SlideShare ist ein Scribd-Unternehmen logo
1 von 19
GAM Documentation Chien-Hsun Chen, Hsun-Cheng Lin, Hao Wang, Heng-Yi Shen
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
System Overview With  Android  Open Platform, GAM raise a social network cross different handset. Because the system incompatible of mobile, it is impossible before. GAM is client – server based application. Using server to sharing information and holding event.
Software Components on Android GAM MyRecentCall ShareContactList Policy ShareContactProvider TrustProvider Android API
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Content Provider ,[object Object]
Content Provider – Share Contact Provider ,[object Object],[object Object],[object Object],Id Nick Number Label Status Comment Bomb Star  Trust Rate Time Integer Contact Name Contact Number Friend, Family, Coworker Update status User’s comment for contact Marked  bomb or not Marked star or not User’s trust rate for contact  Contact public rate Comment create time Uri Usage /contact/# Return contact by id /label/# Return contact by label /sync Update Contact List to Server
Content Provider – Trust Provider ,[object Object],[object Object],[object Object],Id Introducer Number  Path  Comment Rank Bomb  Star  Time Rate Status Integer Introducer’s number Asked number Social relationship  path Comment for asked number Personal trust rank  Bomb number Star number Comment created time Public rate of this number Read, Unread Uri Usage /trust Return trust of each number (group by number) /renew/* Return trust by number /trust/# Read a comment /sync Update trust status to server
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Algorithm 1 : search algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],Asker Receiver Request Response  comment  Decide willing to Forward  it or not
Algorithm 2: personal trust algorithm ,[object Object],[object Object],[object Object],[object Object],P0 User P1 Introducer P2  Comment Provider P3 Asking number
Algorithm 3: public rate algorithm ,[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Feature 1: Star & Bomb ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Star Normal Bomb
Feature 2: Growing Flower ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Feature 3 : Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Feature 4: Contact list ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Feature 5: Comments ,[object Object],Step 1. Select the phone number Step 2. Select the comment Step 3. See the comment details
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Feature 6: Private policy 3 2 1

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (8)

#CNX14 - Deliverability: Navigating the New ISP Landscape
#CNX14 - Deliverability: Navigating the New ISP Landscape#CNX14 - Deliverability: Navigating the New ISP Landscape
#CNX14 - Deliverability: Navigating the New ISP Landscape
 
ppt presentation
ppt presentationppt presentation
ppt presentation
 
SORT Self Organizing trust model for peer to peer system
SORT Self Organizing trust model for peer to peer systemSORT Self Organizing trust model for peer to peer system
SORT Self Organizing trust model for peer to peer system
 
Second review
Second reviewSecond review
Second review
 
Cookie surveillance
Cookie surveillanceCookie surveillance
Cookie surveillance
 
How to Make People Click on a Dangerous Link Despite their Security Awareness
How to Make People Click on a Dangerous Link Despite their Security Awareness How to Make People Click on a Dangerous Link Despite their Security Awareness
How to Make People Click on a Dangerous Link Despite their Security Awareness
 
Spammer taxonomy using scientific approach
Spammer taxonomy using scientific approachSpammer taxonomy using scientific approach
Spammer taxonomy using scientific approach
 
Evaluation Social Ties and Trust in Online Social Network
Evaluation Social Ties and Trust in Online Social NetworkEvaluation Social Ties and Trust in Online Social Network
Evaluation Social Ties and Trust in Online Social Network
 

Ähnlich wie Gam Documentation

IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGijp2p
 
Metzler 2010 - reputation systems
Metzler   2010 - reputation systemsMetzler   2010 - reputation systems
Metzler 2010 - reputation systemsRichard Metzler
 
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDealQuality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDealMaynooth University
 
Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systemsguest77b0cd12
 
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating SitesAutomatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating SitesIRJET Journal
 
PRODUCT REPUTATION AND GLOBAL RATING IN E-COMMERCE
PRODUCT REPUTATION AND GLOBAL RATING IN E-COMMERCE PRODUCT REPUTATION AND GLOBAL RATING IN E-COMMERCE
PRODUCT REPUTATION AND GLOBAL RATING IN E-COMMERCE IAEME Publication
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peerSnehith
 
