1,562 research outputs found
Building and Maintaining Halls of Fame over a Database
Halls of Fame are fascinating constructs. They represent the elite of an
often very large amount of entities---persons, companies, products, countries
etc. Beyond their practical use as static rankings, changes to them are
particularly interesting---for decision making processes, as input to common
media or novel narrative science applications, or simply consumed by users. In
this work, we aim at detecting events that can be characterized by changes to a
Hall of Fame ranking in an automated way. We describe how the schema and data
of a database can be used to generate Halls of Fame. In this database scenario,
by Hall of Fame we refer to distinguished tuples; entities, whose
characteristics set them apart from the majority. We define every Hall of Fame
as one specific instance of an SQL query, such that a change in its result is
considered a noteworthy event. Identified changes (i.e., events) are ranked
using lexicographic tradeoffs over event and query properties and presented to
users or fed in higher-level applications. We have implemented a full-fledged
prototype system that uses either database triggers or a Java based middleware
for event identification. We report on an experimental evaluation using a
real-world dataset of basketball statistics
Fifty Years of ISCA: A data-driven retrospective on key trends
Computer Architecture, broadly, involves optimizing hardware and software for
current and future processing systems. Although there are several other top
venues to publish Computer Architecture research, including ASPLOS, HPCA, and
MICRO, ISCA (the International Symposium on Computer Architecture) is one of
the oldest, longest running, and most prestigious venues for publishing
Computer Architecture research. Since 1973, except for 1975, ISCA has been
organized annually. Accordingly, this year will be the 50th year of ISCA. Thus,
we set out to analyze the past 50 years of ISCA to understand who and what has
been driving and innovating computing systems thus far. Our analysis identifies
several interesting trends that reflect how ISCA, and Computer Architecture in
general, has grown and evolved in the past 50 years, including minicomputers,
general-purpose uniprocessor CPUs, multiprocessor and multi-core CPUs,
general-purpose GPUs, and accelerators.Comment: 17 pages, 11 figure
College of Nursing
Features
Celebrating Excellence — The College of Nursing honors leaders during 80th anniversary[Page] 2 — Photo gallery of honorees.[Page] 6 — A brief look at the college’s history.[Page] 12 — The first four-year class.[Page] 14 — The gala’s honorees.[Page] 23 — Class of 1965 gives back.[Page] 24 — Alumni profiles.
Department news[Page] 28- Faculty and professional staff publications.[Page] 30- Faculty and student awards and honors.[Page] 31- Deans’ distinguished lecture.[Page] 32- College honors.
Alumni news[Page] 32- In memoriam.[Page] 33- Stacey Tait-Goodale Thank you for making the 80th Gala a success.https://openprairie.sdstate.edu/con_mag/1001/thumbnail.jp
The Grizzly, April 12, 2007
Project Pericles Continues to Succeed in Community Service • Macs Lag in Environmental Friendliness According to Greenpeace • New Dorm Progress • Ursinus Freshmen Fall Behind in Collegiate Learning Assessment • Spread Your Legs and Turn Your Head and Cough • Relay for Life Fast Approaching • Ursinus, Break the Silence! • Nutrition Tips: Veggie Report • Opinions: Dear Mahmoud • Bears Terrorize McDaniel, Sit Atop CC Standings • Bears Finish Second at NCGA Championshipshttps://digitalcommons.ursinus.edu/grizzlynews/1737/thumbnail.jp
The Problem of Doping
In this Essay, we examine Professor Michael J. Sandel and Judge Richard A. Posner\u27s thoughts on how to draw the line between substances and techniques that are fair game and those that constitute doping; whether there is a difference between sport and spectacle; and the nature of the public’s interest in sport as an institution and in doping as a practice that risks its integrity. Although we do not agree with all of their conclusions, they have made serious contributions to the ongoing discussion of these issues. Their linedrawing work in particular deserves considered attention from WADA and other stakeholders as they continue to work toward a useful and defensible definition of the spirit of sport
Reverse Engineering Socialbot Infiltration Strategies in Twitter
Data extracted from social networks like Twitter are increasingly being used
to build applications and services that mine and summarize public reactions to
events, such as traffic monitoring platforms, identification of epidemic
outbreaks, and public perception about people and brands. However, such
services are vulnerable to attacks from socialbots automated accounts that
mimic real users seeking to tamper statistics by posting messages generated
automatically and interacting with legitimate users. Potentially, if created in
large scale, socialbots could be used to bias or even invalidate many existing
services, by infiltrating the social networks and acquiring trust of other
users with time. This study aims at understanding infiltration strategies of
socialbots in the Twitter microblogging platform. To this end, we create 120
socialbot accounts with different characteristics and strategies (e.g., gender
specified in the profile, how active they are, the method used to generate
their tweets, and the group of users they interact with), and investigate the
extent to which these bots are able to infiltrate the Twitter social network.
Our results show that even socialbots employing simple automated mechanisms are
able to successfully infiltrate the network. Additionally, using a
factorial design, we quantify infiltration effectiveness of different bot
strategies. Our analysis unveils findings that are key for the design of
detection and counter measurements approaches
Washington University Record, March 13, 1997
https://digitalcommons.wustl.edu/record/1751/thumbnail.jp
Georgia Southern Magazine
Campus News Research News Foundation News Sports Scene Pride on the Line Homecoming 2007 Chronicleshttps://digitalcommons.georgiasouthern.edu/georgia-southern/1006/thumbnail.jp
Volume 2013 - Issue 4 - Fall, 2013
https://scholar.rose-hulman.edu/rose_echoes/1082/thumbnail.jp
- …