throbber
:IfiEtEeIIi ent
`SYST MS
`
`35» their applications
`
`l 11
`
`I
`
`"_
`
`COIMPUETER
`SOCIETY
`
`APPL-1007 / Page 1 of6
`Apple v. Uniloc
`
`APPL-1007 / Page 1 of 6
`Apple v. Uniloc
`
`

`

`
`VolumeI2,mm '|‘l
`NOVEMBER/DECEMBER1997
`INTELLIGENT
`YSTEM
`
`
` ’S
`
`IEEE EXPER‘I'
`
`éIR APPLICAICA'I'IOI‘IS
`
`.‘
`
`lfifelli . ent
`
`
`
`
`
`
`
`
`
`26
`
`33
`
`ARTICLES
`
`llsing Software Agents to Generate VlSl layouts
`Dilrcm Ile Alamo Morairo and les 1. Walczowski
`
`Model-Based Diagnosis for Automotive Repair
`Moriuluiso Sanseverino aml Fulvio Coscio
`
`
`
`
`
`Enhanced Password Authentication through Fuuy logic
`Willem 6. de Ru and Jan H.P. Eloll
`
`ANALYSIS— ORIENTED MODELING
`Organizational Modeling'In CommonKADS: The Emergency
`Medical Service
`Wifrled Post, Boll Wielingo, Robert de Hung, and Guus SchreI‘lIer
`
`46
`
`A] IN POWER SYSTEMS
`Integrating Al Applications in an Energy Management System
`JellreyJ. Bonn, GuillermoD. lrisorri, SasonMolIlrtari, Daniels. llirsclIsII, and Bradley ti. Miller
`
`53
`
`
`
`EXPERT SYSTEMS
`Building a Composite Syntax for Expert System Shells
`60
`
`VerlynM. Johnson and John V. (orlls
`
`
`
`
`
`
`Cover illustration: .lIIIl Guinean / (over design: Toni Van Busiirl:
`
`
`APPL-1007 / Page 2 of 6
`
`APPL-1007 / Page 2 of 6
`
`

`

`DEPARTMENTS
`
`-
`.
`EdIIIOI'IIII
`Daniel E. D'Leary
`A lack ofknowledge at the top
`
`Export Opinion
`.
`Peter SeHrIIlgeP.
`_
`Online communities and the next-generation Internet
`
`Internal Services
`Michael McCandless
`The PalmPilot and the handheld revolution
`
`Exec-flu IIIIIH
`Sm Reese Hedhsru
`Dictanng this article to my computer: automatic speech
`recognition 1s coming ofage
`
`llhlllgonl Connotlions
`Steplien Grim!
`Three observations that changed my life
`
`MIMW
`Mani A. Hearst
`Banter on Bayes: debating the usefulness ofBayesian
`approaches to solvingpracticalproblems
`
`News/flow Products
`
`Annuallndex
`
`Calendar/Cull for Papers
`
`2 4 6
`
`i
`
`1?
`
`113
`
`III
`
`457'
`
`775!
`
`71!
`
`MS
`
`'IOI\IS
`
`and Nancyi

`.
`
`ExpenOn/i e in
`Anne HuniplIre :
`
`-
`Emitvggllinfi‘stsfmI
`
`Design Direclor
`.
`i
`
`ToniVan Buskirk ’
`
`,
`r- r.
`Layout/Technical Illustrations
`
`“9* “ms
`'.
`Publisher
`I
`
`Matt LDBII
`
`
`-_Membership/Circulaiion Marketing MEnag '
`lieurgann Caner
`Advertising Manager
`Patricia Garvey
`
`Advertising Coordinator
`
`Marian Anderson
`Advertising Assislani
`Debbie Sims
`
`
`_
`‘
`» MEWSari“ .
`i.
`owl's“on“ mmmim1;
`
`- mined midi-semi as prudumfl
`
`"""-"
`I
`-opirflr;rmmmesndnemiu
`,
`-
`'WWWMEEE
`
`
`
`-
`-
`‘
`_ mammogram.
`--
`‘
`.
`.
`liai4.piuw(7i4)BZi-BSBD;
`“watchmen: Ave. NW
`
`N ”9:327er
`
`
`88u/b
`
`Reader Service/Subscription Cards
`
`Inside back cover
`
`Computer Society Membership Info
`Advertiser/Product Index
`
`
`
`APPL-1007 / Page 3 of 6
`
`APPL-1007 / Page 3 of 6
`
`

