30,116 research outputs found

    Martin Gardner and His Influence on Recreational Math

    Get PDF
    Recreational mathematics is a relatively new field in the world of mathematics. While sometimes overlooked as frivolous since those who practice it need no advanced knowledge of the subject, recreational mathematics is a perfect transition for people to experience the joy in logically establishing a solution. Martin Gardner recognized that this pattern of proving solutions to questions is how mathematics progresses. From his childhood on, Gardner greatly influenced the mathematical world. Although not a mathematician, he inspired many to pursue careers and make advancements in mathematics during his 25-year career with Scientific American. He encouraged novices to expand their knowledge, enlightened professionals of computer science developments, and established his own proofs

    The Strategic Adaptation of Party Organizations to New Information and Communication Technologies : A Study of Catalan and Spanish Parties

    Get PDF
    Aquest document se centra en els casos dels dos principals partits espanyols (PP i PSOE) i catalans (PSC i CDC) en el període immediatament després de les eleccions generals espanyoles de maig de 2008, quan aquests celebraren els seus congressos. En general, es poden distingir tres tipus d'actors: en primer lloc, els ciberactivistes que tracten d'obtenir el reconeixement formal de la seva activitat en els seus partits. Així com, els líders del partit que poden intentar promoure la presència del partit en el ciberespai, però que també poden romandre indecisos perquè no és clar l'impacte electoral a la xarxa del ciberactivisme. Finalment, alguns militants tradicionals (off-line) solen ser reticents al reconeixement del ciberactivisme perquè amenaça les recompenses previstes dins del partit. Aquest article mostra com els nostres partits varen respondre al desafiament del ciberactivisme i arriba a la conclusió que la seva situació electoral, mediada per la seva ideologia, estructura organitzativa i el tipus de militància, poden ajudar-nos a comprendre el grau diferent d'institucionalització en l'organització del partit.Este documento se centra en los casos de los dos principales partidos españoles (PP y PSOE) y catalanes (PSC y CDC) en el período inmediatamente después de las elecciones generales de mayo de 2008, cuando estos celebraron sus congresos. En general, se pueden distinguir tres tipos de actores: en primer lugar, los ciberactivistas que tratan de obtener el reconocimiento formal de su actividad en sus partidos. Así como, los líderes del partido que pueden intentar promover la presencia del partido en el ciberespacio, pero que también pueden permanecer indecisos porque no está claro el impacto electoral en la red del ciberactivismo. Finalmente, algunos militantes tradicionales (off-line) suelen ser reticentes al reconocimiento del ciberactivismo porque amenaza las recompensas previstas dentro del partido. Este artículo muestra cómo nuestros partidos respondieron al desafío del ciberactivismo y llega a la conclusión de que su situación electoral, mediada por su ideología, estructura organizativa y el tipo de militancia, pueden ayudarnos a comprender el grado diferente de institucionalización en la organización del partido.This paper focuses on the cases of the two major Spanish (PP and PSOE) and Catalan parties (PSC and CDC) in the period just after the Spanish general elections of May 2008, when these parties held their party conferences. In general, three kind of actors can be distinguished: first, cyber-activists that try to get formal recognition of their activity in their parties. Then, party leaders that can try to promote the presence of the party in cyberspace but that can also remain undecided because it is not clear the net electoral impact of the cyber-activism. Finally, some traditional off-line militants are typically reluctant to the recognizance of the cyber-activism because it threatens their expected payoffs within the party. This paper shows how our parties responded to the challenge of cyber-activism and concludes that their electoral situation, mediated by their ideology, organizational structure and type of membership, can help us to understand their differential degree of party organizational institutionalization

