4,922 research outputs found
Horizon Report 2009
El informe anual Horizon investiga, identifica y clasifica las tecnologĂas emergentes que los expertos que lo elaboran prevĂ©n tendrĂĄn un impacto en la enseñanza aprendizaje, la investigaciĂłn y la producciĂłn creativa en el contexto educativo de la enseñanza superior. TambiĂ©n estudia las tendencias clave que permiten prever el uso que se harĂĄ de las mismas y los retos que ellos suponen para las aulas. Cada ediciĂłn identifica seis tecnologĂas o prĂĄcticas. Dos cuyo uso se prevĂ© emergerĂĄ en un futuro inmediato (un año o menos) dos que emergerĂĄn a medio plazo (en dos o tres años) y dos previstas a mĂĄs largo plazo (5 años)
Learning For Life: The Opportunity For Technology To Transform Adult Education - Part II: The Supplier Ecosystem
In fall 2014, Tyton Partners (formerly Education Growth Advisors), with support from the Joyce Foundation, conducted national research on the role and potential of instructional technology in the US adult education field. The objective was to understand the current state of the field with respect to technology readiness and the opportunities and challenges for increasing the use of technology-based instructional models within adult education. The initial publication in the series, "Part I: Interest in and Aptitude for Technology," focused on demand-side dynamics and addressed adult education administrators' and practitioners' perspectives on the role and potential of technology to support their students' needs and objectives. This second publication, "Part 2: The Supplier Ecosystem," highlights market composition and supply-side dynamics, instructional resource use, and opportunities for innovation
Recommended from our members
Scientific Literacy in the digital age: tools, environments and resources for co-inquiry
This paper describes some European and International projects to promote Scientific Literacy in the digital age as well as technologies, environments and resources for co-inquiry. The aim of this research is also to describe computer applications, software tools and environments that were designed to support processes of collaborative inquiry learning to promote Scientific Literacy. These tools are analyzed by describing their interfaces and functionalities. The outcomes of this descriptive research points out some effects on student learning and competences developed known from the literature. This paper argues the importance of promoting scientific citizenship not only through schools and Universities (formal learning), but also non-credit online courses and community-based learning programmes (non-formal context), as well as daily life activities, educational open digital materials through social networks (informal scenario)
The simplicity project: easing the burden of using complex and heterogeneous ICT devices and services
As of today, to exploit the variety of different "services", users need to configure each of their devices by using different procedures and need to explicitly select among heterogeneous access technologies and protocols. In addition to that, users are authenticated and charged by different means. The lack of implicit human computer interaction, context-awareness and standardisation places an enormous burden of complexity on the shoulders of the final users. The IST-Simplicity project aims at leveraging such problems by: i) automatically creating and customizing a user communication space; ii) adapting services to user terminal characteristics and to users preferences; iii) orchestrating network capabilities. The aim of this paper is to present the technical framework of the IST-Simplicity project. This paper is a thorough analysis and qualitative evaluation of the different technologies, standards and works presented in the literature related to the Simplicity system to be developed
Recommended from our members
Enabling Privacy and Trust in Edge AI Systems
Recent advances in mobile computing and the Internet of Things (IoT) enable the global integration of heterogeneous smart devices via wireless networks. A common characteristic across these modern day systems is their ability to collect and communicate streaming data, making machine learning (ML) appealing for processing, reasoning, and predicting about the environment. More recently, low network latency requirements have made offloading intelligence to the cloud undesirable. These novel requirements have led to the emergence of edge computing, an approach that brings computation closer to the device with low latency, high throughput, and enhanced reliability. Together, they enable ML-powered information processing and control pipelines spanning end devices, edge computing, and cloud environments. However, continuous collaboration between cloud, edge and device is susceptible to information leakage and loss, leading to insecure and unreliable operation. This raises an important question: how can we design, develop, and evaluate high-performing ML systems that are trustworthy and privacy-preserving in resource-constrained edge environments? In this thesis, I address this question by designing and implementing privacy-preserving