SlideShare a Scribd company logo
GAM Documentation Chien-Hsun Chen, Hsun-Cheng Lin, Hao Wang, Heng-Yi Shen
Outline GAM System System overview Software components on android Content Providers Algorithms Features
System Overview With  Android  Open Platform, GAM raise a social network cross different handset. Because the system incompatible of mobile, it is impossible before. GAM is client – server based application. Using server to sharing information and holding event.
Software Components on Android GAM MyRecentCall ShareContactList Policy ShareContactProvider TrustProvider Android API
Outline System Overview Content Providers Share Contact Provider Trust Provider Algorithms Features
Content Provider GAM provider two provider: “ Share Contact Provider ” and “ Trust Provider ” provide identity service for others application.
Content Provider – Share Contact Provider “ Share Contact Provider”  Record user’s comment and contact status  Provide  public rate  and  personal trust  of contact Id Nick Number Label Status Comment Bomb Star  Trust Rate Time Integer Contact Name Contact Number Friend, Family, Coworker Update status User’s comment for contact Marked  bomb or not Marked star or not User’s trust rate for contact  Contact public rate Comment create time Uri Usage /contact/# Return contact by id /label/# Return contact by label /sync Update Contact List to Server
Content Provider – Trust Provider “ Trust Provider ”  provide  path   info ,  trust  of this comment  provide  public rate  of this comment writer  Id Introducer Number  Path  Comment Rank Bomb  Star  Time Rate Status Integer Introducer’s number Asked number Social relationship  path Comment for asked number Personal trust rank  Bomb number Star number Comment created time Public rate of this number Read, Unread Uri Usage /trust Return trust of each number (group by number) /renew/* Return trust by number /trust/# Read a comment /sync Update trust status to server
Outline System Overview Content Providers Algorithms Search algorithm Personal trust algorithm Public rate algorithm Features
Algorithm 1 : search algorithm Asker sends the request with phone number to all contacts Receiver check the relationship with asker Search inside personal comments base on policy Forward the request base on policy Asker receives many comments Asker Receiver Request Response  comment  Decide willing to Forward  it or not
Algorithm 2: personal trust algorithm Each contact has a “ trust value ” to show the user’s personal trust of it. It updated by system automatically.  It depends on the frequency that user choose which contact to be his social network introducer. Introducers are those who are already in the contact list and provide social network information to the user. Comments provider by GAM  Trust provider  are order by trust rank. Trust rank is determined by the path of trust weighted social relationship between user and the request number.  For example: If a user gets a comment from path p0-p1-p2-p3.  In which p0 is the user, p3 is the target number and p1 is a introducer.  The personal trust of this comment is decided as: P0 User P1 Introducer P2  Comment Provider P3 Asking number
Algorithm 3: public rate algorithm Each comment has a “representative value” to show how often it is read. The value is updated by system automatically.  The public rate of a certain contact is the average of representative values of comments written by the contact. This public rate show for public to encourage comment writing.
Outline System Overview Content Providers Algorithms Features Star & Bomb Growing flower Group Contact list Comments Privacy policy
Feature 1: Star & Bomb User can set personal trust to each contact Star  – I trust this contact’s comments Normal  – no preference Bomb  – I don’t trust this contact’s comments Personal trust helps ranking comments from all contacts provides reference for members of social circle Star Normal Bomb
Feature 2: Growing Flower System calculates the  total hits of all comments  provided by one contact monotonously increases when any comments provided by this contact are viewed Keeps growing from seed to bloom Encourages users to share more comments Public Confidence helps ranking comments provides reference for  all users in GAM
Feature 3 : Group Group represents the relationship between user and contact Set by user Three kinds of relationship family,   friend,  and  coworker Contact could belong to multiple groups Color mixing family & friend family & coworker friend &coworker
Feature 4: Contact list List the contacts by groups Family   ,  friend   , and  coworker Local contact The contacts in your cell phone Stranger The phone numbers in your call log  but not belong any above groups  A contact might be found in several groups
Feature 5: Comments Search comments in GAM Step 1. Select the phone number Step 2. Select the comment Step 3. See the comment details
Setting policy between group Arrow  Control the limit of distance for request forward and response. Sync Sync configure data with server manually  Save  Save configure setting. Feature 6: Private policy 3 2 1

More Related Content

PDF
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
PPT
INFO4990_Hossain
PPTX
Survey on deception in osn
PPTX
Google Page rank Factors
PPT
presentation29
PDF
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
DOCX
Sort a self organizing trust model for peer-to-peer systems
DOC
Report - Final_New_phishila
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER USERS USING PUBLIC CLICK ANAL...
INFO4990_Hossain
Survey on deception in osn
Google Page rank Factors
presentation29
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
Sort a self organizing trust model for peer-to-peer systems
Report - Final_New_phishila