`

`The PalmPilof and line
`handheld revolution
`
`By Michael McCandless
`MIT Laboratory tor Computer Science
`mikemc@|cs.mil.edu
`
`Have you thought that perhaps the computer belongs in your
`hand rather than on your desk? With many failed and still—
`failing efforts, handheld computation has been taking a long
`time to arrive. However, the unquestionable success of 3Com’s
`PalmPilot heralds the start of a revolution in computation.
`
`the Pilot first appeared on the market in
`early 1996. In retrospect, the Pilot will be
`seen as a turning point in the migration of
`computation from desktop machines to
`handheld devices.
`
`
`
`
`Behind Pilot's success
`The Pilot comes with numerous built—in
`applications to manage personal informa-
`tion—for example, calendar, to-do lists.
`memo pad, and address book. The touch-
`sensitive monochrome LCD display is used
`for navigation, and a simplified and easy-
`to—learn alphabet called Graffiti is used for
`input. The touch of a button synchronizes
`the Pilot with a desktop PC, using 3Com’s
`HotSync technology, which also backs up
`data and installs new applications.
`The key to the Pilot’s success is its sim-
`l plicity. The design is achievable rather than
`overly ambitious. For example, requiring
`I
`the user to learn a simplified alphabet
`allows for accurate and predictable letter
`recognition. The simple design
`translates into affordability: the
`PalmPilot Personal costs $249,
`compared to $1,000 for Apple’s
`MessagePad 2100. It also leads
`to wonderful portability. The
`Pilot weighs under six ounces,
`including batteries, and is a little
`larger than a wallet. Finally, its
`open architecture and available
`software—development
`systems—for example, Code-
`Warrior, by Metrowerks—have
`allowed developers and compa-
`nies to offer many useful third-
`party applications. By simplify-
`ing the design, 3Com achieved a
`realistic, inexpensive, and practi-
`cal device.
`The Pilot clearly shows that a
`handheld device driven only
`with a stylus can be successful.
`Naturally, other companies are
`
`model is inappropriate for space-starved
`portable devices. The now—failed Go Corpo— '
`ration was the first company to break tradi-
`tion and introduce interaction using only a
`stylus. Apple continued the endeavor, lead-
`ing to the present MessagePad 2100, but
`stylus-based PDA’s have caught on only
`gradually. Now, the Pilot has taken the lead
`at an exceptional pace. According to PC
`Data, the Pilot accounts for 70% of US
`retail PDA sales. According to DataQuest,
`in 1996, the Pilot accounted for 51% of the
`1.6 million handheld devices sold world—
`wide. These figures are amazing, given that
`
`‘
`
`I
`
`|
`
`Contrary to many past and present devices,
`the Pilot proves that portable computers
`don’t have to mimic desktops to be useful
`and successful. As a result, handheld com-
`puters are incorporating new technologies,
`and the market is rapidly changing. Soon,
`many of us will spend more time interact-
`ing with our handheld devices than with
`our desktop computers.
`
`The many guises of portable
`compuiers
`Portable computers come in many forms
`and under many names. At one extreme are
`laptops, which are basically
`desktop PCs that have been
`reduced enough to be lugged
`around. At the other extreme
`are Personal Digital Assistants
`(PDAs), which use a stylus or
`a few buttons, rather than a
`keyboard, for navigation and
`input. In between, suffering
`something of an identity crisis,
`are the handheld PCs (HPCs)
`and palmtop devices, sporting
`tiny fold-up keyboards and
`running a pared—down version
`of Windows 95 called Win—
`dows CE.
`So far, the PC has been the
`most successful form of com-
`
`putation. As a result, when
`branching out to produce
`portable computing devices,
`most companies simply aim to
`mimic the PC. However, such a
`
`
`
`APPL-1007 / Page 4 of 6
`
`APPL-1007 / Page 4 of 6
`
`

