4,365 results
Search Results
2. To Be or Not To Be Cited in Computer Science.
- Subjects
BIBLIOGRAPHICAL citations ,COMPUTER scientists ,CONFERENCE papers ,DATABASE management ,RESEARCH methodology ,CHARTS, diagrams, etc. ,COMPUTER network resources - Abstract
The article discusses relative relevant undercitation (RRU) in computer science databases including Scopus, Web of Science (WoS), and the Association for Computing Machinery (ACM) Digital Library (DL). According to the article, conference papers are not always as represented as journal articles in citations for reasons that include parsing technology and a traditional bias for journals. Three experiments testing computer science databases for inaccuracies are described. Tables present researched information about citations by author and database.
- Published
- 2012
- Full Text
- View/download PDF
3. USING THE SOCIAL SCIENCE RESEARCH NETWORK TO AID AND TO PROMOTE RESEARCH.
- Author
-
Prebble, John, Caldwell, Julia, and Keene, Amelia
- Subjects
SOCIAL science research ,DEPOSITORY libraries ,WORKING papers ,LAW schools ,DIGITAL libraries ,COMPUTER network resources - Abstract
The Social Science Research Network is a depository for academic scholarship. SSRN allows academic papers and abstracts to be accessible worldwide. Most papers may be downloaded from the SSRN database free of charge, but some links are to commercial sites. Posting papers to SSRN and subscribing to its site are not inherently complicated. However, it is possible for academic departments, particularly law schools, to use SSRN more efficiently and more flexibly than SSRN's architects envisaged. For instance, one can establish a faculty working paper series with archived issues that are forever easily accessible, a much cheaper manner of establishing a working paper series than traditional ways, and a more permanent format than envisaged by standard SSRN systems. This article explains how SSRN works and how it can be used more effectively. [ABSTRACT FROM AUTHOR]
- Published
- 2013
4. Research for Practice: Private Online Communication; Highlights in Systems Verification.
- Author
-
Bailis, Peter, Kwon, Albert, and Wilcox, James R.
- Subjects
INTERPERSONAL communication ,COMPUTER network resources ,VERIFICATION of computer systems - Abstract
The authors present research papers regarding the use of cryptography to ensure private online communication and advances in systems verification or verified systems design.
- Published
- 2018
- Full Text
- View/download PDF
5. Back Matter.
- Subjects
ASSOCIATIONS, institutions, etc. ,PRESIDENTIAL elections ,CONFERENCES & conventions ,COMPUTER network resources ,ANNUAL meetings ,ECONOMICS - Abstract
This article offers announcements for April 2007 concerning the American Finance Association, publishers of the periodical "The Journal of Finance." Topics of discussion include the results of the organization's 2006 elections, in which Jeremy Stein was voted president-elect and Darrell Duffie was voted vice president, and information regarding the 2008 annual meeting, to be held in New Orleans, Louisiana in January. The article also offers computer network resource information for further announcements, and offers information on the organization's worldwide directory of finance faculty.
- Published
- 2007
- Full Text
- View/download PDF
6. Developing a Cross-media System to Facilitate Question-Driven Digital Annotations on Paper Textbooks.
- Author
-
Po-Yao Chao, Gwo-Dong Chen, and Chih-Wei Chang
- Subjects
TEXTBOOKS ,EDUCATIONAL technology ,INTERNET in education ,COMPUTER assisted instruction ,NOTETAKING ,ANNOTATIONS ,EXPLICIT instruction ,LEARNING goals ,EDUCATIONAL objectives ,COMPUTER network resources - Abstract
Research on note taking in pedagogical settings has received considerable attention. However, the awkwardness of integrating information across different media formats may present physical and cognitive barriers that prevent students from effectively organizing annotations from both printed and digital content while studying paper textbooks. The purpose of this paper is to develop a cross-media annotation system that incorporates a paper textbook with a computer as an integrated whole to facilitate the question-driven organization of annotations. While taking notes, students can digitally extract printed text and organize the copied passages based on guiding questions, all by using digital pens. Students can also link Internet-based learning resources to printed content to supplement their print-based studies. A user-based formative evaluation was conducted to assess the new functions of the cross-media annotation system and to explore their influence on students' notetaking behavior and performance. The results show that the new functions may facilitate the retention of key concepts of the paper textbooks and may improve knowledge construction based on explicit learning goals. [ABSTRACT FROM AUTHOR]
- Published
- 2010
7. The Client's Side of the World-Web Web.
- Author
-
Berghel, Hal
- Subjects
WORLD Wide Web ,CYBERSPACE ,COMPUTER network protocols ,COMPUTER network resources ,COMPUTER operating systems ,MACINTOSH (Computer) ,SYSTEMS software - Abstract
Without question the hottest part of cyberspace at present is the World Wide Web. The Web is the Internet's killer protocol mix, the client-server handshaking and communications protocol, HyperText Transfer Protocol, together with a protocol for document formatting, HyperText Markup Language. As this article was being written, the Web became the dominant Internet resource as measured by both packet count and volume, surpassing File Transfer Protocol, Telnet, and Gopher. The client side of the Web at this moment is dominated by Mozilla and Microsoft Windows operating system of Netscape Corp. For one thing the non-Unix world represents the greatest growth potential for the client side. The few million existing Unix workstations pale in comparison to the estimated 60-75 million Windows computers and another 100 million that use DOS, not to mention tens of millions of OS⁄2 and Macintosh computers. The two basic ingredients of a Web client are a navigation tool and a document browser.
- Published
- 1996
- Full Text
- View/download PDF
8. Paper-based versus computer-based records in the emergency department: Staff preferences, expectations, and concerns.
- Author
-
Ayatollahi, Haleh, Bath, Peter A., and Goodacre, Steve
- Subjects
MEDICAL personnel ,HOSPITAL emergency services ,MEDICAL records ,EMERGENCY medical services ,MEDICAL care ,QUALITATIVE research ,COMPUTER network resources - Abstract
Although the potential benefits of computer-based records have been identified in different areas of the healthcare environment, in many settings paper-based records and computer-based records are still used in parallel. In this article, emergency department (ED) staff perspectives about the use of paper- or computer-based records are presented. This was a qualitative study in which data were collected using in-depth semi-structured interviews with the ED staff. The interviews were transcribed verbatim and data were analysed using framework analysis. In total, 34 interviews were undertaken. The study identified a number of factors which might encourage or discourage the use of paper-based and computer-based records in the ED. Users also expressed their concerns and expectations. Although there is a tendency towards computerizing healthcare settings, user acceptance of technology should not be underestimated. To improve user acceptance, users' concerns should be investigated and addressed appropriately. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
9. The cookie is still crumbling: the challenges facing cookie tracking research.
- Author
-
Ball, Adam
- Subjects
COOKIES (Computer science) ,MARKETING research -- Methodology ,INTERNET searching ,CONSUMER behavior ,BRAND identification ,CONSUMER surveys ,COMPUTER network resources - Abstract
The article presents a paper which was a finalist in the 2012 "International Journal of Market Research" Young Research Writer award competition on the topic of Internet cookie data tracking of consumer internet activity in market research. The report looks at surveys by the market research agency MESH Planning using the Real-Time Experience Tracking (RET) method to explore consumer exposure and interaction with online advertising of brands in Great Britain. The potential for inaccuracy in reconciling passive data and human reporting in market research is discussed.
