1,162 research outputs found
Using Magic in Computing Education and Outreach
This special session explores the use of magic tricks based on computer science ideas; magic tricks help grab students\u27 attention and can motivate them to invest more deeply in underlying CS concepts. Error detection ideas long used by computer scientists provide a particularly rich basis for working such magic\u27\u27, with a CS Unplugged parity check activity being a notable example. Prior work has shown that one can perform much more sophisticated tricks than the relatively well-known CS Unplugged activity, and these tricks can motivate analyses across a wide variety of computer science concepts and are relevant to learning objectives across grade levels from 2nd grade through graduate school. These tricks have piqued the interest of past audiences and have been performed with the aid of online implementations; this conference session will demonstrate enhanced implementations used to illuminate the underlying concepts rather than just to perform the tricks. The audience will participate in puzzling out how to apply relevant concepts as we work through a scaffolded series of tricks centering on error detection and correction. The implementations also provide a useful model for incorporating greater interaction than is typically found in current innovative online interactive textbooks. In addition, they are samples for possible programming assignments that can motivate students using CS Unplugged activities to actively pursue deep programming experiences
Educational Magic Tricks Based on Error-Detection Schemes
Magic tricks based on computer science concepts help grab student attention and can motivate them to delve more deeply. Error detection ideas long used by computer scientists provide a rich basis for working magic; probably the most well known trick of this type is one included in the CS Unplugged activities. This paper shows that much more powerful variations of the trick can be performed, some in an unplugged environment and some with computer assistance. Some of the tricks also show off additional concepts in computer science and discrete mathematics
Conjuring cognition : A review of educational magic-based interventions
For hundreds of years, magic tricks have been employed within a variety of pedagogic contexts, including promoting science and mathematics, delivering educational messaging, enhancing scepticism about the paranormal, and boosting creative thinking for product design. This review examines this diverse body of work, focusing on studies that have assessed the impact of such interventions. Although the studies tended to yield positive outcomes, much of the work suffered from methodological shortcomings, including measuring the impact of interventions over a relatively short period of time, focusing on self-report measures and failing to employ control groups. The paper makes several recommendations for future study in the area, including assessing the longer-term impact of magic-based interventions, comparing these interventions to other types of pedagogic techniques, focussing on knowledge retention and behavioural outcomes, and collaborating with magicians to develop more impactful interventions.Peer reviewedFinal Published versio
Cloud Computing, Virtual Law Firms, and the Legal Profession
What does the future hold for cloud computing, virtual law firms, and the legal profession? Like so many answers in the legal field, it depends. The increasing costs of storing ever-increasing amounts of information may force firms to turn to housing data off-site through cloud-based services. New technologies, yet unforeseen, may render the cloud obsolete, replaced by a new form of caching materials. Virtual law firms may be looked back at five years from now as an obsolete fad, or the practice might instead become the new normal. Wherever the legal profession ventures, lawyers must do a better job of remaining attuned to technological developments that not only directly impact their practice, but also to those advances which can be adapted to a legal context to improve upon client service. In the end, lawyers must be competent advocates, and in the 21st century, ignoring technology seriously infringes upon that responsibility
Recommended from our members
Interactive Style Transfer for Data Visualization and Data Art
This thesis discusses Data Brushes, an interactive web application to explore neural style transfer using models trained on artistic data visualizations. The application invites casual creators to engage with deep convolutional neural networks to co-create custom artworks with a focus on style transfer networks created from canonical and contemporary works of data visualization and data art to demonstrate the versatility and flexibility of the algorithm. In addition to enabling a novel creative workflow, the process of interactively modifying an image via multiple style transfer networks reveals meaningful features encoded within the networks, and provides insight into the effects particular networks have on different images, or different regions within a single image. To evaluate Data Brushes, we gathered expert feedback from participants of a data science symposium and ran an observational study, finding that our application facilitates the creative exploration of neural style transfer for data art and enhances user intuition regarding the expressive range of style transfer features. This thesis explores both the practical uses of such tools for artists as Data Brushes and the interpretive uses of creating such venues for accessibility to computational art, remixing the purpose of data visualizations to be more than just graphical representations of information
To Be Totally Free: Galina Ustvolskaya, Sofia Gubaidulina, and the Pursuit of Spiritual Freedom in the Soviet Union
As women composers in the Soviet Union, Sofia Gubaidulina and Galina Ustvolskaya occupy a unique niche in twentieth-century music history. A lack of access to the technical training required to develop compositional skills is often cited as a primary reason women composers struggled to reach the same prominence as their male colleagues. Living in an ostensibly egalitarian society, Gubaidulina and Ustvolskaya were treated as equal to their male counterparts and given greater access to education than many women in the West. This increased access to musical education represents an unprecedented experiment in classical music history. Both Gubaidulina and Ustvolskaya developed compositional styles which are neither traditional nor avant-garde, but strikingly unique. In the face of a regime which sought to limit their artistic expression, these women found freedom and independence in their music
Washington University Record, November 12, 2009
https://digitalcommons.wustl.edu/record/2194/thumbnail.jp
Performance Evaluation of Serverless Applications and Infrastructures
Context. Cloud computing has become the de facto standard for deploying modern web-based software systems, which makes its performance crucial to the efficient functioning of many applications. However, the unabated growth of established cloud services, such as Infrastructure-as-a-Service (IaaS), and the emergence of new serverless services, such as Function-as-a-Service (FaaS), has led to an unprecedented diversity of cloud services with different performance characteristics. Measuring these characteristics is difficult in dynamic cloud environments due to performance variability in large-scale distributed systems with limited observability.Objective. This thesis aims to enable reproducible performance evaluation of serverless applications and their underlying cloud infrastructure.Method. A combination of literature review and empirical research established a consolidated view on serverless applications and their performance. New solutions were developed through engineering research and used to conduct performance benchmarking field experiments in cloud environments.Findings. The review of 112 FaaS performance studies from academic and industrial sources found a strong focus on a single cloud platform using artificial micro-benchmarks and discovered that most studies do not follow reproducibility principles on cloud experimentation. Characterizing 89 serverless applications revealed that they are most commonly used for short-running tasks with low data volume and bursty workloads. A novel trace-based serverless application benchmark shows that external service calls often dominate the median end-to-end latency and cause long tail latency. The latency breakdown analysis further identifies performance challenges of serverless applications, such as long delays through asynchronous function triggers, substantial runtime initialization for coldstarts, increased performance variability under bursty workloads, and heavily provider-dependent performance characteristics. The evaluation of different cloud benchmarking methodologies has shown that only selected micro-benchmarks are suitable for estimating application performance, performance variability depends on the resource type, and batch testing on the same instance with repetitions should be used for reliable performance testing.Conclusions. The insights of this thesis can guide practitioners in building performance-optimized serverless applications and researchers in reproducibly evaluating cloud performance using suitable execution methodologies and different benchmark types
- …