5,660 research outputs found

    PIWeCS: enhancing human/machine agency in an interactive composition system

    Get PDF
    This paper focuses on the infrastructure and aesthetic approach used in PIWeCS: a Public Space Interactive Web-based Composition System. The concern was to increase the sense of dialogue between human and machine agency in an interactive work by adapting Paine's (2002) notion of a conversational model of interaction as a ‘complex system’. The machine implementation of PIWeCS is achieved through integrating intelligent agent programming with MAX/MSP. Human input is through a web infrastructure. The conversation is initiated and continued by participants through arrangements and composition based on short performed samples of traditional New Zealand Maori instruments. The system allows the extension of a composition through the electroacoustic manipulation of the source material

    Deep Reinforcement Learning for Resource Management in Network Slicing

    Full text link
    Network slicing is born as an emerging business to operators, by allowing them to sell the customized slices to various tenants at different prices. In order to provide better-performing and cost-efficient services, network slicing involves challenging technical issues and urgently looks forward to intelligent innovations to make the resource management consistent with users' activities per slice. In that regard, deep reinforcement learning (DRL), which focuses on how to interact with the environment by trying alternative actions and reinforcing the tendency actions producing more rewarding consequences, is assumed to be a promising solution. In this paper, after briefly reviewing the fundamental concepts of DRL, we investigate the application of DRL in solving some typical resource management for network slicing scenarios, which include radio resource slicing and priority-based core network slicing, and demonstrate the advantage of DRL over several competing schemes through extensive simulations. Finally, we also discuss the possible challenges to apply DRL in network slicing from a general perspective.Comment: The manuscript has been accepted by IEEE Access in Nov. 201

    Privacy, Ideology, and Technology: A Response to Jeffrey Rosen

    Get PDF
    This essay reviews Jeffrey Rosen’s The Unwanted Gaze: The Destruction of Privacy in America (2000). Rosen offers a compelling (and often hair-raising) account of the pervasive dissolution of the boundary between public and private information. This dissolution is both legal and social; neither the law nor any other social institution seems to recognize many limits on the sorts of information that can be subjected to public scrutiny. The book also provides a rich, evocative characterization of the dignitary harms caused by privacy invasion. Rosen’s description of the sheer unfairness of being “judged out of context” rings instantly true. Privacy, Rosen concludes, is indispensable to human well-being and is at risk of being destroyed unless we act fast. The book is far less convincing, however, when it moves beyond description and attempts to identify the causes of the destruction of privacy and propose solutions. Why is privacy under siege today? The incidents that Rosen chooses as illustrations both reveal and obscure. From Monica Lewinsky’s unsent, deleted e-mails to the private online activities of corporate employees and the Dean of the Harvard Divinity School, the examples offer a rich stew of technology, corporate mind control, public scapegoating, and political intrigue. But for the most part, Rosen seems to think that it is sex that is primarily to blame for these developments—though how, exactly, Rosen cannot seem to decide. He suggests, variously, that we seek private information out of prurient fascination with other people’s intimate behavior, or to enforce upon others authoritarian notions of “correct” interpersonal behavior, or to inform moral judgments about others based on a hasty and ill-conceived equivalence between the personal and the political. Or perhaps Rosen is simply upset about the loss of privacy for a specific sort of (sexual or intimate) behavior, whatever the origin of society’s impulse to pry. Yet there are puzzling anomalies in Rosen’s account. Most notably, appended to Rosen’s excavation of recent sex-related privacy invasions is a chapter on privacy in cyberspace. This chapter sits uneasily in relation to the rest of the book. Its focus is not confined to sex-related privacy, and Rosen does not explain how the more varied information-gathering activities chronicled there bear on his earlier analysis. Rosen acknowledges as much and offers, instead, the explanation that intimate privacy and cyberspace privacy are simply two examples of the same problem: the risk of being judged out of context in a world of short attention spans, and the harms to dignity that follow. This explanation seems far too simple, and more than a bit circular. Why this rush to judge others out of context? Necessity is one answer—if attention spans are limited, we cannot avoid making decisions based on incomplete information—but where does the necessity to judge come from? And what do computers and digital networking technologies—factors that recur not only in the chapter on cyberspace privacy, but also in most of Rosen’s other examples—have to do with it? This Review Essay argues, first, that the use of personal information to sort and classify individuals is inextricably bound up with the fabric of our political economy. As Part II explains, the unfettered use of “true” information to predict risk and minimize uncertainty is a hallmark of the liberal state and its constituent economic and political markets. Not sex, but money, and more broadly an ideology about the predictive power of isolated facts, generate the perceived necessity to judge individuals based on incomplete profiles. The harms of this rush to judgment—harms not only to dignity, but also to economic welfare and more fundamentally to individual autonomy—may undermine liberal individualism (as Rosen argues), but they are products of it as well. Part III argues, further, that the problem of vanishing informational privacy in digital networked environments is not sui generis, but rather is central to understanding the destruction of privacy more generally. This is not simply because new technologies reduce the costs of collecting, exchanging, and processing the traditional sorts of consumer information. The profit-driven search for personal information via digital networks is also catalyzing an erosion of the privacy that individuals have customarily enjoyed in their homes, their private papers, and even their thoughts. This process is transforming not only the way we experience privacy, but also the way we understand it. Privacy is becoming not only harder to protect, but also harder to justify protecting. Part IV concludes that shifting these mutually reinforcing ideological and technological vectors will require more drastic intervention than Rosen suggests

