19,138 research outputs found
Women, WASH, and the Water for Life Decade
From childbirth to education to domestic responsibilities to dignity and safety, access to water and sanitation affect women and girls more than men and boys. This report details recommendations for policy and global practice that will empower women and water-related projects
TimeMachine: Timeline Generation for Knowledge-Base Entities
We present a method called TIMEMACHINE to generate a timeline of events and
relations for entities in a knowledge base. For example for an actor, such a
timeline should show the most important professional and personal milestones
and relationships such as works, awards, collaborations, and family
relationships. We develop three orthogonal timeline quality criteria that an
ideal timeline should satisfy: (1) it shows events that are relevant to the
entity; (2) it shows events that are temporally diverse, so they distribute
along the time axis, avoiding visual crowding and allowing for easy user
interaction, such as zooming in and out; and (3) it shows events that are
content diverse, so they contain many different types of events (e.g., for an
actor, it should show movies and marriages and awards, not just movies). We
present an algorithm to generate such timelines for a given time period and
screen size, based on submodular optimization and web-co-occurrence statistics
with provable performance guarantees. A series of user studies using Mechanical
Turk shows that all three quality criteria are crucial to produce quality
timelines and that our algorithm significantly outperforms various baseline and
state-of-the-art methods.Comment: To appear at ACM SIGKDD KDD'15. 12pp, 7 fig. With appendix. Demo and
other info available at http://cs.stanford.edu/~althoff/timemachine
Recommended from our members
Investigation into a Layered Approach to Architecting Security-Informed Safety Cases
The paper describes a layered approach to analysing safety and security in a structured way and creating a security-informed safety case. The approach is applied to a case study – a Security Gateway controlling data flow between two different security domains implemented with a separation kernel based operating system in an avionics environment. We discuss some findings from the case study, show how the approach identifies and ameliorates important interactions between safety and security and supports the development of complex assurance case structures
Recommended from our members
Security-Informed Safety Case Approach to Analysing MILS Systems
Safety cases are the development foundation for safety-critical systems and are often quite complex to understand depending on the size of the system and operational conditions. The recent advent of security aspects complicates the issues further. This paper describes an approach to analysing safety and security in a structured way and creating security-informed safety cases that provide justification of safety taking into particular consideration the impact of security. The paper includes an overview of the structured assurance case concept, a security-informed safety methodology and a layered approach to constructing cases. The approach is applied to a Security Gateway that is used to control data flow between security domains in a separation kernel based operating system in avionics environment. We show that a clear and structured way of presenting a safety case combining safety and security alleviates understanding important interactions taking into account the impact and, hence, increases safety
Tilling the Field: Lessons about Philanthropy's Role in School Discipline Reform
Anyone concerned about how the futures of millions of children are jeopardized because of discipline practices that unfairly exclude students from U.S. public schools will be heartened by this story about how transformative change can happen.It's a story of how students and parents, civil rights advocates, academics, policymakers and government came together -- with help from philanthropy -- to advance reform.The linchpin was a four-year, $47 million school discipline reform initiative that Atlantic launched in 2010 to promote policies and practices that would keep vulnerable children in school and on track to graduate and go on to college, rather than on the path to prison.We hope this report will be useful to all who might benefit from our experience:For funders -- to inform strategic choices going forward, to anticipate future challenges, and to consider potentially powerful responses.For grantee and government partners -- to celebrate successes as well as to consider options for refining strategies and tactics going forward.For students of movements that protect the vulnerable -- to understand the complex arc of advocacy as shaped by intentional strategies and tactics as well as history and on-the-ground realities.KEY INSIGHTS1. When philanthropy and the public sector work together, a foundation's role should be more than just paying for a government-initiated project. Philanthropic leaders can add value by helping to define a shared goal and develop a structure for ongoing dialogue and decision making. 2. Philanthropy can help create opportunities for policy change through a strategic combination of investments designed to (re)frame the problem, identify and lift up viable policy alternatives, and apply pressure for change. 3. Grassroots organizing by parents and young people can play a major role in advancing changes to local and national educational policy -- and that impact is amplified when grassroots movements receive philanthropic support
Putting the Semantics into Semantic Versioning
The long-standing aspiration for software reuse has made astonishing strides
in the past few years. Many modern software development ecosystems now come
with rich sets of publicly-available components contributed by the community.
Downstream developers can leverage these upstream components, boosting their
productivity.
However, components evolve at their own pace. This imposes obligations on and
yields benefits for downstream developers, especially since changes can be
breaking, requiring additional downstream work to adapt to. Upgrading too late
leaves downstream vulnerable to security issues and missing out on useful
improvements; upgrading too early results in excess work. Semantic versioning
has been proposed as an elegant mechanism to communicate levels of
compatibility, enabling downstream developers to automate dependency upgrades.
While it is questionable whether a version number can adequately characterize
version compatibility in general, we argue that developers would greatly
benefit from tools such as semantic version calculators to help them upgrade
safely. The time is now for the research community to develop such tools: large
component ecosystems exist and are accessible, component interactions have
become observable through automated builds, and recent advances in program
analysis make the development of relevant tools feasible. In particular,
contracts (both traditional and lightweight) are a promising input to semantic
versioning calculators, which can suggest whether an upgrade is likely to be
safe.Comment: to be published as Onward! Essays 202
Community Fisheries Management Handbook
This handbook is a unique product. It is the first "field guide" to community-based fisheries management focused specifically on fisheries, such as those of the Northwest Atlantic, that are already highly regulated by governmental authorities, with licensing and other requirements that limit access and effort. While a variety of resource materials are available on community-based natural resource management, almost all of these are written by practitioners working in the South (developing countries) and rely on case studies and techniques that have been tested in less industrialized tropical fisheries. Therefore, this handbook is one of the few publications about community-based management in 'Northern' fisheries.The need for this handbook was identified by participants working on an initiative on the Atlantic coast of Canada, "Turning the Tide: Communities Managing Fisheries Together" (www.turningthetide.ca). Turning the Tide works for improved fisheries management through community-based approaches, and through cooperative efforts among aboriginal and non-aboriginal communities. To that end, it has brought together fishermen and their communities to share information and ideas on community-based management, through events such as community forums and study tours. Participants recognized the need for a handbook on community-based fisheries management that is relevant to their own fisheries and that can be used as a tool to provide information and support for practitioners, as well as to document current practices and insights obtained, and to promote and raise public awareness about community-based fisheries management. The stories and insights in the handbook are those of Turning the Tide participants and their allies from around the Atlantic Region – the Atlantic coast of Canada and the north-eastern North America-United States – who shared this information during Turning the Tide activities, and in individual and group interviews, and who reviewed the materials used in producing this handbook. The various tools and ideas explored here are currently being applied in the region, and so the handbook demonstrates how community-based approaches to fisheries management are working today
Recommended from our members
Towards an aspect weaving BPEL engine
This position paper proposes the use of dynamic aspects and
the visitor design pattern to obtain a highly configurable and
extensible BPEL engine. Using these two techniques, the
core of this infrastructural software can be customised to
meet new requirements and add features such as debugging,
execution monitoring, or changing to another Web Service
selection policy. Additionally, it can easily be extended to
cope with customer-specific BPEL extensions. We propose
the use of dynamic aspects not only on the engine itself
but also on the workflow in order to tackle the problems of
Web Service hot deployment and hot fixes to long running
processes. In this way, composing aWeb Service "on-the-fly"
means weaving its choreography interface into the workflow
- …