Mary G. BakerHP Inc. | HP · 3D Print Software
Mary G. Baker
PhD
About
135
Publications
27,871
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
9,065
Citations
Introduction
Mary Baker works in the Immersive Experiences Lab at HP Inc.. Currently she is investigating user experiences for privacy and the new types of objects, systems, and design workflows enabled by multi jet fusion 3D printing. She has previously worked in mobile and wireless systems, operating systems, and digital preservation. She writes the quarterly column "Notes from the Community" for IEEE Pervasive Computing Magazine.
Publications
Publications (135)
We recently had the pleasure of interviewing researchers in electronics and materials for pervasive systems, as well as researchers, practitioners, and digital tool builders in crafts such as music and food. We have separated the conversations into two interview digests. The first highlights important topics for future research in pervasive systems...
Electronic miniaturization has driven pervasive computing for decades. With the rapid progress of digital manufacturing however, new tools and methods are maturing that enrich the possibilities for ambient and wearable system design. While miniaturized technology remains a key feature, now pervasive system designers work holistically across enginee...
This installment of Notes from the Community covers the first animated feature film rendered entirely in a game engine, bad design methods, customizable tattoos, debugging paper jams, and other topics to take your mind off your worries.
This installment of Notes from the Community covers emerging virtual, augmented, and mixed reality applications; security and privacy issues related to Internet of Things devices; and talking fish.
This installment of Notes from the Community covers wearables, low-power sensors, hacking, detecting and generating speech, election machines, and bathing suits.
This installment of Notes from the Community covers smart assistants, AI, autonomous vehicles, user interfaces, striking views of our future, and outrageous designer strollers.
This installment of Notes from the Community covers new pervasive technologies using metamaterials, flexible and stretchable electronics, sensors, robotics, 3D printing, tofu, and more.
This installment of Notes from the Community covers touch sensors, privacy, smell, self-driving cars, toilets, pressure sensors, biodegradable electronics, and personal hygiene products.
This installment of Notes from the Community covers new pervasive technologies using light, new features for smartphones, better interfaces for wearables, and Pokémon Go craziness.
This installment of Notes from the Community covers three topics of frequent interest to readers: our increasingly instrumented world, the instrumentation of our human bodies, and instrumented bodies of the mechanical kind.
This installment of Notes from the Community covers typical interest areas--augmented and virtual reality, wearable technology, drones, 3D printing, and the Internet of Things--and, in a first, the Internet of Freshmen.
This installment of Notes from the Community covers new drones and robots, ways to protect ourselves from bad drones, tracking mood disorders, opening up urban traffic planning to the public, and new methods to obtain a fish dinner.
This installment of Notes from the Community includes new wearables, displays, and projects in augmented and virtual reality. It also covers descriptions of whimsical and nostalgic inventions as well as dystopian reports on the new vulnerabilities and dangers of our technological future.
This installment of Notes from the Community covers the many different ways we instrument our world, ourselves, and our stuff. Along with these topics come the inevitable discussions of privacy, power, and sheep. There is even information about drones for sheep.
This installment of Notes from the Community covers wearables, drones, mapping technology, holographic displays, and haptics.
Many people now carry multiple mobile devices on a daily basis. Wearables, smartphones, tablets, and laptops all have their different advantages, but collectively they can increase a user's device management burden. Management problems include leaving a device behind accidentally, receiving notifications on the wrong device, and failing to secure a...
This installment of Notes from the Community covers technology focused on personal and data safety, including a necklace pendant with an active alarm and home sensing devices that alert you to troublesome sounds while you are away. Also, learn about smartphones capturing everything from college life to cosmic rays and about new conductive ink and a...
This installment of Notes from the Community covers everything from virtual, physical, multidimensional, and 3D reality to wearables for cats.
Terry O'Shea, a Fellow in Hewlett-Packard's Printing and Personal Systems Division, talks about all things wearable--from past projects and lessons learned to current challenges and future goals.
Wearables have been with us for a long time, and they're here to stay. Their capabilities and our expectations change with time, but many of the basic problems remain. This issue touches on designing for unpredictable human behavior, positioning sensors, powering wearables without removing the device from the body, and providing text input on very...