- Published
- 2013
- Full Text
- View/download PDF
10. Participation cycles and emergent cultures in an online community.
- Author
-
Ewing, Tom
- Subjects
CASE studies ,VIRTUAL communities ,MARKETING research ,CONSUMER behavior ,INTERNET forums ,QUALITATIVE research ,COMPUTER network resources - Abstract
This paper is a case study of a successful web community, I Love Music, from its inception in 2000 through to 2005, when the author stopped running it. While I Love Music and the extended community it generated (referred to as ILX throughout) were not designed for research purposes, they have a lot to teach researchers. . This paper focuses on two areas: a generalised model of the development of unique cultures within online communities (using ILX as an example), and the specific techniques moderators on ILX used to stimulate discussion. The paper is written in the context of a recent surge in interest among researchers in the possibilities offered by web communities. Specifically, the case study of ILX offers lessons for open-ended communities -- those designed to enjoy an indefinite life span rather than set up for the duration of a specific project. Examples of open-ended communities might include those built to engage customers and fans of specific brands, as well as more general 'research panels' designed to provide agencies or businesses with insight streams. 'Insight' here is meant in its broadest sense as an item of actionable information about consumers. The specific types of insights long-term communities generate might include new ideas or concepts, new behavioural information or new hypotheses about consumer behaviour. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
11. Genre Combinations: A Window into Dynamic Communication Practices.
- Author
-
ØSTERLUND, CARSTEN
- Subjects
EMERGENCY medicine ,INFORMATION resources management ,INFORMATION resources ,ORGANIZATIONAL behavior ,GROUP decision making ,MEDICAL communication ,MEDICAL communication systems ,MEDICINE information services ,COMPUTER network resources - Abstract
The notion of a genre system typically connotes sequences of interrelated communicative genres. This paper suggests that we can find other types of relationships among genres. Data from a field study in a large emergency room illustrate how doctors, nurses, and clerical staff routinely combine document genres not only in sequences but also in various accumulations achieved through proximity and movement. The combinations of genres add flexibility to the emergency room staff's genre use and allow them to employ individual genres for several purposes. The data allow us to explore how organizational members manage the tension between a need for continuity in communicative practices and a need for flexibility in managing a jumble of paper-based and digital information systems. In addition, it demonstrates how end users often tinker with genres' media and form in the process of altering combinations among specific genres. [ABSTRACT FROM AUTHOR]
- Published
- 2007
12. Billerud Optimizes Its Bleaching Process Using Online Optimization.
- Author
-
Flisberg, Patrik, Rönnqvist, Mikael, and Nilsson, Stefan
- Subjects
ENVIRONMENTAL impact analysis ,INTELLIGENT agents ,MANUFACTURING process automation ,COMPUTER integrated manufacturing systems ,PAPER mills ,PAPER industry ,MANAGEMENT ,COMPUTER network resources - Abstract
Billerud, a Swedish company with four integrated pulp and paper mills, serves specific packaging-market segments. In 2000, the process-engineering department at Billerud's mill in Skärblacka sought to improve the mills' bleaching process. It contacted Linköping University, which collaborated with Eurocon Automation AB to develop a decision-support system, OptCab. Eurocon Automation AB now offers OptCab as a general tool in the market. Its core is an online optimization system that dynamically updates a process description and optimizes the bleaching control process. The system, which has been fully operational since 2004, has provided numerous benefits to Billerud. Chemical use has decreased by approximately 10 percent, saving approximately two million euros since its installation; the environmental impact has also been reduced; and the brightness quality of paper that the mill produces is more uniform and stable. Moreover, OptCab requires less operator time, freeing the operators for development and analysis work. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
13. Comparing approaches to elicit brand attributes both face-to-face and online.
- Author
-
Hogan, Samantha, Romaniuk, Jenni, and Faulkner, Margaret
- Subjects
BRAND image ,BRAND equity ,CONSUMER preferences ,ONLINE data processing ,PRODUCT management ,TREND analysis in business ,ACQUISITION of data ,TRADEMARK laws ,COMPUTER network resources - Abstract
Brand attributes play an important role in tracking customer-based brand equity. Therefore researchers need an effective approach for eliciting attributes. This paper has two aims: to determine which of four different techniques elicit(s) better results; and to test if online data collection is a viable alternative to face to- face collection. The techniques compared are: Zaltman Metaphor Elicitation Technique (ZMET), Free Elicitation (FE), Repertory Grid (RG) and Projective Elicitation (PE). These approaches are compared on the number and variety of attributes generated, as well as respondent evaluation. FE is the best-performing technique in a face-to-face context, generating the most attributes, evaluated positively by respondents and providing a typical distribution of attribute types. We also provide evidence that online is a viable data collection method for attribute elicitation studies, except ZMET due to respondent drop-out. Online we recommend a combination of FE and PE to obtain a range and variety of responses. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
14. A Comprehensive Reliability Analysis Framework for NTC Caches: A System to Device Approach.
- Author
-
Gebregiorgis, Anteneh, Bishnoi, Rajendra, and Tahoori, Mehdi B.
- Subjects
ENERGY consumption ,INTEGRATED circuit design ,RELIABILITY in engineering ,AGING ,SOFT errors ,CACHE memory ,COMPUTER network resources - Abstract
Near threshold computing (NTC) has significant role in reducing the energy consumption of modern very large scale integrated circuits designs. However, NTC designs suffer from functional failures and performance loss. Understanding the characteristics of the functional failures and variability effects is of decisive importance in order to mitigate them, and get the utmost NTC benefits. This paper presents a comprehensive cross-layer reliability analysis framework to assess the effect of soft error, aging, and process variation in the operation of near threshold voltage caches. The objective is to quantify the reliability of different SRAM designs, evaluate voltage scaling potential of caches, and to find a reliability-performance optimal cache organization for an NTC microprocessor. In this paper, the soft error rate (SER) and static noise margin (SNM) of 6T and 8T SRAM cells and their dependencies on aging and process variation are investigated by considering device, circuit, and architecture level analysis. Their experimental results show that in NTC, process variation and aging-induced SNM degradation is $2.5{\boldsymbol \times }$ higher than in the super threshold domain while SER is $8{\boldsymbol \times }$ higher. At NTC, the use of 8T instead of 6T SRAM cells can reduce the system-level SNM and SER by 14% and 22%, respectively. Besides, we observe that we can find the right balance between performance and reliability by using an appropriate cache organization at NTC which is different from the super threshold. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
15. System for Automated Geoscientific Analyses (SAGA) v. 2.1.4.
- Author
-
Conrad, O., Bechtel, B., Bock, M., Dietrich, H., Fischer, E., Gerlitz, L., Wehberg, J., Wichmann, V., and Böhner, J.
