804 research outputs found

    A Case Study on Prototyping Power Management Protocols for Sensor Networks

    Full text link

    Wear and Care Feminisms at a Long Maker Table

    Get PDF
    Although there is a deep history of feminist engagement with technology, the FemTechNet initiative (a feminist collective of which we are both a part) argues that such history is often hidden and that feminist thinkers are frequently siloed. At the same time, initiatives to promote critical making, acts of “shared construction” in which makers work to understand both the technologies and their social environments, often exclude women and girls from hacker/makerspaces that require both explicit permissions and access to implicit reserves of tacit knowledge. Even attempts to provide superficial hospitality can inflict microagressions on those who feel excluded from the sites of technology. When these bastions for tinkering under the hood promote “pinkification” with hyper-feminized projects and materials empha - sizing servility, consumerism, or beauty culture, the results are often counterproductive. Take, for example, Google’s recent “Made with Code” effort, which emphasized accessories and selfies as projects appropriate for girls. Even the otherwise admirable “Girls Who Code” site tends to rely on the default design schemes of stereotypical gender typing, including a curling cursive script for section heads, a color palette dominated by a rose-pink, and the iconography of sisterhood and empowerment in the graphics and scrolling images.https://scholarworks.wm.edu/asbookchapters/1004/thumbnail.jp

    An analysis of the application of AI to the development of intelligent aids for flight crew tasks

    Get PDF
    This report presents the results of a study aimed at developing a basis for applying artificial intelligence to the flight deck environment of commercial transport aircraft. In particular, the study was comprised of four tasks: (1) analysis of flight crew tasks, (2) survey of the state-of-the-art of relevant artificial intelligence areas, (3) identification of human factors issues relevant to intelligent cockpit aids, and (4) identification of artificial intelligence areas requiring further research

    Space station data system analysis/architecture study. Task 2: Options development, DR-5. Volume 3: Programmatic options

    Get PDF
    Task 2 in the Space Station Data System (SSDS) Analysis/Architecture Study is the development of an information base that will support the conduct of trade studies and provide sufficient data to make design/programmatic decisions. This volume identifies the preferred options in the programmatic category and characterizes these options with respect to performance attributes, constraints, costs, and risks. The programmatic category includes methods used to administrate/manage the development, operation and maintenance of the SSDS. The specific areas discussed include standardization/commonality; systems management; and systems development, including hardware procurement, software development and system integration, test and verification

    Executable system architecting using systems modeling language in conjunction with Colored Petri Nets - a demonstration using the GEOSS network centric system

    Get PDF
    Models and simulation furnish abstractions to manage complexities allowing engineers to visualize the proposed system and to analyze and validate system behavior before constructing it. Unified Modeling Language (UML) and its systems engineering extension, Systems Modeling Language (SysML), provide a rich set of diagrams for systems specification. However, the lack of executable semantics of such notations limits the capability of analyzing and verifying defined specifications. This research has developed an executable system architecting framework based on SysML-CPN transformation, which introduces dynamic model analysis into SysML modeling by mapping SysML notations to Colored Petri Net (CPN), a graphical language for system design, specification, simulation, and verification. A graphic user interface was also integrated into the CPN model to enhance the model-based simulation. A set of methodologies has been developed to achieve this framework. The aim is to investigate system wide properties of the proposed system, which in turn provides a basis for system reconfiguration --Abstract, page iii

    Makers at School, Educational Robotics and Innovative Learning Environments

    Get PDF
    This open access book contains observations, outlines, and analyses of educational robotics methodologies and activities, and developments in the field of educational robotics emerging from the findings presented at FabLearn Italy 2019, the international conference that brought together researchers, teachers, educators and practitioners to discuss the principles of Making and educational robotics in formal, non-formal and informal education. The editors’ analysis of these extended versions of papers presented at FabLearn Italy 2019 highlight the latest findings on learning models based on Making and educational robotics. The authors investigate how innovative educational tools and methodologies can support a novel, more effective and more inclusive learner-centered approach to education. The following key topics are the focus of discussion: Makerspaces and Fab Labs in schools, a maker approach to teaching and learning; laboratory teaching and the maker approach, models, methods and instruments; curricular and non-curricular robotics in formal, non-formal and informal education; social and assistive robotics in education; the effect of innovative spaces and learning environments on the innovation of teaching, good practices and pilot projects

    Design, Formal Modeling, and Validation of Cloud Storage Systems using Maude

    Get PDF
    To deal with large amounts of data while offering high availability, throughput and low latency, cloud computing systems rely on distributed, partitioned, and replicated data stores. Such cloud storage systems are complex software artifacts that are very hard to design and analyze. We argue that formal specification and model checking analysis should significantly improve their design and validation. In particular, we propose rewriting logic and its accompanying Maude tools as a suitable framework for formally specifying and analyzing both the correctness and the performance of cloud storage systems. This chapter largely focuses on how we have used rewriting logic to model and analyze industrial cloud storage systems such as Google's Megastore, Apache Cassandra, Apache ZooKeeper, and RAMP. We also touch on the use of formal methods at Amazon Web Services.This work is based on research sponsored by the Air Force Research Laboratory and the Air Force Office of Scientific Research, under agreement number FA8750-11-2-0084. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon. This work is also based on research supported by the National Science Foundation under Grant Nos. NSF CNS 1409416 and NSF CNS 1319527.Ope

    Working Notes from the 1992 AAAI Workshop on Automating Software Design. Theme: Domain Specific Software Design

    Get PDF
    The goal of this workshop is to identify different architectural approaches to building domain-specific software design systems and to explore issues unique to domain-specific (vs. general-purpose) software design. Some general issues that cut across the particular software design domain include: (1) knowledge representation, acquisition, and maintenance; (2) specialized software design techniques; and (3) user interaction and user interface

    Compact Deterministic Self-Stabilizing Leader Election: The Exponential Advantage of Being Talkative

    Full text link
    This paper focuses on compact deterministic self-stabilizing solutions for the leader election problem. When the protocol is required to be \emph{silent} (i.e., when communication content remains fixed from some point in time during any execution), there exists a lower bound of Omega(\log n) bits of memory per node participating to the leader election (where n denotes the number of nodes in the system). This lower bound holds even in rings. We present a new deterministic (non-silent) self-stabilizing protocol for n-node rings that uses only O(\log\log n) memory bits per node, and stabilizes in O(n\log^2 n) rounds. Our protocol has several attractive features that make it suitable for practical purposes. First, the communication model fits with the model used by existing compilers for real networks. Second, the size of the ring (or any upper bound on this size) needs not to be known by any node. Third, the node identifiers can be of various sizes. Finally, no synchrony assumption, besides a weakly fair scheduler, is assumed. Therefore, our result shows that, perhaps surprisingly, trading silence for exponential improvement in term of memory space does not come at a high cost regarding stabilization time or minimal assumptions
    • …
    corecore