This installment of Notes from the Community is all about technology for locating, sensing, and interacting. Oh, and teddy bears.
To give you a preview of IEEE Pervasive Computing's October-December special issue on wearable computing, this installment of Notes from the Community focuses on submissions about wearables. The topics range from the origins of wearable computing to unusual examples of wearables, and from emerging uses to wearables in popular culture.
This installment of Notes from the Community covers a wide range of topics, including new gadgets that help you track down lost items, 3D printing, the downside of smart cities, and soldiers growing attached to their robots.
A list of the dynamically changing group membership of a meeting supports a variety of meeting-related activities. Effortless content sharing might be the most important application, but we can also use it to provide business card information for attendees, feed information into calendar applications to simplify scheduling of follow-up meetings, po...
In everyday meetings, automatic association of co-located mobile devices would ease sharing of web-links, media, and other information. We propose a method that compares patterns of silence from device microphones to detect co-location of those devices. This method works with unsynchronized audio capture, requires only 100bps and preserves privacy....
This installment of Notes from the Community covers new kinds of gadgets and interactions; innovations in transportation, smart cities, and smartphones; ubicomp and art; and visions of ubicomp.
This installment of Notes from the Community covers new developments in interaction toolkits and platforms, security and privacy, smartphones, power consumption and battery life, and ubicomp education. It also includes a vision of ubicomp's past and future and presents works in progress on behavioral change.
We are developing an optical line-of-sight signaling technology that enables mobile devices such as smartphones, tablets, and laptops to identify, locate, and receive information from other devices and infrastructure within their vicinity. Using this technology we can determine where particular devices are with respect to each other in a room - the...
This document describes the technology behind the accompanying video, which gives a demonstration of determining the dynamic group membership of a meeting by matching patterns of relative audio silence, or "silence signatures," sensed by mobile devices.
The article offers a curated summary of interesting news and research in pervasive and mobile computing, with content drawn from submissions from a shared community on the social news site Reddit, available at www.reddit. com/r/pervasivecomputing. One reader shared a link to custommade GPS-enabled shoes (www. designboom.com/design/shoes-withgps- by...
Welcome to the inaugural column of Notes from the Community! This column offers a curated summary of interesting news and research in pervasive and mobile computing, with content drawn from submissions from community members and readers. Visit www.reddit.com/r/pervasivecomputing to join the discussion.
How far have we come with respect to commercial deployments of the devices Mark Weiser described? This review of Weiser's vision evaluates the commercial success of tabs, pads, and boards and discusses their real-world use.
We would like to provide high-quality video conferencing so that people can communicate comfortably with each other anywhere, anytime. This is not a new goal, and there are now several applications such as Skype#8482; and FaceTime#8482; on mobile platforms that bring us closer to achieving anywhere, anytime video communications. Alas, these mobile...
Desktop video conferencing participants are often poorly positioned in their outgoing video — unaware of their appearance on camera. We combine face detection, feature tracking and motion detection for automatic real-time detection of poorly framed participants and subsequently provide framing feedback by compositing their incoming and outgoing vid...
Many organizations are now required to preserve and maintain access to large volumes of digital content for dozens of years. There is a need for preservation systems and processes to support such long-term retention requirements and enable the usability of those digital objects in the distant future, regardless of changes in technologies and design...
Pervasive computing technology can save lives by both eliminating the need for humans to work in hostile environments and supporting them when they do. In general, environments that are hazardous to humans are hard on technology as well. This issue contains three articles and a Spotlight column that illustrate the challenges of designing this techn...
External Posting Date: January 6, 2011 [Fulltext] Approved for External Publication face-to-face, but this can happen in a video conference if you move outside the camera's view angle. We describe a desktop video conferencing system that detects when a participant is out of frame of his camera and provides real-time visual feedback so he can adjust...
Building reliable storage systems becomes increasingly challenging as the complexity of modern storage systems continues to grow. Understanding storage failure characteristics is crucially important for designing and building a reliable storage system. ...