- Subjects
GEOGRAPHIC information systems ,EARTH sciences ,DIGITAL elevation models ,REMOTE sensing ,GRAPHICAL user interfaces ,DATA visualization ,COMPUTERS in earth sciences ,COMPUTER network resources - Abstract
The System for Automated Geoscientific Analyses (SAGA) is an open-source Geographic Information System (GIS), mainly licensed under the GNU General Public License. Since its first release in 2004, SAGA has rapidly developed from a specialized tool for digital terrain analysis to a comprehensive and globally established GIS platform for scientific analysis and modeling. SAGA is coded in C++ in an object oriented design and runs under several operating systems including Windows and Linux. Key functional features of the modular organized software architecture comprise an application programming interface for the development and implementation of new geoscientific methods, an easily approachable graphical user interface with many visualization options, a command line interpreter, and interfaces to scripting and low level programming languages like R and Python. The current version 2.1.4 offers more than 700 tools, which are implemented in dynamically loadable libraries or shared objects and represent the broad scopes of SAGA in numerous fields of geoscientific endeavor and beyond. In this paper, we inform about the system's architecture, functionality, and its current state of development and implementation. Further, we highlight the wide spectrum of scientific applications of SAGA in a review of published studies with special emphasis on the core application areas digital terrain analysis, geomorphology, soil science, climatology and meteorology, as well as remote sensing. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
16. State Papers Online: Eighteenth Century, 1714-1782; Part IV: State Papers Foreign; Scandinavia, Eastern Europe and Turkey.
- Author
-
Tench, Rob
- Subjects
HISTORY ,COMPUTER network resources - Abstract
The article reviews the Web site State Papers Online: Eighteenth Century, 1714-1782; Part IV: State Papers, Foreign, Scandinavia, Eastern Europe and Turkey, from publisher Gale Cengage, located at https://www.gale.com/c/state-papersonline-eighteenth-century-part-iv.
- Published
- 2018
17. Computer Card Games in Computer Science Education: A 10-Year Review.
- Author
-
Kordaki, Maria and Gousiou, Anthi
- Subjects
CARD games ,COMPUTER science education ,ELECTRONIC data processing ,COMPUTER simulation ,DATABASES ,COMPUTER network resources - Abstract
This paper presents a 10-year review study that focuses on the investigation of the use of computer card games (CCGs) as learning tools in Computer Science (CS) Education. Specific search terms keyed into 10 large scientific electronic databases identified 24 papers referring to the use of CCGs for the learning of CS matters during the last decade. The findings revealed that the CCGs reported by the reviewed papers were used for the learning of diverse CS issues. The motivation behind the use of the aforementioned CCGs was based on: (a) students' familiarity with the CGs at hand, so that they might focus on the construction of their simulation, (b) the fact that, the logic of CGs is suitable for the teaching of various CS concepts, and (c) CCG-play as a motivational activity to engage learners in their learning. CCGs were used in two ways: as CCG-construction context based on supportive data provided by educators, and as CCG-play educational tools. The constructivist learning approach was implied behind the design and use of most of the CCGs reported in the articles reviewed. Evaluation of some CCGs also provided positive results. [ABSTRACT FROM AUTHOR]
- Published
- 2016
18. Research in electronic publishing field: A scientometric assessment of publications output during 2005-14.
- Author
-
Dhawan, S. M., Gupta, B. M., and Gupta, Ritu
- Subjects
ELECTRONIC publishing ,SCIENTOMETRICS ,PUBLICATIONS ,COMPUTER network resources - Abstract
The paper presents an analytical study of the research output in e-publishing field on a series of scientometric indicators. As seen from Scopus database the total world output was 7010 publications published in 10 years during 2005-2014. The study found that e-publishing is still a young subject field growing at a slow pace, 3.41% CAGR growth and averaged 1.08 citations per paper. The body of research literature in this field is still in the early stage of its growth. Publication scatter in this field is still very high. The top 15 most productive organizations accounted for as small global publication share as 5.72% and as small global citation share as 12.73% during 2005-14. The average productivity rate per organization in 10 years was as low as 26.7, citation impact per paper was 2.41, h-index was 6.93 and international collaborative share as 23.44% during 2005-14. To build top research centres in e-publishing field, it is important that funding agencies at national and international level should aggressively start providing planned funding support to research organizations. [ABSTRACT FROM AUTHOR]
- Published
- 2016
19. Front Matter.
- Subjects
ASSOCIATIONS, institutions, etc. ,FINANCE ,PUBLISHING ,COMPUTER network resources ,PERIODICAL articles ,FINANCE education ,AWARDS - Abstract
This article presents information pertaining to the periodical, its parent body, the American Finance Association, and the publisher, Blackwell Publishing. Most importantly, contact information is provided along with computer network resources, information regarding potential advertisements, and a listing of articles that appear in the current issue. The article also discusses prizes awarded by the American Finance Association for research papers, including the Smith-Breeden Prizes for 2006 and the Brattle Awards for 2007.
- Published
- 2007
- Full Text
- View/download PDF
20. WikiWikiWebs: New Ways to Communicate in a Web Environment.
- Author
-
Chawner, Brenda and Lewis, Paul H.
- Subjects
WIKIS ,FORUMS ,WEBSITES ,LIBRARY automation ,INFORMATION storage & retrieval systems ,INFORMATION resources management ,INTERNET forums ,COMPUTER network resources ,INTERNET - Abstract
This paper introduces WikiWikiWeb software, also known as Wiki, for use in library and information management contexts. Wikis provide an environment for Web-based collaboration and can also be used for Web site content management. The article includes an overview of the history and development of Wiki, as well as discussing basic and advanced Wiki features. It compares three Wiki engines and describes seven case studies of real-world library and library-related Wiki applications. The paper concludes with a discussion of factors that can contribute to a successful Wiki project. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
21. The Business of Software: The Ontology of Paper.
- Author
-
Armour, Phillip G.
- Subjects
COMPUTER-aided software engineering ,SOFTWARE engineering ,COMPUTER software development software ,DEVELOPMENT of application software ,COMPUTER programmers ,COMPILERS (Computer programs) ,HISTORY ,COMPUTER network resources - Abstract
The article discusses software engineering in which software is used to develop software. Compilers convert a text form of instructions into machine instructions executable by a machine, the author states. Topics include integrated development environments (IDEs) which are mostly word processors with specific look-up processes, what the act of putting knowledge onto pieces of paper does to the knowledge itself, and computer-aided software engineering (CASE) tools used to store knowledge in a variety of formats including tables.
- Published
- 2009
- Full Text
- View/download PDF
22. Online data processing for proactive water distribution network operation.
- Author
-
Machell, J., Mounce, S. R., Farley, B., and Boxall, J. B.
