88,979 research outputs found
Predicting Future Duration from Present Age: A Critical Assessment
Using a temporal version of the Copernican principle, Gott has proposed a
statistical predictor of future longevity based on present age [J. R. Gott III,
Nature 363, 315 (1993)] and applied the predictor to a variety of examples,
including the longevity of the human species. Though Gott's proposal contains a
grain of truth, it does not have the universal predictive power that he
attributes to it.Comment: 17 pages, standard LaTeX; to be published in Contemporary Physic
Constructing English in New Zealand: A report on a decade of reform
In 1991, the newly elected National Government of New Zealand set in train a major reform of the New Zealand national curriculum and, a little later, a major reform of the New Zealand qualifications system. These reforms have had a major impact on the construction of English as a subject in New Zealand secondary schools, and the work and professional identity of teachers. This article uses as a basis for analysis a framework which posits four paradigms for subject English and proceeds to examine the current national English curriculum in New Zealand for its underlying discourses. In specific terms, it explores questions of partition and progression, and terminology. In respect of progression, it argues that the current curriculum has imposed a flawed model on teachers and students, in part because of its commitment to the assignment of decontextualised outcomes statements (âachievement objectsâ) to staged levels of student development (levels). It also argues that much of the terminology used by the document has had a negative impact on metalinguistic classroom practice. Finally, while it views the national English curriculum as a discursively mixed bag, it notes an absence of critical discourses and a tendency, in recent qualifications reforms, to construct English teachers as technicians and the subject as skills-based
A Perspective on Unique Information: Directionality, Intuitions, and Secret Key Agreement
Recently, the partial information decomposition emerged as a promising
framework for identifying the meaningful components of the information
contained in a joint distribution. Its adoption and practical application,
however, have been stymied by the lack of a generally-accepted method of
quantifying its components. Here, we briefly discuss the bivariate (two-source)
partial information decomposition and two implicitly directional
interpretations used to intuitively motivate alternative component definitions.
Drawing parallels with secret key agreement rates from information-theoretic
cryptography, we demonstrate that these intuitions are mutually incompatible
and suggest that this underlies the persistence of competing definitions and
interpretations. Having highlighted this hitherto unacknowledged issue, we
outline several possible solutions.Comment: 5 pages, 3 tables;
http://csc.ucdavis.edu/~cmg/compmech/pubs/pid_intuition.ht
Originalism: A Critical Introduction
The theory of originalism is now well into its second wave. Originalism first came to prominence in the 1970s and 1980s as conservative critics reacted to the decisions of the Warren Court, and the Reagan Administration embraced originalism as a check on judicial activism. A second wave of originalism has emerged since the late 1990s, responding to earlier criticisms and reconsidering earlier assumptions and conclusions. This Article assesses where originalist theory currently stands. It outlines the points of agreement and disagreement within the recent originalist literature and highlights the primary areas of continuing separation between originalists and their critics
Malicious User Experience Design Research for Cybersecurity
This paper explores the factors and theory behind the user-centered research
that is necessary to create a successful game-like prototype, and user
experience, for malicious users in a cybersecurity context. We explore what is
known about successful addictive design in the fields of video games and
gambling to understand the allure of breaking into a system, and the joy of
thwarting the security to reach a goal or a reward of data. Based on the
malicious user research, game user research, and using the GameFlow framework,
we propose a novel malicious user experience design approac
Recommended from our members
Designing for change: mash-up personal learning environments
Institutions for formal education and most work places are equipped today with at least some kind of tools that bring together people and content artefacts in learning activities to support them in constructing and processing information and knowledge. For almost half a century, science and practice have been discussing models on how to bring personalisation through digital means to these environments. Learning environments and their construction as well as maintenance makes up the most crucial part of the learning process and the desired learning outcomes and theories should take this into account. Instruction itself as the predominant paradigm has to step down.
The learning environment is an (if not 'theĂŻÂżÂœ) important outcome of a learning process, not just a stage to perform a 'learning play'. For these good reasons, we therefore consider instructional design theories to be flawed.
In this article we first clarify key concepts and assumptions for personalised learning environments. Afterwards, we summarise our critique on the contemporary models for personalised adaptive learning. Subsequently, we propose our alternative, i.e. the concept of a mash-up personal learning environment that provides adaptation mechanisms for learning environment construction and maintenance. The web application mash-up solution allows learners to reuse existing (web-based) tools plus services.
Our alternative, LISL is a design language model for creating, managing, maintaining, and learning about learning environment design; it is complemented by a proof of concept, the MUPPLE platform. We demonstrate this approach with a prototypical implementation and a â we think â comprehensible example. Finally, we round up the article with a discussion on possible extensions of this new model and open problems
- âŠ