A growing number of online services, such as Google, Yahoo!, and Amazon, are starting to charge users for their storage. Customers often use these services to store valuable data such as email, family photos and videos, and disk backups. Today, a customer must entirely trust such external services to maintain the integrity of hosted data and return...
A growing number of online service providers offer to store customers' photos, email, le system backups, and other digital assets. Currently, customers cannot make informed decisions about the risk of losing data stored with any particular service provider, reducing their in- centive to rely on these services. We argue that third- party auditing is...
Ubiquitous computing has the potential to cut across cultures and countries, to be both locally valuable and globally pervasive. To reach this potential, it's important for researchers to recognize the challenges, rewards, goals, and methods of developing these technologies--not just in wealthy IT-saturated environments, but in developing economies...
The motion picture and broadcast television industries are in the midst of an unprecedented transformation from physical to virtual assets. While this conversion to digital workflows and end product has many advantages, one topic remains a puzzle: how do we preserve digital media assets with at least the same success as we have preserved physical,...
As storage sites grow in size to thousands of disks, and as the need to predict availability and reliability increases, researchers and designers need a better quantitative understanding of the ways that disks fail or lose data. Unfortunately, these numbers are hard to come by. Disk manufacturers have some approximations to these numbers from their...
Emerging Web services, such as email, photo sharing, and web site archives, must preserve large volumes of quickly ac- cessible data indenitely into the future. The costs of doing so often determine whether the service is economically vi- able. We make the case that these applications' demands on large scale storage systems over long time horizons...
We are in the midst of an unprecedented transformation from physical to virtual assets. Online contracts, digital photographs, digitized movies, music, technical journals, corporate records, web sites, and government documents are just a few examples of valuable digital assets that organizations would often like to preserve for long periods of time...
The LOCKSS project has developed and deployed in a world-wide test a peer-to-peer system for preserving access to journals and other archival information published on the Web. It consists of a large number of independent, low-cost, persistent Web caches that cooperate to detect and repair damage to their content by voting in "opinion polls." Based...
In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge how suitable a
P2P solution might be for a particular problem. It is based on characteristics of a wide range of P2P systems from the literature,
both proposed and deployed. These include budget, resource relevance, trust, rate of system chan...
In peer-to-peer systems, attrition attacks include both traditional, network-level denial of service attacks as well as application-level attacks in which malign peers conspire to waste loyal peers' resources. We describe several defenses for the LOCKSS peer-to-peer digital preservation system that help ensure that application- level attrition atta...
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a real- istic model of the threat. This requires an assessment of the capabilities of the adversary. The design typically evolves through a process of sim- ulating both the system and the adversary. This requires the de...
P2P systems are exposed to an unusually broad rangeof attacks. These include a spectrum of denial-of-service or attrition attacks from low-level packet flooding to high-level abuse ofthe peer communication protocol. We identify a set of defensesthat systems can deploy against such attacks and potential synergiesamong them. We illustrate the applica...
The LOCKSS system is a tool librarians can use to preserve long-term access to content published on the web. It has three main functions. It collects the content by crawling the publisher 's web sites, it distributes the content by acting as a proxy for reader's browsers, and it preserves the content through a cooperative process of damage detectio...
In peer-to-peer systems, attrition attacks include both traditional, network-level denial of service attacks as well as application-level attacks in which malign peers conspire to waste loyal peers' resources. We describe several defenses for LOCKSS, a peer-to-peer digital preservation system, that help ensure that application-level attacks even fr...
The LOCKSS project has developed and deployed in a worldwide test a peer-to-peer system for preserving access to journals and other archival information published on the Web. It consists of a large number of independent, low-cost, persistent web caches that cooperate to detect and repair damage to their content by voting in "opinion polls." Based o...
In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge how suitable a P2P solution might be for a particular problem. It is based on characteristics of a wide range of P2P systems from the literature, both proposed and deployed. These include budget, resource relevance, trust, rate of system chan...
In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge the likely suitability of a P2P architecture for their applications. It is based on the characteristics of a wide range of P2P systems from the literature, both proposed and deployed. 1.