    Man-machine interface analysis of the flight design system

    Get PDF
    The objective of the current effort was to perform a broad analysis of the human factors issues involved in the design of the Flight Design System (FDS). The analysis was intended to include characteristics of the system itself, such as: (1) basic structure and functional capabilities of FDS; (2) user backgrounds, capabilities, and possible modes of use; (3) FDS interactive dialogue, problem solving aids; (4) system data management capabilities; and to include, as well, such system related matters as: (1) flight design team structure; (2) roles of technicians; (3) user training; and (4) methods of evaluating system performance. Wherever possible, specific recommendations are made. In other cases, the issues which seem most important are identified. In some cases, additional analyses or experiments which might provide resolution are suggested

    Understanding Internet topology: principles, models, and validation

    Get PDF
    Building on a recent effort that combines a first-principles approach to modeling router-level connectivity with a more pragmatic use of statistics and graph theory, we show in this paper that for the Internet, an improved understanding of its physical infrastructure is possible by viewing the physical connectivity as an annotated graph that delivers raw connectivity and bandwidth to the upper layers in the TCP/IP protocol stack, subject to practical constraints (e.g., router technology) and economic considerations (e.g., link costs). More importantly, by relying on data from Abilene, a Tier-1 ISP, and the Rocketfuel project, we provide empirical evidence in support of the proposed approach and its consistency with networking reality. To illustrate its utility, we: 1) show that our approach provides insight into the origin of high variability in measured or inferred router-level maps; 2) demonstrate that it easily accommodates the incorporation of additional objectives of network design (e.g., robustness to router failure); and 3) discuss how it complements ongoing community efforts to reverse-engineer the Internet

    Redesigning pictographs for patients with low health literacy and establishing preliminary steps for delivery via smart phones.

    Get PDF
    BackgroundPictographs (or pictograms) have been widely utilized to convey medication related messages and to address nonadherence among patients with low health literacy. Yet, patients do not always interpret the intended messages on commonly used pictographs correctly and there are questions how they may be delivered on mobile devices.ObjectiveOur objectives are to refine a set of pictographs to use as medication reminders and to establish preliminary steps for delivery via smart phones.MethodsCard sorting was used to identify existing pictographs that focus group members found "not easy" to understand. Participants then explored improvements to these pictographs while iterations were sketched in real-time by a graphic artist. Feedback was also solicited on how selected pictographs might be delivered via smart phones in a sequential reminder message. The study was conducted at a community learning center that provides literacy services to underserved populations in Seattle, WA. Participants aged 18 years and older who met the criteria for low health literacy using S-TOFHLA were recruited.ResultsAmong the 45 participants screened for health literacy, 29 were eligible and consented to participate. Across four focus group sessions, participants examined 91 commonly used pictographs, 20 of these were ultimately refined to improve comprehensibility using participatory design approaches. All participants in the fifth focus group owned and used cell phones and provided feedback on preferred sequencing of pictographs to represent medication messages.ConclusionLow literacy adults found a substantial number of common medication label pictographs difficult to understand. Participative design processes helped generate new pictographs, as well as feedback on the sequencing of messages on cell phones, that may be evaluated in future research

    Hang With Your Buddies to Resist Intersection Attacks

    Full text link
    Some anonymity schemes might in principle protect users from pervasive network surveillance - but only if all messages are independent and unlinkable. Users in practice often need pseudonymity - sending messages intentionally linkable to each other but not to the sender - but pseudonymity in dynamic networks exposes users to intersection attacks. We present Buddies, the first systematic design for intersection attack resistance in practical anonymity systems. Buddies groups users dynamically into buddy sets, controlling message transmission to make buddies within a set behaviorally indistinguishable under traffic analysis. To manage the inevitable tradeoffs between anonymity guarantees and communication responsiveness, Buddies enables users to select independent attack mitigation policies for each pseudonym. Using trace-based simulations and a working prototype, we find that Buddies can guarantee non-trivial anonymity set sizes in realistic chat/microblogging scenarios, for both short-lived and long-lived pseudonyms.Comment: 15 pages, 8 figure

    Women of Europe Newsletter No. 24, February 1992

    Get PDF

    Data display and analysis

    Get PDF
    Graphical character recognizer and data displa
    • …
    corecore