Fighting spam using social gatekeepers
Fighting spam using social gatekeepersFighting spam using social gatekeepers
Fighting spam using social gatekeepersYogesh Shinde
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelIJMER
 
The Role of Trust Systems in eCommerce
The Role of Trust Systems in eCommerceThe Role of Trust Systems in eCommerce
The Role of Trust Systems in eCommerceJessica Van Meter
 
A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model
A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model    A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model
A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model IJECEIAES
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
SEO - Untapping the potential of customer advocacy and reviews - BrightonSEO
SEO - Untapping the potential of customer advocacy and reviews - BrightonSEOSEO - Untapping the potential of customer advocacy and reviews - BrightonSEO
SEO - Untapping the potential of customer advocacy and reviews - BrightonSEOEdward (Teddie) Cowell
 
COMMTRUST: A MULTI-DIMENSIONAL TRUST MODEL FOR E-COMMERCE APPLICATIONS
COMMTRUST: A MULTI-DIMENSIONAL TRUST MODEL FOR E-COMMERCE APPLICATIONSCOMMTRUST: A MULTI-DIMENSIONAL TRUST MODEL FOR E-COMMERCE APPLICATIONS
COMMTRUST: A MULTI-DIMENSIONAL TRUST MODEL FOR E-COMMERCE APPLICATIONSijnlc
 
Social Trust-aware Recommendation System: A T-Index Approach
Social Trust-aware Recommendation System: A T-Index ApproachSocial Trust-aware Recommendation System: A T-Index Approach
Social Trust-aware Recommendation System: A T-Index ApproachNima Dokoohaki
 
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRS
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRSSentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRS
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRSIRJET Journal
 
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRS
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRSSentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRS
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRSIRJET Journal
 
What Sets Verified Users apart? Insights Into, Analysis of and Prediction of ...
What Sets Verified Users apart? Insights Into, Analysis of and Prediction of ...What Sets Verified Users apart? Insights Into, Analysis of and Prediction of ...
What Sets Verified Users apart? Insights Into, Analysis of and Prediction of ...IIIT Hyderabad
 

Ähnlich wie Gam Documentation (20)

IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
 
Metzler 2010 - reputation systems
Metzler   2010 - reputation systemsMetzler   2010 - reputation systems
Metzler 2010 - reputation systems
 
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDealQuality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
 
Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systems
 
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating SitesAutomatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
 
PRODUCT REPUTATION AND GLOBAL RATING IN E-COMMERCE
PRODUCT REPUTATION AND GLOBAL RATING IN E-COMMERCE PRODUCT REPUTATION AND GLOBAL RATING IN E-COMMERCE
PRODUCT REPUTATION AND GLOBAL RATING IN E-COMMERCE
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peer
 
Fighting spam using social gatekeepers
Fighting spam using social gatekeepersFighting spam using social gatekeepers
Fighting spam using social gatekeepers
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A Model
 
The Role of Trust Systems in eCommerce
The Role of Trust Systems in eCommerceThe Role of Trust Systems in eCommerce
The Role of Trust Systems in eCommerce
 
A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model
A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model    A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model
A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
SEO - Untapping the potential of customer advocacy and reviews - BrightonSEO
SEO - Untapping the potential of customer advocacy and reviews - BrightonSEOSEO - Untapping the potential of customer advocacy and reviews - BrightonSEO
SEO - Untapping the potential of customer advocacy and reviews - BrightonSEO
 
COMMTRUST: A MULTI-DIMENSIONAL TRUST MODEL FOR E-COMMERCE APPLICATIONS
COMMTRUST: A MULTI-DIMENSIONAL TRUST MODEL FOR E-COMMERCE APPLICATIONSCOMMTRUST: A MULTI-DIMENSIONAL TRUST MODEL FOR E-COMMERCE APPLICATIONS
COMMTRUST: A MULTI-DIMENSIONAL TRUST MODEL FOR E-COMMERCE APPLICATIONS
 
Social Trust-aware Recommendation System: A T-Index Approach
Social Trust-aware Recommendation System: A T-Index ApproachSocial Trust-aware Recommendation System: A T-Index Approach
Social Trust-aware Recommendation System: A T-Index Approach
 
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRS
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRSSentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRS
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRS
 
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRS
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRSSentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRS
Sentiment Analysis of Product Reviews and Trustworthiness Evaluation using TRS
 
Getting started-with-similar web-api
Getting started-with-similar web-apiGetting started-with-similar web-api
Getting started-with-similar web-api
 
What Sets Verified Users apart? Insights Into, Analysis of and Prediction of ...
What Sets Verified Users apart? Insights Into, Analysis of and Prediction of ...What Sets Verified Users apart? Insights Into, Analysis of and Prediction of ...
What Sets Verified Users apart? Insights Into, Analysis of and Prediction of ...
 