- Subjects
ONLINE data processing ,WATER distribution ,WATER utility management ,QUALITY of service ,WATER supply management ,COMPUTER network resources - Abstract
Operational benefits and efficiencies generated using prevalent water industry methods and techniques are becoming more difficult to achieve; as demonstrated by English and Welsh water companies' static position with regards the economic level of leakage. Water companies are often unaware of network incidents such as burst pipes or low pressure events until they are reported by customers; and therefore use reactive strategies to manage the effects of these events. It is apparent that new approaches need to be identified and applied to promote proactive network management if potential operational productivity and standards of service improvements are to be realised. This paper describes how measured flow and pressure data from instrumentation deployed in a water distribution network was automatically gathered, checked, analysed and presented using recently developed techniques to generate apposite information about network performance. The work demonstrated that these technologies can provide early warning, and hence additional time to that previously available, thereby creating opportunity to proactively manage a network; for example to minimise the negative impact on standards of customer service caused by unplanned events such as burst pipes. Each method, applied individually, demonstrated improvement on current industry processes. Combined application resulted in further improvements; including quicker and more localised burst main location. Future possibilities are explored, from which a vision of seamless integration between such technologies emerges to enable proactive management of distribution network events. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
23. Mapping hydrological environments in central Amazonia: ground validation and surface model based on SRTM DEME data corrected for deforestation.
- Author
-
Moulatlet, G. M., Rennó, C. D., Costa, F. R. C., Emilio, T., and Schietti, J.
- Subjects
HYDROLOGICAL forecasting ,DIGITAL elevation models ,SHUTTLE Radar Topography Mission ,ENVIRONMENTAL engineering ,COMPUTER network resources - Abstract
One of the most important freely available digital elevation models (DEMs) for Amazonia is the one obtained by the Shuttle Radar Topography Mission (SRTM). However, since SRTM tends to represent the vegetation surface instead of the ground surface, the broad use of SRTM DEM as a framework for terrain description in Amazonia is hampered by the presence of deforested areas. We present here two datasets: (1) a deforestation-corrected SRTM DEM for the interfluve between the Purus and Madeira rivers, in central Amazonia, which passed through a careful identification of different environments and has deforestation features corrected by a new method of increasing pixel values of the DEM; and (2) a set of eighteen hydrological-topographic descriptors based on the corrected SRTM DEM. The hydrological-topographic description was generated by the Height Above the Nearest Drainage (HAND) algorithm, which normalizes the terrain elevation (a.s.l.) by the elevation of the nearest hydro-logically connected drainage. The validation of the HAND dataset was done by in situ hydrological description of 110 km of walking trails also available in this dataset. The new SRTM DEM expands the applicability of SRTM data for landscape modelling; and the datasets of hydrological features based on topographic modelling is undoubtedly appropriate for ecological modelling and an important contribution for environmental mapping of Amazonia. The deforestation-corrected SRTM DEM is available at http://ppbio.inpa.gov.br/knb/metacat/naman.318.3/ppbio; the polygons selected for deforestation correction are available at http://ppbio.inpa.gov.br/knb/metacat/naman.317. 3/ppbio; the set of hydrological-topographic descriptors is available at http://ppbio.inpa. gov.br/knb/metacat/naman.544.2/ppbio; and the environmental description of access trails is available at http://ppbio.inpa.gov.br/knb/metacat/naman.541.2/ppbio. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
24. The Study of Pallet Pooling Information Platform Based on Cloud Computing.
- Author
-
Li, Jia-bin, He, Shi-wei, and Yin, Wei-chuan
- Subjects
PALLETS (Shipping, storage, etc.) ,CLOUD computing ,MATERIALS handling ,SOFTWARE as a service ,INFORMATION networks ,COMPUTER network resources - Abstract
Effective implementation of pallet pooling system needs a strong information platform to support. Through the analysis of existing pallet pooling information platform (PPIP), the paper pointed out that the existing studies of PPIP are mainly based on traditional IT infrastructures and technologies which have software, hardware, resource utilization, and process restrictions. Because of the advantages of cloud computing technology like strong computing power, high flexibility, and low cost which meet the requirements of the PPIP well, this paper gave a PPIP architecture of two parts based on cloud computing: the users client and the cloud services. The cloud services include three layers, which are IaaS, PaaS, and SaaS. The method of how to deploy PPIP based on cloud computing is proposed finally. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
25. Current Working Papers.
- Subjects
INTERNET ,ECONOMIC research ,ASSOCIATIONS, institutions, etc. ,INFORMATION resources ,COMPUTER network resources - Abstract
Reports on the online availability of the working papers of the National Bureau of Economic Research in December 2003.
- Published
- 2003
26. The John Latham Archive: An Online Implementation Using Drupal.
- Author
-
Velios, Athanasios
- Subjects
ARCHIVES ,ARTISTS ,PERSONAL papers ,DIGITAL resources for archives ,COMPUTER network resources - Abstract
This article is an account of the online presentation of the personal papers of the late British artist John Latham. The John Latham Archive online follows the proposal of creative archiving and has been implemented using the Drupal content management system. The author begins with a summary of the ideas of creative archiving and explains how these depend on recent innovations of online software. The article continues by highlighting the potential of Drupal as an archiving tool for creative archiving. An example implementation of the John Latham Archive online is described by relating the cosmological ideas of the artist with practical software tools which have been used to model them. The author concludes with some remarks on the capacity of the recommended software tools for creative archiving. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
27. Using mobile devices to access the realities of youth: How identification with society influences political engagement.
- Author
-
Smith, Martin
- Subjects
YOUTH in politics ,YOUNG adults ,SMARTPHONES & society ,MOBILE apps ,SOCIAL influence ,MOTIVATION (Psychology) ,POLITICAL participation ,COMPUTER network resources - Abstract
The article presents a research paper, selected as a finalist in the 2012 "International Journal of Market Research" Young Research Writer award competition, on the topic of using mobile electronic devices to engage young people in Great Britain into identification with political and social issues. The author argues that mobile technology such as smartphones and software applications can be more effective tools in motivating young people into participating in the political process than traditional research methods such as online surveys, group discussions, or interviews. Particular focus is given to the comparison of socio-political impacts of mobile devices in youth in Great Britain with those in China and India.
- Published
- 2013
- Full Text
- View/download PDF
28. Research on Application of Artificial Intelligence in Computer Network Technology.
- Author
-
Wang, Qingjun and Lu, Peng
- Subjects
COMPUTER engineering ,ARTIFICIAL intelligence ,COMPUTER network resources ,BACK propagation ,ARTIFICIAL neural networks ,COMPUTER networks - Abstract
With the continuous expansion of the application scope of computer network technology, various malicious attacks that exist in the Internet range have caused serious harm to computer users and network resources. This paper attempts to apply artificial intelligence (AI) to computer network technology and research on the application of AI in computing network technology. Designing an intrusion detection model based on improved back propagation (BP) neural network. By studying the attack principle, analyzing the characteristics of the attack method, extracting feature data, establishing feature sets, and using the agent technology as the supporting technology, the simulation experiment is used to prove the improvement effect of the system in terms of false alarm rate, convergence speed, and false negative rate, the rate reached 86.7%. The results show that this fast algorithm reduces the training time of the network, reduces the network size, improves the classification performance, and improves the intrusion detection rate. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
