45,348 research outputs found
Qualitative Assessment of the PAX Good Behavior Game Implementation
This paper reports on a program evaluation of the PAX Good Behavior Game (GBG), an evidence-based practice intervention designed to create a nurturing environment conducive to learning in elementary schools. To evaluate and improve the PAX Good Behavior Game, a focus group was conducted at the end of the 2016-17 academic year. A total of ten teachers and school administrators from schools who implemented the PAX Good Behavior Game (PAX professionals) participated in a focus group session and provided feedback about the program. Focus group questions assessed four program objectives: (1) environmental change, (2) personal well-being and stress levels, (3) engagement with parents, and (4) networking with other PAX professionals. Results indicated that the PAX GBG decreased problematic classroom behaviors, provided more instructional time for teachers, and generated public interest of the program in the home and community
SciTech News Volume 70, No. 4 (2016)
Columns and Reports
From the Editor 3
Division News
Science-Technology Division 4
SLA Annual Meeting 2016 Report (S. Kirk Cabeen Travel Stipend Award recipient) 6
Reflections on SLA Annual Meeting (Diane K. Foster International Student Travel Award recipient) 8
SLA Annual Meeting Report (Bonnie Hilditch International Librarian Award recipient)10
Chemistry Division 12
Engineering Division 15
Reflections from the 2016 SLA Conference (SPIE Digital Library Student Travel Stipend recipient)15
Fundamentals of Knowledge Management and Knowledge Services (IEEE Continuing Education Stipend recipient) 17
Makerspaces in Libraries: The Big Table, the Art Studio or Something Else? (by Jeremy Cusker) 19
Aerospace Section of the Engineering Division 21
Reviews
Sci-Tech Book News Reviews 22
Advertisements
IEEE 17
WeBuyBooks.net 2
Maker Movements, Do-It-Yourself Cultures and Participatory Design: Implications for HCI Research
Falling costs and the wider availability of computational components, platforms and ecosystems have enabled the expansion of maker movements and DIY cultures. This can be considered as a form of democratization of technology systems design, in alignment with the aims of Participatory Design approaches. However, this landscape is constantly evolving, and long-term implications for the HCI community are far from clear. The organizers of this one-day workshop invite participants to present their case studies, experiences and perspectives on the topic with the goal of increasing understanding within this area of research. The outcomes of the workshop will include the articulation of future research directions with the purpose of informing a research agenda, as well as the establishment of new collaborations and networks
CREATe 2012-2016: Impact on society, industry and policy through research excellence and knowledge exchange
On the eve of the CREATe Festival May 2016, the Centre published this legacy report (edited by Kerry Patterson & Sukhpreet Singh with contributions from consortium researchers)
ANCHOR: logically-centralized security for Software-Defined Networks
While the centralization of SDN brought advantages such as a faster pace of
innovation, it also disrupted some of the natural defenses of traditional
architectures against different threats. The literature on SDN has mostly been
concerned with the functional side, despite some specific works concerning
non-functional properties like 'security' or 'dependability'. Though addressing
the latter in an ad-hoc, piecemeal way, may work, it will most likely lead to
efficiency and effectiveness problems. We claim that the enforcement of
non-functional properties as a pillar of SDN robustness calls for a systemic
approach. As a general concept, we propose ANCHOR, a subsystem architecture
that promotes the logical centralization of non-functional properties. To show
the effectiveness of the concept, we focus on 'security' in this paper: we
identify the current security gaps in SDNs and we populate the architecture
middleware with the appropriate security mechanisms, in a global and consistent
manner. Essential security mechanisms provided by anchor include reliable
entropy and resilient pseudo-random generators, and protocols for secure
registration and association of SDN devices. We claim and justify in the paper
that centralizing such mechanisms is key for their effectiveness, by allowing
us to: define and enforce global policies for those properties; reduce the
complexity of controllers and forwarding devices; ensure higher levels of
robustness for critical services; foster interoperability of the non-functional
property enforcement mechanisms; and promote the security and resilience of the
architecture itself. We discuss design and implementation aspects, and we prove
and evaluate our algorithms and mechanisms, including the formalisation of the
main protocols and the verification of their core security properties using the
Tamarin prover.Comment: 42 pages, 4 figures, 3 tables, 5 algorithms, 139 reference
Capacity-building barriers to S3 implementation: an empirical framework for catch-up regions
In this paper, we investigate the implementation challenge of Smart Specialisation Strategies (S3) in catch-up regional environments, through the lens of capacity building. We analyse capacity building at two levels: micro-level (individual organisations) and meso-level (regional inter-organisational networks). We use empirical evidence from 50 interviews conducted in the period 2015–2017 from two Greek regions dramatically hit by the economic crisis (Crete and Central Macedonia). We argue that in the Cretan and Central Macedonian context, the difficulty of implementing S3 is directly linked with firms’ lack of adsorptive capability to exploit university-generated knowledge, university knowledge that is too abstract for firm’s to easily acquire, as well as to the capability of regional actors to build inter-organisational networking that fits their strategic needs
Overview of Polkadot and its Design Considerations
In this paper we describe the design components of the heterogenous
multi-chain protocol Polkadot and explain how these components help Polkadot
address some of the existing shortcomings of blockchain technologies. At
present, a vast number of blockchain projects have been introduced and employed
with various features that are not necessarily designed to work with each
other. This makes it difficult for users to utilise a large number of
applications on different blockchain projects. Moreover, with the increase in
number of projects the security that each one is providing individually becomes
weaker. Polkadot aims to provide a scalable and interoperable framework for
multiple chains with pooled security that is achieved by the collection of
components described in this paper
SciTech News Volume 71, No. 2 (2017)
Columns and Reports From the Editor 3
Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division 9 Aerospace Section of the Engineering Division 12 Architecture, Building Engineering, Construction and Design Section of the Engineering Division 14
Reviews Sci-Tech Book News Reviews 16
Advertisements IEEE
Engage D2.10 10th SESAR Innovation Days report
This report describes the tenth edition of the SESAR Innovation Days, which took place as a virtual event between 7th and 10th December 2020
- …