and trustworthy ML systems for distributed applications. I first introduce a system that establishes trust in the explanations generated from a popular visualization technique, saliency maps, using counterfactual reasoning. Through the proposed evaluation system, I assess the degree to which hypothesized explanations correspond to the semantics of edge-based reinforcement learning environments. Second, I examine the privacy implications of personalized models in distributed mobile services by proposing time-series based model inversion attacks. To thwart such attacks, I present a distributed framework, Pelican, that learns and deploys transfer learning-based personalized ML models in a privacy preserving manner on resource-constrained mobile devices. Third, I investigate ML models that are deployed on local devices for inference and highlight the ease with which proprietary information embedded in these models can be exposed. For mitigating such attacks, I present a secure on-device application framework, SODA, which is supported by real-time adversarial detection. Finally, I present an end-to-end privacy-aware system for a real-world application to model group interaction behavior via mobility sensing. The proposed system, W4-Groups, distributes computation across device, edge, and cloud resources to strengthen its privacy and trustworthiness guarantees
Mobile support in CSCW applications and groupware development frameworks
Computer Supported Cooperative Work (CSCW) is an established subset of the field of Human Computer Interaction that deals with the how people use computing technology to enhance group interaction and collaboration. Mobile CSCW has emerged as a result of the progression from personal desktop computing to the mobile device platforms that are ubiquitous today.
CSCW aims to not only connect people and facilitate communication through using computers; it aims to provide conceptual models coupled with technology to manage, mediate, and assist collaborative processes. Mobile CSCW research looks to fulfil these aims through the adoption of mobile technology and consideration for the mobile user. Facilitating collaboration using mobile devices brings new challenges. Some of these challenges are inherent to the nature of the device hardware, while others focus on the understanding of how to engineer software to maximize effectiveness for the end-users. This paper reviews seminal and state-of-the-art cooperative software applications and development frameworks, and their support for mobile devices
VIRTUAL EDUCATION
The internet economy is strongly connected with its developing modalities. A society desiring to be developed must be initially educated, in order to understand the benefits of the new modality of social integration. The practical finality of the âeâ phenomenon in the educational field is the application of an eLearning system.virtual, education
Creating and optimizing client-server applications on mobile devices
Mobile devices are embedded systems with very limited capacities that
need to be considered when developing a client-server application, mainly due to
technical, ergonomic and economic implications to the mobile user. With the increasing
popularity of mobile computing, many developers have faced problems
due to low performance of devices. In this paper, we discuss how to optimize and
create client-server applications for in wireless/mobile environments, presenting
techniques to improve overall performance
Creating and optimizing client-server applications on mobile devices
Mobile devices are embedded systems with very limited capacities that
need to be considered when developing a client-server application, mainly due to
technical, ergonomic and economic implications to the mobile user. With the increasing
popularity of mobile computing, many developers have faced problems
due to low performance of devices. In this paper, we discuss how to optimize and
create client-server applications for in wireless/mobile environments, presenting
techniques to improve overall performance
CHORUS Deliverable 3.3: Vision Document - Intermediate version
The goal of the CHORUS vision document is to create a high level vision on audio-visual search engines in order to give guidance to the future R&D work in this area (in line with the mandate of CHORUS as a Coordination Action).
This current intermediate draft of the CHORUS vision document (D3.3) is based on the previous CHORUS vision documents D3.1 to D3.2 and on the results of the six CHORUS Think-Tank meetings held in March, September and November 2007 as well as in April, July and October 2008, and on the feedback from other CHORUS events.
The outcome of the six Think-Thank meetings will not just be to the benefit of the participants which are stakeholders and experts from academia and industry â CHORUS, as a coordination action of the EC, will feed back the findings (see Summary) to the projects under its purview and, via its website, to the whole community working in the domain of AV content search.
A few subjections of this deliverable are to be completed after the eights (and presumably last) Think-Tank meeting in spring 2009
- âŠ