ... University of Baltimore, is developing ... Washington tries to take it— to build a border fence. She doesn ... 345 ...
  2. State University of New York

    Документ
    ... , course work, or tutorials that make extensive use of the University Libraries, World Wide Web ... archives. [IL] R Isp 361 Web Development (3) Design and development of producing information for the world ...
  3. Bibliography for peace and stability operations and counterinsurgency

    Документ
    ... strengthened by an extensive chronology and bibliography and accurate index ... Developing Areas: One Task of the American Soldier. Washington DC: American University ... of counterinsurgency during the course of the Malayan Emergency." [University of ...
  4. The University of Chicago Law School A Century of Scholarship A Bibliography of Writings of the Faculty of the University of Chicago from 1902-2002 Compiled by the D'Angelo Law Library Acknowedgements

    Документ
    ... University of Chicago Law School: A Century of Scholarship A Bibliography of Writings of the Faculty of the University of ... First Course by Newspaper, University Extension, University of California, ... G. Dixon: In Memoriam, 58 Washington University Law ...
  5. All of the electronic resources you need—in one place!

    Документ
    ... mp3s. games, mobile & mor ... Wash­ington Post. Oberholzer-Gee and his colleague, University of ... bibliography that you plan to use extensively ... Web Sites Worth Knowing • "University of Illinois Writers' Workshop, "Developing ... a course in Web design ... Shows 345) ...

Другие похожие документы..