409,673 research outputs found
Fintech and Secured Transactions Systems of the Future
Syftet med den här studien var att undersöka hur pedagoger tänker kring sitt förhållningssätt i konflikter och vilka effekter de tror att förhållningssättet kan få i barngruppen. Studiens metod har varit kvalitativa intervjuer där sex pedagoger från olika förskolor har deltagit. Resultatet visade att deltagarna hela tiden reflekterar över sitt förhållningssätt till konflikter och varför konflikter uppstår. Något som alla deltagare belyste var att det är viktigt att barnen ges verktyg för att klara konflikter själva. Flera olika strategier kunde ses på hur konflikthantering går till men mycket handlar om bemötande, förklaringar och att alla i slutändan ska känna sig nöjda. Alla deltagande ansåg att konflikter är lärande men på olika plan. Bland annat handlar det om ett lärande utifrån den gemensamma respekt man bör ha mot varandra men även det sociala samspelet nämns. De slutsatser som kan dras är att konflikthantering i förskolan är en viktig del där pedagogens förhållningssätt påverkar konfliktens utgång. Att ge barnen verktyg för att klara konflikter själva ses som en bra start och en central del i konflikthantering hos deltagarna
Policy-agnostic programming on the client-side
Browser security has become a major concern especially due to web pages becoming more complex. These web applications handle a lot of information, including sensitive data that may be vulnerable to attacks like data exfiltration, cross-site scripting (XSS), etc. Most modern browsers have security mechanisms in place to prevent such attacks but they still fall short in preventing more advanced attacks like evolved variants of data exfiltration. Moreover, there is no standard that is followed to implement security into the browser.
A lot of research has been done in the field of information flow security that could prove to be helpful in solving the problem of securing the client-side. Policy- agnostic programming is a programming paradigm that aims to make implementation of information flow security in real world systems more flexible. In this paper, we explore the use of policy-agnostic programming on the client-side and how it will help prevent common client-side attacks. We verify our results through a client-side salary management application. We show a possible attack and how our solution would prevent such an attack
The Possibility of Transfer(?): A Comprehensive Approach to the International Criminal Tribunal for Rwanda’s Rule 11bis To Permit Transfer to Rwandan Domestic Courts
We present a learned image compression system based on GANs, operating at
extremely low bitrates. Our proposed framework combines an encoder,
decoder/generator and a multi-scale discriminator, which we train jointly for a
generative learned compression objective. The model synthesizes details it
cannot afford to store, obtaining visually pleasing results at bitrates where
previous methods fail and show strong artifacts. Furthermore, if a semantic
label map of the original image is available, our method can fully synthesize
unimportant regions in the decoded image such as streets and trees from the
label map, proportionally reducing the storage cost. A user study confirms that
for low bitrates, our approach is preferred to state-of-the-art methods, even
when they use more than double the bits.Comment: E. Agustsson, M. Tschannen, and F. Mentzer contributed equally to
this work. ICCV 2019 camera ready versio
Recommended from our members
Security-Informed Safety: Supporting Stakeholders with Codes of Practice
Codes of practice provide principles and guidance on how organizations can incorporate security considerations into their safety engineering lifecycle and become more security minded
- …