29. Ultra-Fast Bloom Filters using SIMD Techniques.
- Author
-
Lu, Jianyuan, Wan, Ying, Li, Yang, Zhang, Chuwen, Dai, Huichen, Wang, Yi, Zhang, Gong, and Liu, Bin
- Subjects
INFORMATION filtering systems ,ENCODING ,NETWORK routers ,COMPUTER network resources ,MEMBERSHIP - Abstract
The network link speed is growing at an ever-increasing rate, which requires all network functions on routers/switches to keep pace. Bloom filter is a widely-used membership check data structure in networking applications. Correspondingly, it also faces the urgent demand of improving the performance in membership check speed. To this end, this paper proposes a new Bloom filter variant called Ultra-Fast Bloom Filters (UFBF), by leveraging the Single Instruction Multiple Data (SIMD) techniques. We make three improvements for UFBF to accelerate the membership check speed. First, we develop a novel hash computation algorithm which can compute multiple hash functions in parallel with the use of SIMD instructions. Second, we elaborate a Bloom filter’s bit-test process from sequential to parallel, enabling more bit-tests per unit time. Third, we improve the cache efficiency of membership check by encoding an element’s information to a small block so that it can fit into a cache-line. We further generalize UFBF, called c-UFBF, to make UFBF supporting large number of hash functions. Both theoretical analysis and extensive evaluations show that the UFBF greatly outperforms the state-of-the-art Bloom filter variants on membership check speed. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
30. Website Hosting Data and Analysis.
- Author
-
Ilgner, Petr, Komosný, Dan, and Rehman, Saeed Ur
- Subjects
WEB hosting ,PUBLIC sphere ,DATA analysis ,COMPUTER network resources ,STATISTICS - Abstract
We have collected a large dataset - more than 21 000 websites - through web-crawling the public resources of the Czech Internet. The proposed method for website hosting detection along with their geographic location and software were applied on the collected data to extend basic statistical information about the Czech websites published by the national domain registrar CZ.NIC. For analysis, we divided the data into nine categories to show differences between them, for example, between the public and private sector. The procedures used in this paper may also be applied for an extended analysis of websites in other countries, for example, for verification of fulfillment of legal directives to be implemented by public sector. [ABSTRACT FROM AUTHOR]
- Published
- 2019
31. Dynamic Resource Scheduling in Mobile Edge Cloud with Cloud Radio Access Network.
- Author
-
Wang, Xinhou, Wang, Kezhi, Wu, Song, Di, Sheng, Jin, Hai, Yang, Kun, and Ou, Shumao
- Subjects
RADIO access networks ,CLOUD computing ,CUSTOMER services ,CELL phones ,DYNAMICAL systems ,COMPUTER network resources - Abstract
Nowadays, by integrating the cloud radio access network (C-RAN) with the mobile edge cloud computing (MEC) technology, mobile service provider (MSP) can efficiently handle the increasing mobile traffic and enhance the capabilities of mobile devices. But the power consumption has become skyrocketing for MSP and it gravely affects the profit of MSP. Previous work often studied the power consumption in C-RAN and MEC separately while less work had considered the integration of C-RAN with MEC. In this paper, we present an unifying framework for the power-performance tradeoff of MSP by jointly scheduling network resources in C-RAN and computation resources in MEC to maximize the profit of MSP. To achieve this objective, we formulate the resource scheduling issue as a stochastic problem and design a new optimization framework by using an extended Lyapunov technique. Specially, because the standard Lyapunov technique critically assumes that job requests have fixed lengths and can be finished within each decision making interval, it is not suitable for the dynamic situation where the mobile job requests have variable lengths. To solve this problem, we extend the standard Lyapunov technique and design the VariedLen algorithm to make online decisions in consecutive time for job requests with variable lengths. Our proposed algorithm can reach time average profit that is close to the optimum with a diminishing gap (1/V) for the MSP while still maintaining strong system stability and low congestion. With extensive simulations based on a real world trace, we demonstrate the efficacy and optimality of our proposed algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
32. Economies of Scale and Economies of Scope in Multiproduct Financial Institutions: A Study of British Columbia Credit Unions.
- Author
-
MURRAY, JOHN D. and WHITE, ROBERT W.
- Subjects
CREDIT unions ,ECONOMIES of scale ,PRODUCTION functions (Economic theory) ,MULTIPRODUCT firms ,REGRESSION analysis ,DIVERSIFICATION in industry ,QUANTITY discounts ,TRADE regulation ,INDUSTRIAL costs ,ECONOMIC efficiency ,ECONOMICS ,COMPUTER network resources ,MANAGEMENT - Abstract
This paper investigates the production technology facing computerized credit unions in Canada. A full system of translog cost equations is estimated in order to test for economies of scale, economies of scope, and other production characteristics in a multiproduct context. The regression results indicate that most of the credit unions in our sample experience significant increasing returns to scale as they expand their level of output. There is also evidence of cost complementarity or economies of scope in their mortgage and other lending activities. As a result, legislation which limits the ability of credit unions to grow and diversify will likely raise the operating costs of this important group of financial institutions. Additional structural tests of the most general translog specification suggest that none of the restrictive production conditions commonly imposed by other researchers using Cobb-Douglas and CES specifications provide a valid representation of credit union technology. The results of many earlier studies are therefore open to question. [ABSTRACT FROM AUTHOR]
- Published
- 1983
- Full Text
- View/download PDF
33. An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme.
- Author
-
Ou, Lu, Yin, Hui, Qin, Zheng, Xiao, Sheng, Yang, Guangyi, and Hu, Yupeng
- Subjects
LOCATION-based services ,CLOUD computing ,DATA encryption software ,COMPUTER network resources ,MAPS ,RIGHT of privacy ,MANAGEMENT - Abstract
Location-based services (LBSs) are increasingly popular in today’s society. People reveal their location information to LBS providers to obtain personalized services such as map directions, restaurant recommendations, and taxi reservations. Usually, LBS providers offer user privacy protection statement to assure users that their private location information would not be given away. However, many LBSs run on third-party cloud infrastructures. It is challenging to guarantee user location privacy against curious cloud operators while still permitting users to query their own location information data. In this paper, we propose an efficient privacy-preserving cloud-based LBS query scheme for the multiuser setting. We encrypt LBS data and LBS queries with a hybrid encryption mechanism, which can efficiently implement privacy-preserving search over encrypted LBS data and is very suitable for the multiuser setting with secure and effective user enrollment and user revocation. This paper contains security analysis and performance experiments to demonstrate the privacy-preserving properties and efficiency of our proposed scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
34. Weighted Domain Transfer Extreme Learning Machine and Its Online Version for Gas Sensor Drift Compensation in E-Nose Systems.
