88,979 research outputs found

    Predicting Future Duration from Present Age: A Critical Assessment

    Get PDF
    Using a temporal version of the Copernican principle, Gott has proposed a statistical predictor of future longevity based on present age [J. R. Gott III, Nature 363, 315 (1993)] and applied the predictor to a variety of examples, including the longevity of the human species. Though Gott's proposal contains a grain of truth, it does not have the universal predictive power that he attributes to it.Comment: 17 pages, standard LaTeX; to be published in Contemporary Physic

    Constructing English in New Zealand: A report on a decade of reform

    Get PDF
    In 1991, the newly elected National Government of New Zealand set in train a major reform of the New Zealand national curriculum and, a little later, a major reform of the New Zealand qualifications system. These reforms have had a major impact on the construction of English as a subject in New Zealand secondary schools, and the work and professional identity of teachers. This article uses as a basis for analysis a framework which posits four paradigms for subject English and proceeds to examine the current national English curriculum in New Zealand for its underlying discourses. In specific terms, it explores questions of partition and progression, and terminology. In respect of progression, it argues that the current curriculum has imposed a flawed model on teachers and students, in part because of its commitment to the assignment of decontextualised outcomes statements (‘achievement objects’) to staged levels of student development (levels). It also argues that much of the terminology used by the document has had a negative impact on metalinguistic classroom practice. Finally, while it views the national English curriculum as a discursively mixed bag, it notes an absence of critical discourses and a tendency, in recent qualifications reforms, to construct English teachers as technicians and the subject as skills-based

    A Perspective on Unique Information: Directionality, Intuitions, and Secret Key Agreement

    Get PDF
    Recently, the partial information decomposition emerged as a promising framework for identifying the meaningful components of the information contained in a joint distribution. Its adoption and practical application, however, have been stymied by the lack of a generally-accepted method of quantifying its components. Here, we briefly discuss the bivariate (two-source) partial information decomposition and two implicitly directional interpretations used to intuitively motivate alternative component definitions. Drawing parallels with secret key agreement rates from information-theoretic cryptography, we demonstrate that these intuitions are mutually incompatible and suggest that this underlies the persistence of competing definitions and interpretations. Having highlighted this hitherto unacknowledged issue, we outline several possible solutions.Comment: 5 pages, 3 tables; http://csc.ucdavis.edu/~cmg/compmech/pubs/pid_intuition.ht

    Originalism: A Critical Introduction

    Get PDF
    The theory of originalism is now well into its second wave. Originalism first came to prominence in the 1970s and 1980s as conservative critics reacted to the decisions of the Warren Court, and the Reagan Administration embraced originalism as a check on judicial activism. A second wave of originalism has emerged since the late 1990s, responding to earlier criticisms and reconsidering earlier assumptions and conclusions. This Article assesses where originalist theory currently stands. It outlines the points of agreement and disagreement within the recent originalist literature and highlights the primary areas of continuing separation between originalists and their critics

    Malicious User Experience Design Research for Cybersecurity

    Full text link
    This paper explores the factors and theory behind the user-centered research that is necessary to create a successful game-like prototype, and user experience, for malicious users in a cybersecurity context. We explore what is known about successful addictive design in the fields of video games and gambling to understand the allure of breaking into a system, and the joy of thwarting the security to reach a goal or a reward of data. Based on the malicious user research, game user research, and using the GameFlow framework, we propose a novel malicious user experience design approac
    • 

    corecore