20,067 research outputs found

    An evaluation of the potential for implementing adaptive co-management in the Waodani social-ecological system in the Ecuadorian Amazon

    Get PDF
    Adaptive co-management (ACM), one of the most prominent management approaches to emerge in the recent years, combines iterative learning, flexibility, and adaptation promoted by adaptive management with the principles of nurturing diversity and fostering collaboration among different partners that underpin co-management philosophy. ACM has been proposed as an approach to address the deficiencies of centralized management in ensuring sustainability of social-ecological systems (SESs) in face of future uncertainties. This thesis aims to evaluate the readiness of resource users (the Waodani) as well as external actors (the Ecuadorian State and NGOs) for future implementation of ACM and thus enhancing the long-term social-ecological sustainability of the Waodani SES located in the Yasuni Biosphere Reserve in the Ecuadorian Amazon. Qualitative data obtained by means of focus groups with the Waodani and individual interviews with external actors and Waodani leaders revealed different levels of readiness for ACM. Firstly, in the case of the Waodani, the insufficient fulfillment of some conditions required for successful ACM as well as intercommunity differences in regards to these conditions can complicate the implementation of ACM, unless sufficient external assistance is offered to the SES. The analysis of NGOs demonstrated, on the other hand, a relative readiness for ACM, providing that such aspects as sufficient funding, long-term commitment to collaboration, and inter-institutional linkages are strengthened. The study also found that the Ecuadorian government’s potential to contribute to ACM is hindered by the lack of readiness to work with the indigenous society as well as by funding and communication challenges. Furthermore, the resource based economy supported by the State limits the scope of innovation and adaptation. Still, as in the case of other actors, overcoming the challenges and transitioning towards adaptive governance and thus ACM could be possible in the long-term, if recent legal and political changes are truly implemented

    Current Challenges and Visions in Music Recommender Systems Research

    Full text link
    Music recommender systems (MRS) have experienced a boom in recent years, thanks to the emergence and success of online streaming services, which nowadays make available almost all music in the world at the user's fingertip. While today's MRS considerably help users to find interesting music in these huge catalogs, MRS research is still facing substantial challenges. In particular when it comes to build, incorporate, and evaluate recommendation strategies that integrate information beyond simple user--item interactions or content-based descriptors, but dig deep into the very essence of listener needs, preferences, and intentions, MRS research becomes a big endeavor and related publications quite sparse. The purpose of this trends and survey article is twofold. We first identify and shed light on what we believe are the most pressing challenges MRS research is facing, from both academic and industry perspectives. We review the state of the art towards solving these challenges and discuss its limitations. Second, we detail possible future directions and visions we contemplate for the further evolution of the field. The article should therefore serve two purposes: giving the interested reader an overview of current challenges in MRS research and providing guidance for young researchers by identifying interesting, yet under-researched, directions in the field

    Tiresias: Predicting Security Events Through Deep Learning

    Full text link
    With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack. However this is still an open research problem, and previous research in predicting malicious events only looked at binary outcomes (e.g., whether an attack would happen or not), but not at the specific steps that an attacker would undertake. To fill this gap we present Tiresias, a system that leverages Recurrent Neural Networks (RNNs) to predict future events on a machine, based on previous observations. We test Tiresias on a dataset of 3.4 billion security events collected from a commercial intrusion prevention system, and show that our approach is effective in predicting the next event that will occur on a machine with a precision of up to 0.93. We also show that the models learned by Tiresias are reasonably stable over time, and provide a mechanism that can identify sudden drops in precision and trigger a retraining of the system. Finally, we show that the long-term memory typical of RNNs is key in performing event prediction, rendering simpler methods not up to the task

    Dealing with Data Challenges when Delivering Data-Intensive Software Solutions

    Full text link
    The predicted increase in demand for data-intensive solution development is driving the need for software, data, and domain experts to effectively collaborate in multi-disciplinary data-intensive software teams (MDSTs). We conducted a socio-technical grounded theory study through interviews with 24 practitioners in MDSTs to better understand the challenges these teams face when delivering data-intensive software solutions. The interviews provided perspectives across different types of roles including domain, data and software experts, and covered different organisational levels from team members, team managers to executive leaders. We found that the key concern for these teams is dealing with data-related challenges. In this paper, we present the theory of dealing with data challenges that explains the challenges faced by MDSTs including gaining access to data, aligning data, understanding data, and resolving data quality issues; the context in and condition under which these challenges occur, the causes that lead to the challenges, and the related consequences such as having to conduct remediation activities, inability to achieve expected outcomes and lack of trust in the delivered solutions. We also identified contingencies or strategies applied to address the challenges including high-level strategic approaches such as implementing data governance, implementing new tools and techniques such as data quality visualisation and monitoring tools, as well as building stronger teams by focusing on people dynamics, communication skill development and cross-skilling. Our findings have direct implications for practitioners and researchers to better understand the landscape of data challenges and how to deal with them.Comment: Submitted to IEEE Transactions on Software Engineering, 22 pages, 4 Figures, 1 Tabl

    Grand Challenges of Traceability: The Next Ten Years

    Full text link
    In 2007, the software and systems traceability community met at the first Natural Bridge symposium on the Grand Challenges of Traceability to establish and address research goals for achieving effective, trustworthy, and ubiquitous traceability. Ten years later, in 2017, the community came together to evaluate a decade of progress towards achieving these goals. These proceedings document some of that progress. They include a series of short position papers, representing current work in the community organized across four process axes of traceability practice. The sessions covered topics from Trace Strategizing, Trace Link Creation and Evolution, Trace Link Usage, real-world applications of Traceability, and Traceability Datasets and benchmarks. Two breakout groups focused on the importance of creating and sharing traceability datasets within the research community, and discussed challenges related to the adoption of tracing techniques in industrial practice. Members of the research community are engaged in many active, ongoing, and impactful research projects. Our hope is that ten years from now we will be able to look back at a productive decade of research and claim that we have achieved the overarching Grand Challenge of Traceability, which seeks for traceability to be always present, built into the engineering process, and for it to have "effectively disappeared without a trace". We hope that others will see the potential that traceability has for empowering software and systems engineers to develop higher-quality products at increasing levels of complexity and scale, and that they will join the active community of Software and Systems traceability researchers as we move forward into the next decade of research
    corecore