Peer-to-peer systems are vulnerable to attrition attacks that include both traditional, network-level denial of service attacks as well as application-level attacks in which malign peers conspire to waste loyal peers' resources. We describe a set of defenses for the LOCKSS digital preservation system that help ensure that application-level attacks...
The LOCKSS project has developed and deployed in a worldwide test a peer-to-peer system for preserving access to journals and other archival information published on the Web. It consists of a large number of independent, low-cost, persistent web caches that cooperate to detect and repair damage to their content by voting in "opinion polls." Based o...
We consider the mobility of personal online identifiers. People change the identifiers through which they are reachable online as they change jobs or residences or Internet service providers. This kind of personal mobility makes reaching people online error-prone. As people move, they do not always know who or what has cached their now obsolete ide...
In this work we consider the mobility of personal online identifiers. People change the identifiers through which they are reachable on-line as they change jobs or residences or Internet service providers. This kind of personal mobility makes reaching people on-line error-prone. As people move, they do not always know who or what has cached their n...
People are the outsiders in the current communications revolution. Computer hosts, pager terminals, and telephones are addressable entities throughout the Internet and telephony systems. Human beings, however, still need application-specific tricks to be identified, like email addresses, telephone numbers, and ICQ IDs. The key challenge today is to...
The LOCKSS pr ject has developed and deployed in a wor16 wide test a peerU1ID eer systemfor prmIR11E1 access tojour nals and other ar hivalinforAID22 published on the Web. It consists of alarA number of independent, low-cost, per sistent web caches that cooperR' to detect andrIE2A damage to their content by voting in "opinion polls." Based on this...
As peer-to-peer networks become more popular, the use of metadata to achieve a variety of tasks (e.g. content lo-cation, pricing, auctioning) becomes more and more im-portant. In this paper, we argue that propagating up-dates to cached metadata provides benefits beyond simple caching with a fixed expiration, yet requires application-specific incent...
Ad hoc networks rely on the cooperation of the nodes participating in the network to forward packets for each other. A node may decide not to cooperate to save its resources while still using the network to relay its trac. If too many nodes exhibit this behavior, network performance degrades and cooperating nodes may nd themselves unfairly loaded....
This new Usenix/ACM conference on mobile systems, applications, and services provides a forum for the best cutting-edge research on enabling, supporting, and coping with mobility. This article reports on the conference highlights, including the keynote address, panel session, and poster and demo sessions.
Peer-to-peer systems in which the peers are truly autonomous have valuable properties, including resistance to certain forms of organizational failure and legal attack. Unfortunately, they can be vulnerable to malign peers. In the context of the LOCKSS system, a peer-to-peer digital preservation system for e-journals, we describe a set of technique...
We study the behavior of the new MAC protocols for QoS in the proposed IEEE 802.11e draft standard and analyze them for their ability to fulfill their goals of better QoS and higher channel efficiency. We study the response of these mechanisms to various choices in available protocol parameters. We show that HCF reduces channel contention and allow...
The LOCKSS project has developed and deployed in a world-wide test a peer-to-peer system for preserving access to journals and other archival information published on the Web. It consists of a large number of independent, low-cost, persistent web caches that cooperate to detect and repair damage to their content by voting in "opinion polls." Based...
In this work we describe, design and analyze the security of a tamper-evident, append-only data structure for maintaining secure data sequences in a loosely coupled distributed system where individual system components may be mutually distrustful. The resulting data structure, called an Authenticated Append-Only Skip List (AASL), allows its maintai...
In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge the likely suitability of a P2P architecture for their applications. It is based on the characteristics of a wide range of P2P systems from the literature, both proposed and deployed.
Recently the problem of indexing and locating content in peer-to-peer
networks has received much attention. Previous work suggests caching
index entries at intermediate nodes that lie on the paths taken by
search queries, but until now there has been little focus on how to
maintain these intermediate caches. This paper proposes CUP, a new
comprehen...
this paper to be affected by such failures since our measurements were spread over a 2-month time period. We use traceroute to determine the network path between 20 traceroute sources and thousands of geographically distributed destination hosts
Most popular, modern network simulators, such as ns, are targeted towards simulating low-level protocol details. These existing simulators are not intended for simulating large distributed applications with many hosts and many concurrent connections over long periods of simulated time. We introduce a new simulator, Narses, targeted towards large di...