- Author
-
Ma, Zhiyuan, Luo, Guangchun, Qin, Ke, Niu, Weina, and Wang, Nan
- Subjects
ELECTRONIC noses ,MACHINE learning ,PERFORMANCE of gas detectors ,SENSOR arrays ,COMPUTER network resources - Abstract
Machine learning approaches have been widely used to tackle the problem of sensor array drift in E-Nose systems. However, labeled data are rare in practice, which makes supervised learning methods hard to be applied. Meanwhile, current solutions require updating the analytical model in an offline manner, which hampers their uses for online scenarios. In this paper, we extended Target Domain Adaptation Extreme Learning Machine (DAELM_T) to achieve high accuracy with less labeled samples by proposing a Weighted Domain Transfer Extreme Learning Machine, which uses clustering information as prior knowledge to help select proper labeled samples and calculate sensitive matrix for weighted learning. Furthermore, we converted DAELM_T and the proposed method into their online learning versions under which scenario the labeled data are selected beforehand. Experimental results show that, for batch learning version, the proposed method uses around 20% less labeled samples while achieving approximately equivalent or better accuracy. As for the online versions, the methods maintain almost the same accuracies as their offline counterparts do, but the time cost remains around a constant value while that of offline versions grows with the number of samples. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
35. Hub of medical expertise or medicalised conveyor-belt? Sharing meanings online on the hospital birth setting.
- Author
-
Fage-Butler, Antoinette
- Subjects
CHILDBIRTH ,INTERNET forums ,HOSPITAL birthing centers ,COMPUTER network resources - Abstract
In 2014, the official risk advice in the UK regarding birth setting was altered given scientific evidence that for low-risk groups, home births are safer than hospital births. As hospital births were previously the de facto recommendation, and pregnant women in the UK now need to consider their birth setting options carefully, many go online, seeking advice about birth setting options from their peers. In this paper, I investigate how the hospital birth setting is constructed on an online forum where women seek advice on the relative merits of various birth settings, analysing posters' constructions of the hospital birth setting using Foucauldian discourse analysis. Findings reveal that the hospital birth setting is characterised either as the best and safest place to ensure safe delivery due to on-site biomedical experts and technology, or it is constructed as dehumanising, involving unnecessary intervention-related risks to mother and baby. The majority of the threads are critical of the hospital birth setting. Besides these findings, this paper contributes methodologically to the study of birth settings as it adopts a cultural approach supported by discourse analysis, illustrating the metapragmatic context within which birth setting decisions are made. As women's perspectives on the birth setting issue are in focus, findings regarding women's satisfaction with the various options are valuable for healthcare professionals who support women with birth setting decisions, as well as obstetric and maternity practitioners in the hospital setting. The extent of posters' critique of the hospital birth setting suggests the need for further research. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
36. Track Everything: Limiting Prior Knowledge in Online Multi-Object Recognition.
- Author
-
Wong, Sebastien C., Stamatescu, Victor, Kearney, David, Lee, Ivan, McDonnell, Mark D., and Gatt, Adam
- Subjects
OBJECT recognition (Computer vision) ,TRACKING algorithms ,IMAGE ,EVALUATION ,DECISION making ,COMPUTER network resources - Abstract
This paper addresses the problem of online tracking and classification of multiple objects in an image sequence. Our proposed solution is to first track all objects in the scene without relying on object-specific prior knowledge, which in other systems can take the form of hand-crafted features or user-based track initialization. We then classify the tracked objects with a fast-learning image classifier, that is based on a shallow convolutional neural network architecture and demonstrate that object recognition improves when this is combined with object state information from the tracking algorithm. We argue that by transferring the use of prior knowledge from the detection and tracking stages to the classification stage, we can design a robust, general purpose object recognition system with the ability to detect and track a variety of object types. We describe our biologically inspired implementation, which adaptively learns the shape and motion of tracked objects, and apply it to the Neovision2 Tower benchmark data set, which contains multiple object types. An experimental evaluation demonstrates that our approach is competitive with the state-of-the-art video object recognition systems that do make use of object-specific prior knowledge in detection and tracking, while providing additional practical advantages by virtue of its generality. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
37. Simulation approach for improving the computing network topology and performance of the China IHEP Data Center.
- Author
-
Nechaevskiy, Andrey, Ososkov, Gennady, Pryahina, Darya, Trofimov, Vladimir, Li, Weidong, Forti, A., Betev, L., Litmaath, M., Smirnova, O., and Hristov, P.
- Subjects
COMPUTER simulation ,COMPUTER network resources ,INFORMATION storage & retrieval systems ,WORKFLOW ,ELECTRIC network topology - Abstract
The paper describes the project intended to improve the computing network topology and performance of the China IHEP Data Center taking into account growing numbers of hosts, experiments and computing resources. The analysis of the computing performance of the IHEP Data Center in order to optimize its distributed data processing system is a really hard problem due to the great scale and complexity of shared computing and storage resources between various HEP experiments. In order to fulfil the requirements, we adopt the simulation program SyMSim that was developed at the Laboratory of Information Technologies of the Joint Institute for Nuclear Research. This simulation system is focused on improving the efficiency of the grid-cloud structures development by using the work quality indicators of some real system. SyMSim facilitates making a decision regarding required equipment and resources. The simulation uses input parameters from the data base of the IHEP computing infrastructure, besides we use some data of the BESIII experiments to indicate workflow and data flow parameters for simulation three different cases of organizing IHEP computing infrastructure. The first simulation results show that the proposed approach allows us to make an optimal choice of the network topology improving its performance and saving resources. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
38. Design and development of vulnerability management portal for DMZ admins powered by DBPowder.
- Author
-
Murakami, Tadashi, Forti, A., Betev, L., Litmaath, M., Smirnova, O., and Hristov, P.
- Subjects
INTERNET security ,COMPUTER network resources ,CLIENT/SERVER computing ,DATA security ,WEB portals - Abstract
It is difficult to promote cyber security measures in research institutes, especially in DMZ networks that allow connections from outside network. This difficulty mainly arises from two types of variety. One is the various requirements of servers operated by each research group. The other is the divergent skill level among server administrators. Unified manners rarely fit managing those servers. One of the solutions to overcome the above mentioned difficulties is vulnerability management. To overcome these challenges, There are two possible approaches. One of the options is to offer a simple and powerful vulnerability management service to the administrators of the DMZ hosts (DMZ admins). The other is to facilitate flexibility and efficiency in the development process of the service. To achieve these requirements, we designed and developed a vulnerability management portal site for DMZ admins, named DMZ User's Portal. This paper describes the design of DMZ User's Portal and the development process using a development framework, named DBPowder. Using the DMZ User's Portal, each DMZ admin can perform a vulnerability scan on his/her own servers with ease. In other words, this delegates security vulnerability discovery and responsibility to individual DMZ admins that improve security awareness for them. Then, each DMZ admin can grasp and manage the security by himself/herself. The 13-year result from vulnerability scans show that the status of security in the KEK-DMZ has been kept in good conditions. Also, we are developing DBPowder object-relational mapping (ORM) framework to improve the flexibility and efficiency in the development process of DMZ User's Portal. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
39. Improving WLCG Networks Through Monitoring and Analytics.
- Author
-
Babik, Marian, McKee, Shawn, Bockelman, Brian Paul, Fajardo Hernandez, Edgar Mauricio, Martelli, Edoardo, Vukotic, Ilija, Weitzel, Derek, Zvada, Marian, Forti, A., Betev, L., Litmaath, M., Smirnova, O., and Hristov, P.
