595 research outputs found

    Proceedings of the EACL Hackashop on News Media Content Analysis and Automated Report Generation

    Get PDF
    Peer reviewe

    Layers of evidence: discourse and typologies of faith-inspired community response to HIV/AIDS in Africa

    Get PDF
    This paper has two objectives. The first is to provide a review of the discourses about the religious response to HIV/AIDS in Africa that have emerged from the recent literature, how these discourses has changed over time (from religiophobia to a cautious recognition of the comparative value of faith-inspired interventions), and the conflicting typologies of faith-inspired initiatives that they have inspired. Noting the limits of the existing typologies, the second objective is to suggest conceptually some of the ways in which typologies could be combined in order to be made more useful from an operational point of view

    Pseudo-contractions as Gentle Repairs

    Get PDF
    Updating a knowledge base to remove an unwanted consequence is a challenging task. Some of the original sentences must be either deleted or weakened in such a way that the sentence to be removed is no longer entailed by the resulting set. On the other hand, it is desirable that the existing knowledge be preserved as much as possible, minimising the loss of information. Several approaches to this problem can be found in the literature. In particular, when the knowledge is represented by an ontology, two different families of frameworks have been developed in the literature in the past decades with numerous ideas in common but with little interaction between the communities: applications of AGM-like Belief Change and justification-based Ontology Repair. In this paper, we investigate the relationship between pseudo-contraction operations and gentle repairs. Both aim to avoid the complete deletion of sentences when replacing them with weaker versions is enough to prevent the entailment of the unwanted formula. We show the correspondence between concepts on both sides and investigate under which conditions they are equivalent. Furthermore, we propose a unified notation for the two approaches, which might contribute to the integration of the two areas

    TALENT MANAGEMENT – AN ETYMOLOGICAL STUDY

    Get PDF
    The current article unveils and analyzes important shades of meaning for the widely discussed term ‚talent management‘. It not only grounds the outlined perspectives in incremental formulation and elaboration of this construct, but also is oriented to exploring the underlying reasons for the social actors, proposing new nuances. Thus, a mind map and a fish-bone diagram are constructed to depict effectively and efficiently the current state of development for talent management and make easier the realizations of future research endeavours in this field

    Smart Home Personal Assistants: A Security and Privacy Review

    Get PDF
    Smart Home Personal Assistants (SPA) are an emerging innovation that is changing the way in which home users interact with the technology. However, there are a number of elements that expose these systems to various risks: i) the open nature of the voice channel they use, ii) the complexity of their architecture, iii) the AI features they rely on, and iv) their use of a wide-range of underlying technologies. This paper presents an in-depth review of the security and privacy issues in SPA, categorizing the most important attack vectors and their countermeasures. Based on this, we discuss open research challenges that can help steer the community to tackle and address current security and privacy issues in SPA. One of our key findings is that even though the attack surface of SPA is conspicuously broad and there has been a significant amount of recent research efforts in this area, research has so far focused on a small part of the attack surface, particularly on issues related to the interaction between the user and the SPA devices. We also point out that further research is needed to tackle issues related to authorization, speech recognition or profiling, to name a few. To the best of our knowledge, this is the first article to conduct such a comprehensive review and characterization of the security and privacy issues and countermeasures of SPA.Comment: Accepted for publication in ACM Computing Survey

    Unpacking value destruction in the intersection between public and private value

    Get PDF
    Public services do not always create value. Rather, when poorly organized and/or delivered, they can destroy value and make service users’ lives worse. However, such ‘value destruction’ is presently weakly conceptualized in public management theory. Consequently, this paper is devoted to the empirical examination of value destruction and hence its conceptualization. At the heart of the paper, we recognize the multiplicity of public value and private value objectives in complex public service environments and the dyadic tension between these two value constellations. Drawing upon qualitative data derived from public carbon reduction projects, we establish a conceptual framework. This framework accounts both for the types of value destruction and for the tension between public and private value. Subsequently, the framework disentangles the value destruction concept into four categories: value ignorance, value disproportion, value backlash and value exploitation. Finally, the implications of this new conceptual framework for public management theory and practice are explored

    Program and Abstracts of the Annual Meeting of the Georgia Academy of Science, 2013

    Get PDF
    The annual meeting of the Georgia Academy of Science took place March 29-30, 2013, at Valdosta State University, Valdosta, Georgia. Presentations were provided by members of the Academy who represented the following sections: I. Biological Sciences II Chemistry III. Earth & Atmospheric Sciences IV. Physics, Mathematics, Computer Science, Engineering & Technology V. Biomedical Sciences VI. Philosophy & History of Science VII. Science Education VIII. Anthropology

    Advances on Mechanics, Design Engineering and Manufacturing III

    Get PDF
    This open access book gathers contributions presented at the International Joint Conference on Mechanics, Design Engineering and Advanced Manufacturing (JCM 2020), held as a web conference on June 2–4, 2020. It reports on cutting-edge topics in product design and manufacturing, such as industrial methods for integrated product and process design; innovative design; and computer-aided design. Further topics covered include virtual simulation and reverse engineering; additive manufacturing; product manufacturing; engineering methods in medicine and education; representation techniques; and nautical, aeronautics and aerospace design and modeling. The book is organized into four main parts, reflecting the focus and primary themes of the conference. The contributions presented here not only provide researchers, engineers and experts in a range of industrial engineering subfields with extensive information to support their daily work; they are also intended to stimulate new research directions, advanced applications of the methods discussed and future interdisciplinary collaborations

    Constructing and restraining the societies of surveillance: Accountability, from the rise of intelligence services to the expansion of personal data networks in Spain and Brazil (1975-2020)

    Get PDF
    541 p.The objective of this study is to examine the development of socio-technical accountability mechanisms in order to: a) preserve and increase the autonomy of individuals subjected to surveillance and b) replenish the asymmetry of power between those who watch and those who are watched. To do so, we address two surveillance realms: intelligence services and personal data networks. The cases studied are Spain and Brazil, from the beginning of the political transitions in the 1970s (in the realm of intelligence), and from the expansion of Internet digital networks in the 1990s (in the realm of personal data) to the present time. The examination of accountability, thus, comprises a holistic evolution of institutions, regulations, market strategies, as well as resistance tactics. The conclusion summarizes the accountability mechanisms and proposes universal principles to improve the legitimacy of authority in surveillance and politics in a broad sense
    • …
    corecore