This paper studies the problem of loadbalancing the demand for content in a peer-to-peer network across heterogeneous peer nodes that hold replicas of the content. Previous decentralized load balancing techniques in distributed systems base their decisions on periodic updates containing information about load or available capacity observed at the s...
People now have available to them a diversity of digital storage facilities, including laptops, cell phone address books, handheld devices, desktop computers and web-based storage services. Unfortunately, as the number of personal data repositories increases, so does the management problem of ensuring that the most up-to-date version of any documen...
We examine the queuing dynamics at nodes in an ad hoc mobile network and evaluate network performance under different packet scheduling algorithms using Dynamic Source Routing (DSR) and Greedy Perimeter Stateless Routing (GPSR) as the underlying routing protocols. Typically, packet schedulers in ad hoc networks give priority to control packets over...
Flash crowds can cripple a web site's performance. Since they are infrequent and unpredictable, these floods do not justify the cost of traditional commercial solutions. We describe Backslash, a collaborative web mirroring system run by a collective of web sites that wish to protect themselves from flash crowds. Backslash is built on a distributed...
Documents in digital formats are increasingly becoming a common form of expression for anything from rants and opinions to transaction records and contracts. Archiving such documents for the long term, particularly when their only form is digital, can be very important. Sadly, the principal digital expression of an author's intent, the digital sign...
Recently the problem of indexing and locating content in peer-to-peer networks has received much attention. Previous work suggests caching index entries at intermediate nodes that lie on the paths taken by search queries, but until now there has been little focus on how to maintain these intermediate caches. This paper proposes CUP, a new comprehen...
A secure timeline is a tamper-evident historic record of the states
through which a system goes throughout its operational history. Secure
timelines can help us reason about the temporal ordering of system
states in a provable manner. We extend secure timelines to encompass
multiple, mutually distrustful services, using timeline entanglement.
Timel...
In this paper we describe how to build a trusted reliable distributed service across administrative domains in a peer-to-peer network. The service we use to motivate our work is a public key time stamping service called Prokopius. The service provides a secure, verifible but distributable stable archive that maintains time stamped snapshots of publ...
In this paper we describe how to build a trusted reliable distributed service across administrative domains in a peer-to-peer network. The application we use to motivate our work is a public key time stamping service called Prokopius. The service provides a secure, verifiable but distributable stable archive that maintains time stamped snapshots of...
Measuring the bottleneck link bandwidth along a path is important for understanding the performance of many Internet applications. Existing tools to measure bottleneck bandwidth are relatively slow, can only measure bandwidth in one direction, and/or actively send probe packets. We present the nettimer bottleneck link bandwidth measurement tool, th...
We analyze a seven-week trace of the Metricom metropolitan-area packet radio wireless network to find how users take advantage of a mobile environment. Such understanding is critical for planning future large-scale mobile network infrastructures. Amongst other results, we find that users typically use the radios during the day and evening. Of the u...
Much of the current research in mobile networking investigates how to support a mobile user within an established infrastructure of routers and servers. Ad hoc networks come into play when no such established infrastructure exists. This paper presents a two-stage protocol to solve the resource discovery problem in ad hoc networks: how hosts discove...
The goal of the MosquitoNet project is to provide continuous Internet connectivity to mobile hosts. Mobile hosts must be able to take advantage of the best network connectivity available in any location, whether wired or wireless. We have implemented a mobile IP system that supports seamless switching between different networks and communication de...
Mobile IP protocols allow mobile hosts to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment in the Internet.
Fueled by the large number of powerful light-weight portable computers, the expanding availability of wireless networks, and the popularity of the Internet, there is an increasing demand to connect portable computers to the Internet at any time and in any place. However, the dynamic nature of such connectivity requires more flexible network support...
We describe a deterministic model of packet delay and use it to derive both the packet pair [2] property of FIFO-queueing networks and a new technique (packet tailgating) for actively measuring link bandwidths. Compared to previously known techniques, packet tailgating usually consumes less network bandwidth, does not rely on consistent behavior of...