    Drone Surveillance: The FAA’s Obligation to Respond to the Privacy Risks

    Get PDF

    Privacy Recommendations for Future Distributed Control Systems

    Get PDF
    As the role of privacy becomes more established in research, new questions and implementations trickle into the Distributed Control Systems (DCS) space focusing on privacy-preserving tools. In the near future, standards will have to include measures to protect the privacy of various objects, people, and systems in DCS plants. Building a privacy framework capable of meeting the needs of DCS applications and compatible with current standards to protect against intellectual theft and sabotage is the primary aspect for DCS. By identifying the lack of privacy protections in the current standards, detailing requirements for the privacy, and proposing suitable technologies we can provide guidelines for the next set of standards for DCS protections

    Location linked information

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2003.Pages 98 and 99 blank.Includes bibliographical references (p. 75-81).This work builds an infrastructure called Location Linked Information that offers a means to associate digital information with public, physical places. This connection creates a hybrid virtual/physical space, called glean space, that is owned, managed, and rated by the public, for the benefit of the populace. Initially embodied by an interactive, dynamic map viewed on a handheld computer, the system provides two functions for its urban users: 1) the retrieval of information about their surroundings, and 2) the optional annotation of location for communal benefit. Having the ability to link physical location with arbitrary information is an essential function to building immersive information environments and the smart city. Public computing systems such as Location Linked Information will enhance the urban experience, just as access to transportation dramatically altered the sensation and form of the city.by Matthew William David Mankins.S.M

    "Hey Model!" -- Natural User Interactions and Agency in Accessible Interactive 3D Models

    Full text link
    While developments in 3D printing have opened up opportunities for improved access to graphical information for people who are blind or have low vision (BLV), they can provide only limited detailed and contextual information. Interactive 3D printed models (I3Ms) that provide audio labels and/or a conversational agent interface potentially overcome this limitation. We conducted a Wizard-of-Oz exploratory study to uncover the multi-modal interaction techniques that BLV people would like to use when exploring I3Ms, and investigated their attitudes towards different levels of model agency. These findings informed the creation of an I3M prototype of the solar system. A second user study with this model revealed a hierarchy of interaction, with BLV users preferring tactile exploration, followed by touch gestures to trigger audio labels, and then natural language to fill in knowledge gaps and confirm understanding.Comment: Paper presented at ACM CHI 2020: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, New York, April 2020; Replacement: typos correcte

    Intercultural communication in business ventures illustrated by two case studies

    Get PDF
    The information and communications revolution has hastened the process of globalization in today's world of business. Consequently, businesses, even small and mid-sized companies, are confronted with cultural diversity when these companies become internationally active. Yet only few businesses are well prepared for a culturally diverse global market. Indeed, many business ventures fail not for a want of superior products and/or services, but due to a lack of intercultural competence. Disregarding the cultural component in a business transaction can and will lead to mistakes due to cultural misunderstandings which are the result of miscommunication. Because not much intercultural research exists for German American business ventures, this paper focuses on two German corporations, Buderus and Bayer, who are actively engaged on the American market to determine how they are coping with the cultural differences and measures they have adopted to surmount the cultural gap. -- Die Informations- und Kommunikationsrevolution hat den Globalisierungsprozess in der heutigen GeschĂ€ftswelt beschleunigt. Folglich werden Unternehmen, sogar kleine und mittelstĂ€ndische Unternehmen, plötzlich mit einer grĂ¶ĂŸeren kulturellen Verschiedenheit beim Verkauf ihrer Produkte und Dienstleistungen im Ausland konfrontiert. Bislang sind nur wenige Unternehmen gut vorbereitet auf diesen kulturell vielfĂ€ltigen globalen Markt. Viele Unternehmen schlagen nicht fehl, weil hervorragende Produkte und / oder Dienstleistungen gewĂŒnscht werden, sondern aufgrund eines Mangels an interkultureller Kompetenz. Ein Nichtbeachten der kulturellen Komponente in geschĂ€ftlichen Transaktionen kann und wird zu Fehlern fĂŒhren, hervorgerufen durch MissverstĂ€ndnisse basierend auf einer ungenĂŒgenden Kommunikation. Weil es nicht viele Forschungsergebnisse auf dem Gebiet der interkulturellen Kommunikation fĂŒr deutsch-amerikanische Unternehmungen gibt, konzentriert sich dieses Arbeitspapier auf zwei deutsche Unternehmen, Buderus und Bayer, welche auf dem amerikanischen Markt aktiv sind. Außerdem wird aufgezeigt, wie diese beiden Unternehmen kulturelle Unterschiede bewĂ€ltigen.Intercultural Communication,Globalization,Business Ventures,Interkulturelle Kommunikation,Globalisierung,Business Ventures
    • 

    corecore