What's hot (8)

PPTX
#CNX14 - Deliverability: Navigating the New ISP Landscape
PPT
ppt presentation
PPTX
SORT Self Organizing trust model for peer to peer system
PPT
Second review
PDF
Cookie surveillance
PDF
How to Make People Click on a Dangerous Link Despite their Security Awareness
DOCX
Spammer taxonomy using scientific approach
PDF
Evaluation Social Ties and Trust in Online Social Network
#CNX14 - Deliverability: Navigating the New ISP Landscape
ppt presentation
SORT Self Organizing trust model for peer to peer system
Second review
Cookie surveillance
How to Make People Click on a Dangerous Link Despite their Security Awareness
Spammer taxonomy using scientific approach
Evaluation Social Ties and Trust in Online Social Network
Ad

Viewers also liked (9)

PPT
Why I’M Unique
PPT
Gam Documentation
PPT
GAM Slide
PDF
doT.py - a python template engine.
PDF
Tops for Lean Startup
PPTX
python small tools for CI and team cooperation
PDF
Big datalab
PDF
Case study of Google Cloud Platform
PDF
AppEngine Performance Tuning
Why I’M Unique
Gam Documentation
GAM Slide
doT.py - a python template engine.
Tops for Lean Startup
python small tools for CI and team cooperation
Big datalab
Case study of Google Cloud Platform
AppEngine Performance Tuning
Ad

Similar to Gam Documentation (20)

PPTX
Band of brothers, building scalable social web apps on windows azure with asp...
PPT
moscow_developer_day
PDF
Conversations As A Service
PPT
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
PPT
Social Messaging Solution Matrix
PDF
Integrate Business Apps with Facebook, Twitter, and LinkedIn
PDF
The Perfect Local Media Company Sebastien Provencher Lss 09 Presentation ...
PPTX
Copy of presentation1
PPT
RSS and Social Bookmarking
PPTX
Social Media
PDF
iOS APPLICATION FOR FAMILY SOCIAL NETWORKING PLATFORM
PPT
Social Web 2.0 Class Week 4: Social Networks, Privacy
PPTX
Social network implicit and explicit market convergence
PPT
Social media tools training
PPT
Proposal Defence
PPTX
Everything You Need To Know About Social Media
PPT
LifeSocial - A P2P-Platform for Secure Online Social Networks
PDF
A Wide Open World of Social Networking: Monica Lam, Stanford Engineering
PDF
Social media for internal communications
Band of brothers, building scalable social web apps on windows azure with asp...
moscow_developer_day
Conversations As A Service
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
Social Messaging Solution Matrix
Integrate Business Apps with Facebook, Twitter, and LinkedIn
The Perfect Local Media Company Sebastien Provencher Lss 09 Presentation ...
Copy of presentation1
RSS and Social Bookmarking
Social Media
iOS APPLICATION FOR FAMILY SOCIAL NETWORKING PLATFORM
Social Web 2.0 Class Week 4: Social Networks, Privacy
Social network implicit and explicit market convergence
Social media tools training
Proposal Defence
Everything You Need To Know About Social Media
LifeSocial - A P2P-Platform for Secure Online Social Networks
A Wide Open World of Social Networking: Monica Lam, Stanford Engineering
Social media for internal communications

Recently uploaded (20)

PDF
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
PDF
Daniels 2024 Inclusive, Sustainable Development
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
PDF
Keppel_Proposed Divestment of M1 Limited
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PDF
SBI Securities Weekly Wrap 08-08-2025_250808_205045.pdf
PDF
Charisse Litchman: A Maverick Making Neurological Care More Accessible
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPT
Chapter four Project-Preparation material
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPTX
Business Ethics - An introduction and its overview.pptx
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
How to Get Funding for Your Trucking Business
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
PPTX
Principles of Marketing, Industrial, Consumers,
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PPTX
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
Daniels 2024 Inclusive, Sustainable Development
Power and position in leadershipDOC-20250808-WA0011..pdf
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
Keppel_Proposed Divestment of M1 Limited
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
SBI Securities Weekly Wrap 08-08-2025_250808_205045.pdf
Charisse Litchman: A Maverick Making Neurological Care More Accessible
Ôn tập tiếng anh trong kinh doanh nâng cao
Chapter four Project-Preparation material
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Business Ethics - An introduction and its overview.pptx
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
Belch_12e_PPT_Ch18_Accessible_university.pptx
How to Get Funding for Your Trucking Business
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
Principles of Marketing, Industrial, Consumers,
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx

Gam Documentation

  • 1. GAM Documentation Chien-Hsun Chen, Hsun-Cheng Lin, Hao Wang, Heng-Yi Shen
  • 2. Outline GAM System System overview Software components on android Content Providers Algorithms Features
  • 3. System Overview With Android Open Platform, GAM raise a social network cross different handset. Because the system incompatible of mobile, it is impossible before. GAM is client – server based application. Using server to sharing information and holding event.
  • 4. Software Components on Android GAM MyRecentCall ShareContactList Policy ShareContactProvider TrustProvider Android API
  • 5. Outline System Overview Content Providers Share Contact Provider Trust Provider Algorithms Features
  • 6. Content Provider GAM provider two provider: “ Share Contact Provider ” and “ Trust Provider ” provide identity service for others application.
  • 7. Content Provider – Share Contact Provider “ Share Contact Provider” Record user’s comment and contact status Provide public rate and personal trust of contact Id Nick Number Label Status Comment Bomb Star Trust Rate Time Integer Contact Name Contact Number Friend, Family, Coworker Update status User’s comment for contact Marked bomb or not Marked star or not User’s trust rate for contact Contact public rate Comment create time Uri Usage /contact/# Return contact by id /label/# Return contact by label /sync Update Contact List to Server
  • 8. Content Provider – Trust Provider “ Trust Provider ” provide path info , trust of this comment provide public rate of this comment writer Id Introducer Number Path Comment Rank Bomb Star Time Rate Status Integer Introducer’s number Asked number Social relationship path Comment for asked number Personal trust rank Bomb number Star number Comment created time Public rate of this number Read, Unread Uri Usage /trust Return trust of each number (group by number) /renew/* Return trust by number /trust/# Read a comment /sync Update trust status to server
  • 9. Outline System Overview Content Providers Algorithms Search algorithm Personal trust algorithm Public rate algorithm Features
  • 10. Algorithm 1 : search algorithm Asker sends the request with phone number to all contacts Receiver check the relationship with asker Search inside personal comments base on policy Forward the request base on policy Asker receives many comments Asker Receiver Request Response comment Decide willing to Forward it or not
  • 11. Algorithm 2: personal trust algorithm Each contact has a “ trust value ” to show the user’s personal trust of it. It updated by system automatically. It depends on the frequency that user choose which contact to be his social network introducer. Introducers are those who are already in the contact list and provide social network information to the user. Comments provider by GAM Trust provider are order by trust rank. Trust rank is determined by the path of trust weighted social relationship between user and the request number. For example: If a user gets a comment from path p0-p1-p2-p3. In which p0 is the user, p3 is the target number and p1 is a introducer. The personal trust of this comment is decided as: P0 User P1 Introducer P2 Comment Provider P3 Asking number
  • 12. Algorithm 3: public rate algorithm Each comment has a “representative value” to show how often it is read. The value is updated by system automatically. The public rate of a certain contact is the average of representative values of comments written by the contact. This public rate show for public to encourage comment writing.
  • 13. Outline System Overview Content Providers Algorithms Features Star & Bomb Growing flower Group Contact list Comments Privacy policy
  • 14. Feature 1: Star & Bomb User can set personal trust to each contact Star – I trust this contact’s comments Normal – no preference Bomb – I don’t trust this contact’s comments Personal trust helps ranking comments from all contacts provides reference for members of social circle Star Normal Bomb
  • 15. Feature 2: Growing Flower System calculates the total hits of all comments provided by one contact monotonously increases when any comments provided by this contact are viewed Keeps growing from seed to bloom Encourages users to share more comments Public Confidence helps ranking comments provides reference for all users in GAM
  • 16. Feature 3 : Group Group represents the relationship between user and contact Set by user Three kinds of relationship family, friend, and coworker Contact could belong to multiple groups Color mixing family & friend family & coworker friend &coworker
  • 17. Feature 4: Contact list List the contacts by groups Family , friend , and coworker Local contact The contacts in your cell phone Stranger The phone numbers in your call log but not belong any above groups A contact might be found in several groups
  • 18. Feature 5: Comments Search comments in GAM Step 1. Select the phone number Step 2. Select the comment Step 3. See the comment details
  • 19. Setting policy between group Arrow Control the limit of distance for request forward and response. Sync Sync configure data with server manually Save Save configure setting. Feature 6: Private policy 3 2 1