AD FS Workshop | Part 2 | Deep Dive
AD FS Workshop | Part 2 | Deep DiveAD FS Workshop | Part 2 | Deep Dive
AD FS Workshop | Part 2 | Deep Dive
 

Mehr von David Chen

Build Smart Service on GCP - Google DevFest 2018 Taiwan
Build Smart Service on GCP - Google DevFest 2018 TaiwanBuild Smart Service on GCP - Google DevFest 2018 Taiwan
Build Smart Service on GCP - Google DevFest 2018 TaiwanDavid Chen
 
python small tools for CI and team cooperation
python small tools for CI and team cooperationpython small tools for CI and team cooperation
python small tools for CI and team cooperationDavid Chen
 
Tops for Lean Startup
Tops for Lean StartupTops for Lean Startup
Tops for Lean StartupDavid Chen
 
Case study of Google Cloud Platform
Case study of Google Cloud PlatformCase study of Google Cloud Platform
Case study of Google Cloud PlatformDavid Chen
 
Talk in Google fest 2013
Talk in Google fest 2013Talk in Google fest 2013
Talk in Google fest 2013David Chen
 
AppEngine Performance Tuning
AppEngine Performance TuningAppEngine Performance Tuning
AppEngine Performance TuningDavid Chen
 
doT.py - a python template engine.
doT.py - a python template engine.doT.py - a python template engine.
doT.py - a python template engine.David Chen
 
Final presentation for mobile strategy
Final presentation for mobile strategyFinal presentation for mobile strategy
Final presentation for mobile strategyDavid Chen
 
Gam Documentation
Gam DocumentationGam Documentation
Gam DocumentationDavid Chen
 

Mehr von David Chen (12)

Build Smart Service on GCP - Google DevFest 2018 Taiwan
Build Smart Service on GCP - Google DevFest 2018 TaiwanBuild Smart Service on GCP - Google DevFest 2018 Taiwan
Build Smart Service on GCP - Google DevFest 2018 Taiwan
 
python small tools for CI and team cooperation
python small tools for CI and team cooperationpython small tools for CI and team cooperation
python small tools for CI and team cooperation
 
Big datalab
Big datalabBig datalab
Big datalab
 
Tops for Lean Startup
Tops for Lean StartupTops for Lean Startup
Tops for Lean Startup
 
Case study of Google Cloud Platform
Case study of Google Cloud PlatformCase study of Google Cloud Platform
Case study of Google Cloud Platform
 
Talk in Google fest 2013
Talk in Google fest 2013Talk in Google fest 2013
Talk in Google fest 2013
 
AppEngine Performance Tuning
AppEngine Performance TuningAppEngine Performance Tuning
AppEngine Performance Tuning
 
doT.py - a python template engine.
doT.py - a python template engine.doT.py - a python template engine.
doT.py - a python template engine.
 
Final presentation for mobile strategy
Final presentation for mobile strategyFinal presentation for mobile strategy
Final presentation for mobile strategy
 
長庚大學
長庚大學長庚大學
長庚大學
 
GAM Slide
GAM SlideGAM Slide
GAM Slide
 
Gam Documentation
Gam DocumentationGam Documentation
Gam Documentation
 

Kürzlich hochgeladen

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Kürzlich hochgeladen (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Gam Documentation

  • 1. GAM Documentation Chien-Hsun Chen, Hsun-Cheng Lin, Hao Wang, Heng-Yi Shen
  • 2.
  • 3. System Overview With Android Open Platform, GAM raise a social network cross different handset. Because the system incompatible of mobile, it is impossible before. GAM is client – server based application. Using server to sharing information and holding event.
  • 4. Software Components on Android GAM MyRecentCall ShareContactList Policy ShareContactProvider TrustProvider Android API
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.