The relationship between plant functional traits and demographic performance forms the foundation of trait-based ecology. It also serves as the natural linkage between trait-based ecology and much of evolutionary biology. Despite these important aspects, plant trait–demographic performance relationships reported in the literature are typically weak or nonexistent, and a synthetic picture of how traits are related to ecological and evolutionary patterns remains underdeveloped. Here, we begin by presenting an overview of the shortcomings in functional trait–demographic performance research and why weak results are more common than trait-based ecologists like to admit. We then discuss why there should be a natural synthesis between trait-based ecology and evolutionary ecology and potential reasons for why this synthesis has yet to emerge. Finally, we present a series of conceptual and empirical foci that should be incorporated into future trait–demographic performance research that will hopefully solidify the foundation of trait-based ecology and catalyze a synthesis with evolutionary ecology. These include (1) focusing on individuals as the fundamental unit of study instead of relying on population or species mean values for traits and demographic rates; (2) placing more emphasis on phenotypic integration, alternative designs, and performance landscapes; (3) coming to terms with the importance of regional- and local-scale context on plant performance; (4) an appreciation of the varied drivers of life-stage transitions and what aspects of function should be linked to those transitions; and (5) determining how the drivers of plant mortality act independently and in concert and what aspects of plant function best predict these outcomes. Our goal is to help highlight the shortcomings of trait–demographic performance research as it stands and areas where this research could course correct, ultimately, with the hope of promoting a trait-based research program that speaks to both ecologists and evolutionary biologists.
more »
« less
This content will become publicly available on April 25, 2026
Mobile Maps Continue to Fail Pedestrians: Synthesised Reflective Auto-Aggro-Ethnographies of Walking
We consider mobile maps, the everyday smart-device-based programs that locate the user, provide insights into local space, and support wayfinding – or do they? The authors collectively reflect on past infuriating experiences with failures of mobile maps as pedestrians. We synthesise these thick descriptions, what we call reflective auto-aggro-ethnographies, to identify shortcomings in mobile maps: hidden verticality, missing local detail, incorrect sensor data, and poor pathing. We turn to human-centred design to point out how these shortcomings should be (or, rather, should have been) addressed.
more »
« less
- PAR ID:
- 10596504
- Publisher / Repository:
- ACM
- Date Published:
- ISBN:
- 9798400713958
- Page Range / eLocation ID:
- 1 to 12
- Subject(s) / Keyword(s):
- Map interfaces pedestrians mobile GPS seamful design
- Format(s):
- Medium: X
- Location:
- Yokohama Japan
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Mobile Augmented Reality (AR) demands realistic rendering of virtual content that seamlessly blends into the physical environment. For this reason, AR headsets and recent smartphones are increasingly equipped with Time-of-Flight (ToF) cameras to acquire depth maps of a scene in real-time. ToF cameras are cheap and fast, however, they suffer from several issues that affect the quality of depth data, ultimately hampering their use for mobile AR. Among them, scale errors of virtual objects - appearing much bigger or smaller than what they should be - are particularly noticeable and unpleasant. This article specifically addresses these challenges by proposing InDepth, a real-time depth inpainting system based on edge computing. InDepth employs a novel deep neural network (DNN) architecture to improve the accuracy of depth maps obtained from ToF cameras. The DNN fills holes and corrects artifacts in the depth maps with high accuracy and eight times lower inference time than the state of the art. An extensive performance evaluation in real settings shows that InDepth reduces the mean absolute error by a factor of four with respect to ARCore DepthLab. Finally, a user study reveals that InDepth is effective in rendering correctly-scaled virtual objects, outperforming DepthLab.more » « less
-
With the rapid technological advancement, security has become a major issue due to the increase in malware activity that poses a serious threat to the security and safety of both computer systems and stakeholders. To maintain stakeholder’s, particularly, end user’s security, protecting the data from fraudulent efforts is one of the most pressing concerns. A set of malicious programming code, scripts, active content, or intrusive software that is designed to destroy intended computer systems and programs or mobile and web applications is referred to as malware. According to a study, naive users are unable to distinguish between malicious and benign applications. Thus, computer systems and mobile applications should be designed to detect malicious activities towards protecting the stakeholders. A number of algorithms are available to detect malware activities by utilizing novel concepts including Artificial Intelligence, Machine Learning, and Deep Learning. In this study, we emphasize Artificial Intelligence (AI) based techniques for detecting and preventing malware activity. We present a detailed review of current malware detection technologies, their shortcomings, and ways to improve efficiency. Our study shows that adopting futuristic approaches for the development of malware detection applications shall provide significant advantages. The comprehension of this synthesis shall help researchers for further research on malware detection and prevention using AI.more » « less
-
Edge computing is increasingly proposed as a solution for reducing resource consumption of mobile devices running simultaneous localization and mapping (SLAM) algorithms, with most edge-assisted SLAM systems assuming the communication resources between the mobile device and the edge server to be unlimited, or relying on heuristics to choose the information to be transmitted to the edge. This paper presents AdaptSLAM, an edge-assisted visual (V) and visual-inertial (VI) SLAM system that adapts to the available communication and computation resources, based on a theoretically grounded method we developed to select the subset of keyframes (the representative frames) for constructing the best local and global maps in the mobile device and the edge server under resource constraints. We implemented AdaptSLAM to work with the state-of-the-art open-source V-and VI-SLAM ORB-SLAM3 framework, and demonstrated that, under constrained network bandwidth, AdaptSLAM reduces the tracking error by 62% compared to the best baseline method.more » « less
-
We consider the problem of predicting cellular network performance (signal maps) from measurements collected by several mobile devices. We formulate the problem within the online federated learning framework: (i) federated learning (FL) enables users to collaboratively train a model, while keeping their training data on their devices; (ii) measurements are collected as users move around over time and are used for local training in an online fashion. We consider an honest-but-curious server, who observes the updates from target users participating in FL and infers their location using a deep leakage from gradients (DLG) type of attack, originally developed to reconstruct training data of DNN image classifiers. We make the key observation that a DLG attack, applied to our setting, infers the average location of a batch of local data, and can thus be used to reconstruct the target users' trajectory at a coarse granularity. We build on this observation to protect location privacy, in our setting, by revisiting and designing mechanisms within the federated learning framework including: tuning the FL parameters for averaging, curating local batches so as to mislead the DLG attacker, and aggregating across multiple users with different trajectories. We evaluate the performance of our algorithms through both analysis and simulation based on real-world mobile datasets, and we show that they achieve a good privacy-utility tradeoff.more » « less
An official website of the United States government