- Subjects
COMPUTER network resources ,NETWORK operating system ,ACQUISITION of data ,TRAFFIC congestion ,TRAFFIC monitoring - Abstract
WLCG relies on the network as a critical part of its infrastructure and therefore needs to guarantee effective network usage and prompt detection and resolution of any network issues, including connection failures, congestion and traffic routing. OSG Networking Area in partnership with WLCG has focused on collecting, storing and making available all the network related metrics for further analysis and discovery of issues that might impact network performance and operations. In order to help sites and experiments better understand and fix the networking issues, WLCG Network Throughput working group was formed, which works on the analysis and integration of the network-related monitoring data collected by the OSG/WLCG infrastructure and operates a support unit to help find and fix the network performance issues. This paper describes the current state of the OSG network measurement platform and summarises the activities taken by the working group, including updates on the higher level services that were recently developed, network performance incidents investigated as well as past and present analytical activities related to networking and their results. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
40. The Global Packing Number of a Fat-Tree Network.
- Author
-
Lo, Yuan-Hsun, Zhang, Yijin, Chen, Yi, Fu, Hung-Lin, and Wong, Wing Shing
- Subjects
COMPUTER network resources ,DATA structures ,ROUTING (Computer network management) ,DATA libraries ,TREE graphs - Abstract
Data centers play an important role in today’s Internet development. Research to find scalable architecture and efficient routing algorithms for data center networks has gained popularity. The fat-tree architecture, which is essentially a folded version of a Clos network, has proved to be readily implementable and is scalable. In this paper, we investigate routing on a fat-tree network by deriving its global packing number and by presenting explicit algorithms for the construction of optimal, load-balanced routing solutions. Consider an optical network that employs wavelength division multiplexing in which every user node sets up a connection with every other user node. The global packing number is basically the number of wavelengths required by the network to support such a traffic load, under the restriction that each source-to-destination connection is assigned a wavelength that remains constant in the network. In mathematical terms, consider a bidirectional, simple graph, G and let N\subseteq V(G) be a set of nodes. A path system \mathcal P of G with respect to N consists of |N|(|N|-1) directed paths, one path to connect each of the source-destination node pairs in N . The global packing number of a path system , denoted by \Phi (G,N,\mathcal {P}) , is the minimum integer k to guarantee the existence of a mapping \phi :\mathcal P\to \1,2,\ldots, k\ , such that \phi (P)\neq \phi (\widehat P) if P and \widehat {P} have common arc(s). The global packing number of (G,N) , denoted by \Phi (G,N) , is defined to be the minimum \Phi (G,N,\mathcal {P}) among all possible path systems \mathcal {P} . In additional to wavelength division optical networks, this number also carries significance for networks employing time division multiple access. In this paper, we compute by explicit route construction the global packing number of (\text Tn,N) , where Tn denotes the topology of the n -ary fat-tree network, and $N$ is considered to be the set of all edge switches or the set of all supported hosts. We show that the constructed routes are load-balanced and require minimal link capacity at all network links. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
41. IGAPS: A Taxonomy and Facet Classification System.
- Author
-
Pell, John and Huppuch, Meghan
- Subjects
TAXONOMY ,INFORMATION resources management ,INDEXING ,INFORMATION science ,BIOINFORMATICS ,COMPUTER network resources - Abstract
This paper describes an assessment of the information management practices at International Planned Parenthood Federation/Western Hemisphere Region and the development and implementation of an information management pilot for that organization. The pilot included the development of a taxonomy to classify the organization's documents, training in basic citation practices, and a decentralized model for building an organized library of documents within the citation management software Mendeley. The authors discuss the pilot's taxonomy within the context of literature on taxonomy development and offers strategic recommendations for improving the information management practices of not-for-profit organizations that lack dedicated information management staff. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
42. Synchronization of Generalized Using to Image Encryption.
- Author
-
Li, Guodong, Yang, Bing, Pu, Yue, and Xu, Wenxia
- Subjects
IMAGE transmission ,IMAGE encryption ,SYNCHRONIZATION ,DIGITAL image processing ,CELLULAR neural networks (Computer science) ,CHAOS theory ,COMPUTER network resources - Abstract
The problem of the secure transmission of digital image has paid more and more attention to the network and this paper designs a special image encryption scheme. Image encryption scheme is designed based on the hyper chaos of generalized five-order Henon mapping and five-order cellular neural network (CNN) system. Firstly, the chaotic sequence , which is regarded as the initial conditions of CNN system, is generated by the five-order generalized Henon mapping. Then another chaotic sequence is produced by the CNN system. At last, the cipher image is generated by the transformation of random sequence and the original image. Toward the end, the paper makes the simulation experiment and draws a conclusion that the algorithm of image encryption has strong attack resistance, good safety, and suitable to spread in the network through analyzing the statistical characteristics of the image information entropy, correlation and histogram as well as the key space and the sensitivity. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
43. Facilitating Scientometrics in Learning Analytics and Educational Data Mining – the LAK Dataset.
- Author
-
Dietze, Stefan, Taibi, Davide, and d'Aquin, Mathieu
- Subjects
LEARNING ,DATA acquisition systems ,LINKED data (Semantic Web) ,COMPUTER network resources - Abstract
The Learning Analytics and Knowledge (LAK) Dataset represents an unprecedented corpus which exposes a near complete collection of bibliographic resources for a specific research discipline, namely the connected areas of Learning Analytics and Educational Data Mining. Covering over five years of scientific literature from the most relevant conferences and journals, the dataset provides Linked Data about bibliographic metadata as well as full text of the paper body. The latter was enabled through special licensing agreements with ACM for publications not yet available through open access. The dataset has been designed following established Linked Data pattern, reusing established vocabularies and providing links to established schemas and entity coreferences in related datasets. Given the temporal and topic coverage of the dataset, being a near-complete corpus of research publications of a particular discipline, it facilitates scientometric investigations, for instance, about the evolution of a scientific field over time, or correlations with other disciplines, what is documented through its usage in a wide range of scientific studies and applications. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
44. All Roads Lead to Computing: Making, Participatory Simulations, and Social Computing as Pathways to Computer Science.
- Author
-
Brady, Corey, Orton, Kai, Weintrop, David, Anton, Gabriella, Rodriguez, Sebastian, and Wilensky, Uri
- Subjects
COMPUTER science ,SOCIAL computing ,COMPUTER simulation ,COMPUTER programming ,STUDENT-centered learning ,HARDWARE ,COMPUTER network resources - Abstract
Computer science (CS) is becoming an increasingly diverse domain. This paper reports on an initiative designed to introduce underrepresented populations to computing using an eclectic, multifaceted approach. As part of a yearlong computing course, students engage in Maker activities, participatory simulations, and computing projects that foreground the social and collaborative aspects of CS. Collectively, these activities are designed to introduce learners to the growing diversity of what CS looks like in the 21st century. This paper lays out the practical and theoretical motivations for the Computational Thinking for Girls (CT4G) project, specifically highlighting the use of Making through physical and social computing as ways to engage students in CS. A snapshot of one activity from the program is provided—Wearing the Web—in which students use open-hardware programmable badges to explore the underlying structure and technology that enables the Internet. Data from the first year of the CT4G program are presented to show the positive effects that this diverse introduction to CS is having on the students with respect to their attitudes toward CS. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
45. Tagging: An Organization Scheme for the Internet.
- Author
-
Visser, Marijke A.