`

` In due time, your PDA will
`
`eager to get in the market.
`
`Sharp just released the SE-
`
`Snt} Mobile Organizer, which
`
`
`looks like the Pilot but lacks
`
`
`handwriting recognition and
`runs with a proprietary OS.
`
`
`Franklin Electronic Publish-
`
`ers created the Rex PC Com,
`
`panion, a stripped-down
`
`device with no input, which
`
`lets you browse information
`
`
`downloaded from a PC.
`
`
`
`
`
`
` Global Positioning System.
`
`Using satellites and land towers, a
`GPS device, soon to be one chip plus an
`antenna, can locate its position on the
`Earth’s surface within three meters. PDAs
`will incorporate GPS. You will consult your
`PDA to navigate in a foreign city or to find
`the nearest ATM or gas station, or a good
`place to eat. Over the network, your PDA
`will monitor traffic congestion, the weather,
`and construction conditions, altering its
`recommended route as needed. You will be
`able to locate your children or track the
`entire family in the mall or on the ski slope.
`
`absorb the other things you now
`feel compelled to carry in your
`pockets. Keys, now rendered as
`metal, plastic, or a magnetic strip,
`will instead be stored as bits in
`
`your PDA. All forms of currency
`will have digital correlates, let-
`ting you buy groceries without
`worrying about visiting the ATM
`first. Likewise, forms of identifi-
`cation—for example, your dri-
`ver’s license and Social Security
`card—will be digital. People will
`no longer be able to lie about
`their age and identity.
`
`Cryptography. Security is a big concern
`with present and future PDAs. I store all
`sorts of very private information on my
`Pilot—account numbers and passwords,
`PINS for my credit cards, telephone num-
`bers—all of which I do not want to fall into
`
`the wrong hands. And as PDAs come to
`absorb everything on our key chains and in
`our wallets, it would seem that if you lose
`your PDA, you lose yourself.
`In the short term, however, there are
`excellent tools that use strong cryptography
`to protect your information—for example,
`Andreas Linkc’s Secret 2.0 freeware. These
`
`It's all about
`information
`Why are these devices so
`successful in the first place?
`The answer is clear: people
`need to keep track of all sorts
`of personal information. We have always
`had this need, and our lives are becoming
`even busier and more connected. We need
`to schedule our day, look up phone num—
`bers, remember the names of people to
`whom we were introduced, keep track of
`birthdays, read the latest news, trade our
`favorite stocks, and remember what to do,
`including when and where. There’s a name
`for all these things: Personal Information
`Management.
`The PIM market for desktop PCs is
`already well-established, including prod—
`ucts such as Microsoft Outlook, Lotus
`Organizer, and Now Up-To-Date. A strong
`market also exists for paper-based organiz-
`ers. The Pilot makes carrying all this infor—
`mation with us practical, so that we can
`access it anywhere and anytime. It’s the
`same crucial information with which
`
`we’ve always been working; the Pilot is
`just a better means of getting to it and
`maintaining it.
`
`In “to pipeline
`We’re at the beginning of a long race in
`which many will eagerly contend. Although
`the Pilot might or might not retain its lead,
`we consumers will continue to win. Com-
`
`petition will bring prices down While
`improving functionality. Most important,
`three enabling technologies loom on the
`horizon: wireless networking, the Global
`Positioning System, and cryptography.
`
`ently back up your data, at all times. In fact,
`you will no longer worry about where your
`data actually is, because that will not mat-
`ter. People will share access to the same
`underlying data, stored on a central server,
`despite being separated in space or time. An
`executive, while traveling, will see changes
`to his or her calendar as they are made in
`real time back in the office. All family
`members will be able to update the grocery
`list, anywhere and anytime, and whoever
`does the shopping will see these changes.
`Using this network, your PDA will even—
`tually subsume the functionality of the
`remote controls in your home. You will
`control and configure your home appli—
`ances through your PDA. You will set your
`alarm clock; read your personalized TV
`guide and program your VCR; turn down
`the stereo or select a different song or radio
`station; and program, from your car or the
`subway, your home’s heater to turn on
`shortly before you arrive there. This net—
`work wou’t need to be, and probably will
`not be, very high performance to provide
`most of these new services. Rather, it will
`serve as a stepping stone, motivating and
`then financing better infrastructure.
`The network relaxes where and how
`
`‘
`
`
`
`
`
`computation occurs. For example, applica-
`tions that are too compute— or space-
`intensive to run directly on your PDA will
`run, instead, on a remote high-performance
`computer, but then return the output of the
`computation. When new versions of appli-
`cations are released, your PDA will auto-
`Wireless networking. PDAs will soon
`matically update. The boundary between
`Come with built—in access to a ubiquitous
`your PDA and the rest of the world will
`Wireless network. This will render HotSync
`become blurred.
`a thing of the past; your PDA will transpar—
`
`
`againstttjntcmnm 1997—
`
`tools require you to punch in a password
`every time you need to access your critical
`data. Although this is adequate, the danger
`always exists that you will forget to encrypt
`certain pieces of important information.
`In the long term, PDAs will exploit bio-
`metric identification, using your voice, fin—
`gerprints, pulse, and other reliable aspects to
`transparently confirm who you are, before
`allowing access to your data. Because this
`procedure will be so simple, everything will
`be encrypted by default. Also, once a high-
`
`
`
`
`
`
`
`
`tichael McCandless
`r Computer Science
`iikemc@|cs mitedu
`
`I
`
`I
`
`I
`
`'ilot will be
`
`marketin
`
`tigration of
`:hines to
`
`rous built—in
`Ial informa-
`o-do lists,
`The touch—
`
`isplay is used
`d and easy-
`ti is used for
`Inchronizes
`
`sing 3Com’s
`so backs up
`ons.
`;s is its sim—
`le rather than
`
`t, requiring
`lphabet
`table letter
`
`triple design
`‘dability: the
`costs $249,
`) for Apple’s
`It also leads
`
`)ility. The
`six ounces,
`and is a little
`
`. Finally, its
`nd available
`lent
`
`tple, Code-
`verksihave
`
`i and compa-
`useful third—
`
`By simplify—
`)III achieved 3
`ve, and practi-
`
`I shows that a
`
`iven only
`e successful.
`
`mpanies are
`
`IEEE EXPERT__
`
`
`
`
`
`
`
`
`
`APPL-1007 / Page 5 of 6
`
`APPL-1007 / Page 5 of 6
`
`

