20,620 research outputs found
Further developments in generating type-safe messaging
At ICALEPCS '09, we introduced a source code generator that allows processes
to communicate safely using data types native to each host language. In this
paper, we discuss further development that has occurred since the conference in
Kobe, Japan, including the addition of three more client languages, an
optimization in network packet size and the addition of a new protocol data
type.Comment: 4 pp. 13th International Conference on Accelerator and Large
Experimental Physics Control Systems (ICALEPCS 2011). 10-14 Oct 2011.
Grenoble, Franc
Implementing Web 2.0 in secondary schools: impacts, barriers and issues
One of the reports from the Web 2.0 technologies for learning at KS3 and KS4 project. This report explored Impact of Web 2.0 technologies on learning and teaching and drew upon evidence from multiple sources: field studies of 27 schools across the country; guided surveys of 2,600 school students; 100 interviews and 206 online surveys conducted with managers, teachers and technical staff in these schools; online surveys of the views of 96 parents; interviews held with 18 individual innovators in the field of Web 2.0 in education; and interviews with nine regional managers responsible for implementation of ICT at national level
CamFlow: Managed Data-sharing for Cloud Services
A model of cloud services is emerging whereby a few trusted providers manage
the underlying hardware and communications whereas many companies build on this
infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS
applications. From the start, strong isolation between cloud tenants was seen
to be of paramount importance, provided first by virtual machines (VM) and
later by containers, which share the operating system (OS) kernel. Increasingly
it is the case that applications also require facilities to effect isolation
and protection of data managed by those applications. They also require
flexible data sharing with other applications, often across the traditional
cloud-isolation boundaries; for example, when government provides many related
services for its citizens on a common platform. Similar considerations apply to
the end-users of applications. But in particular, the incorporation of cloud
services within `Internet of Things' architectures is driving the requirements
for both protection and cross-application data sharing.
These concerns relate to the management of data. Traditional access control
is application and principal/role specific, applied at policy enforcement
points, after which there is no subsequent control over where data flows; a
crucial issue once data has left its owner's control by cloud-hosted
applications and within cloud-services. Information Flow Control (IFC), in
addition, offers system-wide, end-to-end, flow control based on the properties
of the data. We discuss the potential of cloud-deployed IFC for enforcing
owners' dataflow policy with regard to protection and sharing, as well as
safeguarding against malicious or buggy software. In addition, the audit log
associated with IFC provides transparency, giving configurable system-wide
visibility over data flows. [...]Comment: 14 pages, 8 figure
LIVE 2013 Meeting Minutes
This document is a compilation of LIVE (Low Input Viticulture & Enology) meeting minutes from 2013. Topics covered in the meeting minutes include an OCSW (Oregon Certified Sustainable Wine) update, the Carbon Reduction Challenge, and marketing strategies
Promoting Handwashing and Sanitation Behaviour Change in Low- and Middle-Income Countries: A Mixed-Method Systematic Review
This systematic review shows which promotional approaches are effective in changing handwashing and sanitation behaviour and which implementation factors affect the success or failure of such interventions. The authors find that promotional approaches can be effective in terms of handwashing with soap, latrine use, safe faeces disposal and open defecation. No one specific approach is most effective. However, several promotional elements do induce behaviour change. Different barriers and facilitators that influence implementing promotional approaches should be carefully considered when developing new policy, programming, practice, or research in this area
An Ontology based Enhanced Framework for Instant Messages Filtering for Detection of Cyber Crimes
Instant messaging is very appealing and relatively new class of social interaction. Instant Messengers (IMs) and Social Networking Sites (SNS) may contain messages which are capable of causing harm, which are untraced, leading to obstruction for network communication and cyber security. User ignorance towards the use of communication services like Instant Messengers, emails, websites, social networks etc, is creating favourable conditions for cyber threat activity. It is required to create technical awareness in users by educating them to create a suspicious detection application which would generate alerts for the user so that suspicious messages are not ignored. Very limited research contributions were available in for detection of suspicious cyber threat activity in IM. A context based, dynamic and intelligent suspicious detection methodology in IMs is proposed, to analyse and detect cyber threat activity in Instant Messages with relevance to domain ontology (OBIE) and utilizes the Association rule mining for generating rules and alerting the victims, also analyses results with high ratio of precision and recall. The results have proved improvisation over the existing methods by showing the increased percentage of precision and recall.
DOI: 10.17762/ijritcc2321-8169.15056
A qualitative study of children, young people and 'sexting' : English
The purpose of this small scale qualitative research was to respond to and enhance our understandings of the complex nature of sexting and the role of mobile technologies within peer teen networks. It was designed as a pilot study â to investigate a phenomenon whose nature, scale and dimensions were unknown. Thus the research itself also was small in scale and exploratory in nature and also culturally and geographically specific. We conducted focus group interviews with 35 young people years 8 and 10 in two inner city London schools. At the focus groups we asked participants to friend us on Facebook, with a research Facebook profile. We then mapped some of their activities online and returned for 22 individual interviews with selected case study young people. We also interviewed key teachers and staff at the schools. The study found that threats from peers in digital social networks were more problematic for young people that âstranger dangerâ from adults. Digital technologies facilitated new visual cultures of surveillance, in which young women were pressured to send revealing body photos or asked to perform sexual services by text and through social networking sites. In this way, sexting aggravated peer hierarchies and forms of sexual harassment in schools, meaning that sexting was often coercive and was sometimes a form of cyberbullying. Girls were most negatively affected by âsextingâ in cultural contexts of increasing âsexualisationâ shaped by sexual double standards and boys had difficulty in challenging constructions of sexually aggressive masculinity. The research allowed for exploration of when pleasurable sexual flirtation through digital communication moved into sexual coercion and harassment, which was illustrated through narrative examples. Considering the relationship between online and offline risks it found sexual double standards in attitudes to digital sexual communication were linked to incidents of real playground sexual harassment and violence. Finally, it found that children at primary school age were being impacted by the coercive aspects of âsextingâ at an earlier age, than prior research indicated
Air Traffic Management Safety Challenges
The primary goal of the Air Traffic Management (ATM) system is to control accident risk. ATM
safety has improved over the decades for many reasons, from better equipment to additional
safety defences. But ATM safety targets, improving on current performance, are now extremely
demanding. Safety analysts and aviation decision-makers have to make safety assessments
based on statistically incomplete evidence. If future risks cannot be estimated with precision,
then how is safety to be assured with traffic growth and operational/technical changes? What
are the design implications for the USAâs âNext Generation Air Transportation Systemâ
(NextGen) and Europeâs Single European Sky ATM Research Programme (SESAR)? ATM
accident precursors arise from (eg) pilot/controller workload, miscommunication, and lack of upto-
date information. Can these accident precursors confidently be âdesigned outâ by (eg) better
system knowledge across ATM participants, automatic safety checks, and machine rather than
voice communication? Future potentially hazardous situations could be as âmessyâ in system
terms as the Ăberlingen mid-air collision. Are ATM safety regulation policies fit for purpose: is it
more and more difficult to innovate, to introduce new technologies and novel operational
concepts? Must regulators be more active, eg more inspections and monitoring of real
operational and organisational practices
- âŠ