- Subjects
TAGS (Metadata) ,COMPUTER network resources ,INFORMATION technology ,WEB 2.0 ,INFORMATION resources management ,INTERNET access for library users - Abstract
How should the information on the Internet be organized? This question and the possible solutions spark debates among people concerned with how we identify, classify, and retrieve Internet content. This paper discusses the benefits and the controversies of using a tagging system to organize Internet resources. Tagging refers to a classification system where individual Internet users apply labels, or tags, to digital resources. Tagging increased in popularity with the advent of Web 2.0 applications that encourage interaction among users. As more information is available digitally, the challenge to find an organizational system scalable to the Internet will continue to require forward thinking. Trained to ensure access to a range of informational resources, librarians need to be concerned with access to Internet content. Librarians can play a pivotal role by advocating for a system that supports the user at the moment of need. Tagging may just be the necessary system. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
46. On the Bias of Traceroute Sampling: or, Power-Law Degree Distributions in Regular Graphs.
- Author
-
ACHLIOPTAS, DIMITRIS, CLAUSET, AARON, KEMPE, DAVID, and MOORE, CRISTOPHER
- Subjects
GRAPH theory ,TREE graphs ,COMPUTER network architectures ,COMPUTER algorithms ,GRAPH algorithms ,COMPUTERS in graph theory ,INTERNET protocols ,COMPUTER network resources ,INTERNET software - Abstract
Understanding the graph structure of the Internet is a crucial step for building accurate network models and designing efficient algorithms for Internet applications. Yet, obtaining this graph structure can be a surprisingly difficult task, as edges cannot be explicitly queried. For instance, empirical studies of the network of Internet Protocol (IP) addresses typically rely on indirect methods like traceroute to build what are approximately single-source, all-destinations, shortest-path trees. These trees only sample a fraction of the network's edges, and a paper by Lakhina et al. [2003] found empirically that the resulting sample is intrinsically biased. Further, in simulations, they observed that the degree distribution under traceroute sampling exhibits a power law even when the underlying degree distribution is Poisson. In this article, we study the bias of traceroute sampling mathematically and, for a very general class of underlying degree distributions, explicitly calculate the distribution that will be observed. As example applications of our machinery, we prove that traceroute sampling finds power-law degree distributions in both d-regular and Poisson-distributed random graphs. Thus, our work puts the observations of Lakhina et al. on a rigorous footing, and extends them to nearly arbitrary degree distributions. [ABSTRACT FROM AUTHOR]
- Published
- 2009
47. Academic Web Site Design and Academic Templates: Where Does the Library Fit In?
- Author
-
Peterson, Kate
- Subjects
WEB development ,LIBRARIES ,SCHOLARLY websites ,UNIVERSITIES & colleges ,LIBRARY websites ,CONFERENCES & conventions ,WEB design ,COMPUTER network resources ,ELECTRONIC information resources - Abstract
Academic Web site design continues to evolve as colleges and universities are under increasing pressure to create a Web site that is both hip and professional looking. Many colleges and universities are using templates to unify the look and feel of their Web sites. Where does the library Web site fit into a comprehensive campus design scheme? The library Web site is unique due to the wide range of services and content available. Based on a poster session presented at the Twelfth Annual Association of College and Research Libraries conference in Minneapolis, Minnesota, April 2005, this paper explores the prevalence of university-wide academic templates on library Web sites and discusses factors libraries should consider in the future. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
48. The State of RFID Applications in Libraries.
- Author
-
Singh, Jay, Brar, Navjit, and Fong, Carmen
- Subjects
LIBRARY automation ,INFORMATION storage & retrieval systems ,RADIO frequency identification systems ,IDENTIFICATION equipment ,INVENTORY control ,AUTOMATIC identification ,INTERNET forums ,COMPUTER network resources ,LIBRARY inventories - Abstract
The adoption of Radio Frequency Identification (RFID) technology by libraries promises a solution that could make it possible to inventory hundreds of thousands of items in their collections in days instead of months. In addition, it would allow patrons to check out and return library property automatically at any time of the day. Besides speeding up checkouts, keeping collections in better order, and alleviating repetitive strain injuries among librarians, RFID promises to provide a better control on theft, nonreturns, and misfiling of a library's assets. With an estimated 35 million library items tagged worldwide in more than three hundred libraries, this technology is generating ever-increasing interest. In October and November 2004, the industrial technology department and the Robert E. Kennedy Library at Cal Poly State University, San Luis Obispo, surveyed participating libraries, RFID electronic discussion groups, and Library and Information Technology Association (LITA-L) electronic discussion group subscribers to collect information with regards to the implementation of RFID systems in libraries. Opinions were gathered regarding such topics, actual or estimated, as RFID implementation costs and time; the impact of the technology on operations such as handling of volumes and security; and RFID system eatures adopted such as conversion stations, self-checkout units, and security systems. Information on the various RFID library components and the results from the survey are presented in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
49. Professionalization in Action: Accountants' Attempt at Building a Network of Support for the WebTrust Seal of Assurance.
- Author
-
Gendron, Yves and Barrett, Michael
- Subjects
ACCOUNTING ,ELECTRONIC commerce ,PROFESSIONALIZATION ,BUSINESS enterprises ,QUALITY assurance ,MARKET positioning ,COMPUTER network resources - Abstract
This paper examines the attempts by the North American accounting institutes to develop a new market in e-commerce assurance based on their claims to professional expertise through the WebTrust project. Employing actor-network theory in an in-depth longitudinal field study, we investigate how WebTrust was originally developed and promoted as a seal of business-to-consumer assurance, which largely failed to generate support in the market- place. Proponents were subsequently able to generate more interest in the eyes of managers of online organizations by reshaping WebTrust as a flexible set of principles and criteria for systems advice and business-to-business assurance. Our analysis suggests that attempts to expand the accounting profession's domain of expertise reflect a trial-and-error process where the outcome achieved may be far from the vision that motivated the institutes into undertaking the project in the first place. We further show that the initial network of support for such projects can be quite fragile and dynamic as various actors reposition themselves around the shifting meanings attributed to the project. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
50. Research Dissemination and Impact: Evidence from Web Site Downloads.
- Author
-
Pinkowitz, Lee
- Subjects
WEBSITES ,FINANCE ,SELECTIVE dissemination of information ,RESEARCH ,PUBLISHED articles ,COMPUTER network resources - Abstract
The 'Journal of Finance' Web site disseminates research expediently to a broad audience. Papers were downloaded 284,170 times from November 1997 to November 1999. The average paper receives 85 downloads per month and is available 10 months before publication. Articles are downloaded more than shorter papers. Lead articles are downloaded more than other articles because they are of greater interest, and they receive an endorsement as the lead. Downloads are positively correlated with citations and may be a useful measure of research impact. Finally, placing forthcoming articles online does not adversely affect subscriptions and may increase the SSCI impact factor. [ABSTRACT FROM AUTHOR]
- Published
- 2002
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.