`

`61
`
`their applications
`
`
`
`
`T'
`
`..
`
`,1
`
`“molt—"“Gruuaiui Coming Next issue
`
`'
`
` <e._
`
`M in Health Care
`liver the last Saw years, optimism has grown that the world of medicine is finally going to he truly “online.” Many
`believe that the answer to some of the motor challengesfoced by the health care community liesin computerization, and
`it appearsthat withincreased networking capabilities, eliectivenevi solutionstoold problems are emerging. Further-
`more, both administrators as well aspractitioners are becoming convinced that technology will change the lace ol health
`care, balancing improved quality at patient care with test eltective management procedures.
`The role of M in provoking and supporting these changes isat particular iaterost;.despi‘te Al's long history of research
`in the medical domain, relatively tovr Al systems are either currently in clinical practice or about to get there. Guest
`edited by Erika Rogers of California Polytechnic State UniversityI this special issue considersthe following questions:What
`is the changing face at health care? How doesthis oilediii research in this area? andWhat contributions can tit malie
`towards realizing these changes? Articles in this special issue are
`0
`”integrating a Knowledge-Based System for Parenteral Nutrition of Neonates into a (linicol intranet”
`-
`”Guardian: An Intelligent Autonomous Agent loc Medical Monitoring and Diagnosis”
`0
`“Neural Network Learning lor Intelligent Patient Image Retrieval"
`0
`"Knowledge Architectures for Patient Access to Breast-Cancer lnlarmution"

`"Traumailll: 0n-line Decision Support lor Trauma Management”
`0
`"085le Voice-Enabled, Structured Medical Reporting”
`
`IEEE Expert, covering the full range of intelligent systems developments for the Al practitioner,
`researcher, educator, and user.
`
`i!!! intelligent Systems: llew name in 1998 /
`
`“'8
`
`
`
`performance wireless network is in place.
`your sensitive data will not even be stored
`on the FDA but on a sccurc. contract server,
`to be downloaded and decrypted on demand i
`and then discarded. Thus, even if you lose
`i
`your PDA, it will contain no sensitive data.
`For instance, as you hold your PDA, it will
`detect your pulse and measure your 1i tiger-
`prints, thcreby continuing your identity. It
`will then unlock doors. let you pay bills at a
`hotel or restaurant, and provide your driver’s
`license when you rent a car.
`Cryptography, when properly imple—
`mented, offers tremendous security—secue
`rity well beyond what we now tolerate in
`
`i
`
`‘
`
`1
`
`:
`i
`
`the "real \srorld.“ Digitally encrypting our
`credit card number and storing it in :1 FDA
`is far better than stamping it on plastic and
`storing it in our wallets.
`
`All this and more. Besides these revolu-
`tionary changes, evolution will ensure that
`these devices steadily improve. Memory
`capacity will increase. as will the process—
`ing power and the performance of the wire-
`less network. Battery life will lengthen.
`The screen, which is rather low-resolution
`at present, will become color with a very
`high resolution.
`
`
`
`Related links
`
`Read more about the Pilot
`Download Pilot software
`An excellent tutorial on GPS
`Secret 2.0, for encrypting Pilot data
`
`http://www.3com.comlpalm/
`http://www.pa.l mpilotfilescom
`http://www.trirnblc.c0m/gps/
`http://www.tphys.uni—heidelberg.de/~linke/pilotj
`secrethtrnl
`
`. The future commodity
`_
`The Pilot’s success is just the beginning.
`l‘ The market frenzy that the Pilot has created
`will ensure that PDAs soon incorporate all
`these technologies, and that they will be
`priced reasonably. Eventually. PDAs will be
`it commodity item. much like calculators or
`| digital watches are today. The FDA willjust
`he a rather generic: conduit. a standard plat-
`form, to access all your private information,
`I securely stored on a distant, reliable server.
`There will be no risk if you lose your PDA;
`you will just buy another one. pull out a
`backup, or borrow your friend's for a few
`minutes. You will not hesitate: to give your
`children each a PDA, just as you give them
`each a packed lunch box for school. Your
`PDA will grant you access to all your
`important data and devices. Soon you will
`need to carry little else.
`
`
`
`
`
`
`
`Metrowerks CodeWam'or developer’s kit
`
`http://www.mctrowerks.com
`
`
`
`Illustrations by Sally Lee; sally@sls.lcs.
`mitedu; http://www.sls,lcs.mit.edu/sally.
`
`
`
`
`APPL-1007 / Page 6 of 6
`
`APPL-1007 / Page 6 of 6
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket