20,620 research outputs found

    Further developments in generating type-safe messaging

    Full text link
    At ICALEPCS '09, we introduced a source code generator that allows processes to communicate safely using data types native to each host language. In this paper, we discuss further development that has occurred since the conference in Kobe, Japan, including the addition of three more client languages, an optimization in network packet size and the addition of a new protocol data type.Comment: 4 pp. 13th International Conference on Accelerator and Large Experimental Physics Control Systems (ICALEPCS 2011). 10-14 Oct 2011. Grenoble, Franc

    Implementing Web 2.0 in secondary schools: impacts, barriers and issues

    Get PDF
    One of the reports from the Web 2.0 technologies for learning at KS3 and KS4 project. This report explored Impact of Web 2.0 technologies on learning and teaching and drew upon evidence from multiple sources: field studies of 27 schools across the country; guided surveys of 2,600 school students; 100 interviews and 206 online surveys conducted with managers, teachers and technical staff in these schools; online surveys of the views of 96 parents; interviews held with 18 individual innovators in the field of Web 2.0 in education; and interviews with nine regional managers responsible for implementation of ICT at national level

    CamFlow: Managed Data-sharing for Cloud Services

    Full text link
    A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications. From the start, strong isolation between cloud tenants was seen to be of paramount importance, provided first by virtual machines (VM) and later by containers, which share the operating system (OS) kernel. Increasingly it is the case that applications also require facilities to effect isolation and protection of data managed by those applications. They also require flexible data sharing with other applications, often across the traditional cloud-isolation boundaries; for example, when government provides many related services for its citizens on a common platform. Similar considerations apply to the end-users of applications. But in particular, the incorporation of cloud services within `Internet of Things' architectures is driving the requirements for both protection and cross-application data sharing. These concerns relate to the management of data. Traditional access control is application and principal/role specific, applied at policy enforcement points, after which there is no subsequent control over where data flows; a crucial issue once data has left its owner's control by cloud-hosted applications and within cloud-services. Information Flow Control (IFC), in addition, offers system-wide, end-to-end, flow control based on the properties of the data. We discuss the potential of cloud-deployed IFC for enforcing owners' dataflow policy with regard to protection and sharing, as well as safeguarding against malicious or buggy software. In addition, the audit log associated with IFC provides transparency, giving configurable system-wide visibility over data flows. [...]Comment: 14 pages, 8 figure

    LIVE 2013 Meeting Minutes

    Get PDF
    This document is a compilation of LIVE (Low Input Viticulture & Enology) meeting minutes from 2013. Topics covered in the meeting minutes include an OCSW (Oregon Certified Sustainable Wine) update, the Carbon Reduction Challenge, and marketing strategies

    Promoting Handwashing and Sanitation Behaviour Change in Low- and Middle-Income Countries: A Mixed-Method Systematic Review

    Get PDF
    This systematic review shows which promotional approaches are effective in changing handwashing and sanitation behaviour and which implementation factors affect the success or failure of such interventions. The authors find that promotional approaches can be effective in terms of handwashing with soap, latrine use, safe faeces disposal and open defecation. No one specific approach is most effective. However, several promotional elements do induce behaviour change. Different barriers and facilitators that influence implementing promotional approaches should be carefully considered when developing new policy, programming, practice, or research in this area

    Developing information sharing and assessment systems

    Get PDF

    An Ontology based Enhanced Framework for Instant Messages Filtering for Detection of Cyber Crimes

    Get PDF
    Instant messaging is very appealing and relatively new class of social interaction. Instant Messengers (IMs) and Social Networking Sites (SNS) may contain messages which are capable of causing harm, which are untraced, leading to obstruction for network communication and cyber security. User ignorance towards the use of communication services like Instant Messengers, emails, websites, social networks etc, is creating favourable conditions for cyber threat activity. It is required to create technical awareness in users by educating them to create a suspicious detection application which would generate alerts for the user so that suspicious messages are not ignored. Very limited research contributions were available in for detection of suspicious cyber threat activity in IM. A context based, dynamic and intelligent suspicious detection methodology in IMs is proposed, to analyse and detect cyber threat activity in Instant Messages with relevance to domain ontology (OBIE) and utilizes the Association rule mining for generating rules and alerting the victims, also analyses results with high ratio of precision and recall. The results have proved improvisation over the existing methods by showing the increased percentage of precision and recall. DOI: 10.17762/ijritcc2321-8169.15056

    A qualitative study of children, young people and 'sexting' : English

    Get PDF
    The purpose of this small scale qualitative research was to respond to and enhance our understandings of the complex nature of sexting and the role of mobile technologies within peer teen networks. It was designed as a pilot study – to investigate a phenomenon whose nature, scale and dimensions were unknown. Thus the research itself also was small in scale and exploratory in nature and also culturally and geographically specific. We conducted focus group interviews with 35 young people years 8 and 10 in two inner city London schools. At the focus groups we asked participants to friend us on Facebook, with a research Facebook profile. We then mapped some of their activities online and returned for 22 individual interviews with selected case study young people. We also interviewed key teachers and staff at the schools. The study found that threats from peers in digital social networks were more problematic for young people that ‘stranger danger’ from adults. Digital technologies facilitated new visual cultures of surveillance, in which young women were pressured to send revealing body photos or asked to perform sexual services by text and through social networking sites. In this way, sexting aggravated peer hierarchies and forms of sexual harassment in schools, meaning that sexting was often coercive and was sometimes a form of cyberbullying. Girls were most negatively affected by ‘sexting’ in cultural contexts of increasing ‘sexualisation’ shaped by sexual double standards and boys had difficulty in challenging constructions of sexually aggressive masculinity. The research allowed for exploration of when pleasurable sexual flirtation through digital communication moved into sexual coercion and harassment, which was illustrated through narrative examples. Considering the relationship between online and offline risks it found sexual double standards in attitudes to digital sexual communication were linked to incidents of real playground sexual harassment and violence. Finally, it found that children at primary school age were being impacted by the coercive aspects of ‘sexting’ at an earlier age, than prior research indicated

    Air Traffic Management Safety Challenges

    No full text
    The primary goal of the Air Traffic Management (ATM) system is to control accident risk. ATM safety has improved over the decades for many reasons, from better equipment to additional safety defences. But ATM safety targets, improving on current performance, are now extremely demanding. Safety analysts and aviation decision-makers have to make safety assessments based on statistically incomplete evidence. If future risks cannot be estimated with precision, then how is safety to be assured with traffic growth and operational/technical changes? What are the design implications for the USA’s ‘Next Generation Air Transportation System’ (NextGen) and Europe’s Single European Sky ATM Research Programme (SESAR)? ATM accident precursors arise from (eg) pilot/controller workload, miscommunication, and lack of upto- date information. Can these accident precursors confidently be ‘designed out’ by (eg) better system knowledge across ATM participants, automatic safety checks, and machine rather than voice communication? Future potentially hazardous situations could be as ‘messy’ in system terms as the Überlingen mid-air collision. Are ATM safety regulation policies fit for purpose: is it more and more difficult to innovate, to introduce new technologies and novel operational concepts? Must regulators be more active, eg more inspections and monitoring of real operational and organisational practices

    Tokens in A Man’s World: Women in Creative Advertising Departments

    Get PDF
    • 

    corecore