45,348 research outputs found

    Qualitative Assessment of the PAX Good Behavior Game Implementation

    Get PDF
    This paper reports on a program evaluation of the PAX Good Behavior Game (GBG), an evidence-based practice intervention designed to create a nurturing environment conducive to learning in elementary schools. To evaluate and improve the PAX Good Behavior Game, a focus group was conducted at the end of the 2016-17 academic year. A total of ten teachers and school administrators from schools who implemented the PAX Good Behavior Game (PAX professionals) participated in a focus group session and provided feedback about the program. Focus group questions assessed four program objectives: (1) environmental change, (2) personal well-being and stress levels, (3) engagement with parents, and (4) networking with other PAX professionals. Results indicated that the PAX GBG decreased problematic classroom behaviors, provided more instructional time for teachers, and generated public interest of the program in the home and community

    SciTech News Volume 70, No. 4 (2016)

    Get PDF
    Columns and Reports From the Editor 3 Division News Science-Technology Division 4 SLA Annual Meeting 2016 Report (S. Kirk Cabeen Travel Stipend Award recipient) 6 Reflections on SLA Annual Meeting (Diane K. Foster International Student Travel Award recipient) 8 SLA Annual Meeting Report (Bonnie Hilditch International Librarian Award recipient)10 Chemistry Division 12 Engineering Division 15 Reflections from the 2016 SLA Conference (SPIE Digital Library Student Travel Stipend recipient)15 Fundamentals of Knowledge Management and Knowledge Services (IEEE Continuing Education Stipend recipient) 17 Makerspaces in Libraries: The Big Table, the Art Studio or Something Else? (by Jeremy Cusker) 19 Aerospace Section of the Engineering Division 21 Reviews Sci-Tech Book News Reviews 22 Advertisements IEEE 17 WeBuyBooks.net 2

    Maker Movements, Do-It-Yourself Cultures and Participatory Design: Implications for HCI Research

    Get PDF
    Falling costs and the wider availability of computational components, platforms and ecosystems have enabled the expansion of maker movements and DIY cultures. This can be considered as a form of democratization of technology systems design, in alignment with the aims of Participatory Design approaches. However, this landscape is constantly evolving, and long-term implications for the HCI community are far from clear. The organizers of this one-day workshop invite participants to present their case studies, experiences and perspectives on the topic with the goal of increasing understanding within this area of research. The outcomes of the workshop will include the articulation of future research directions with the purpose of informing a research agenda, as well as the establishment of new collaborations and networks

    CREATe 2012-2016: Impact on society, industry and policy through research excellence and knowledge exchange

    Get PDF
    On the eve of the CREATe Festival May 2016, the Centre published this legacy report (edited by Kerry Patterson & Sukhpreet Singh with contributions from consortium researchers)

    ANCHOR: logically-centralized security for Software-Defined Networks

    Get PDF
    While the centralization of SDN brought advantages such as a faster pace of innovation, it also disrupted some of the natural defenses of traditional architectures against different threats. The literature on SDN has mostly been concerned with the functional side, despite some specific works concerning non-functional properties like 'security' or 'dependability'. Though addressing the latter in an ad-hoc, piecemeal way, may work, it will most likely lead to efficiency and effectiveness problems. We claim that the enforcement of non-functional properties as a pillar of SDN robustness calls for a systemic approach. As a general concept, we propose ANCHOR, a subsystem architecture that promotes the logical centralization of non-functional properties. To show the effectiveness of the concept, we focus on 'security' in this paper: we identify the current security gaps in SDNs and we populate the architecture middleware with the appropriate security mechanisms, in a global and consistent manner. Essential security mechanisms provided by anchor include reliable entropy and resilient pseudo-random generators, and protocols for secure registration and association of SDN devices. We claim and justify in the paper that centralizing such mechanisms is key for their effectiveness, by allowing us to: define and enforce global policies for those properties; reduce the complexity of controllers and forwarding devices; ensure higher levels of robustness for critical services; foster interoperability of the non-functional property enforcement mechanisms; and promote the security and resilience of the architecture itself. We discuss design and implementation aspects, and we prove and evaluate our algorithms and mechanisms, including the formalisation of the main protocols and the verification of their core security properties using the Tamarin prover.Comment: 42 pages, 4 figures, 3 tables, 5 algorithms, 139 reference

    Capacity-building barriers to S3 implementation: an empirical framework for catch-up regions

    Get PDF
    In this paper, we investigate the implementation challenge of Smart Specialisation Strategies (S3) in catch-up regional environments, through the lens of capacity building. We analyse capacity building at two levels: micro-level (individual organisations) and meso-level (regional inter-organisational networks). We use empirical evidence from 50 interviews conducted in the period 2015–2017 from two Greek regions dramatically hit by the economic crisis (Crete and Central Macedonia). We argue that in the Cretan and Central Macedonian context, the difficulty of implementing S3 is directly linked with firms’ lack of adsorptive capability to exploit university-generated knowledge, university knowledge that is too abstract for firm’s to easily acquire, as well as to the capability of regional actors to build inter-organisational networking that fits their strategic needs

    Overview of Polkadot and its Design Considerations

    Get PDF
    In this paper we describe the design components of the heterogenous multi-chain protocol Polkadot and explain how these components help Polkadot address some of the existing shortcomings of blockchain technologies. At present, a vast number of blockchain projects have been introduced and employed with various features that are not necessarily designed to work with each other. This makes it difficult for users to utilise a large number of applications on different blockchain projects. Moreover, with the increase in number of projects the security that each one is providing individually becomes weaker. Polkadot aims to provide a scalable and interoperable framework for multiple chains with pooled security that is achieved by the collection of components described in this paper

    SciTech News Volume 71, No. 2 (2017)

    Get PDF
    Columns and Reports From the Editor 3 Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division 9 Aerospace Section of the Engineering Division 12 Architecture, Building Engineering, Construction and Design Section of the Engineering Division 14 Reviews Sci-Tech Book News Reviews 16 Advertisements IEEE

    Engage D2.10 10th SESAR Innovation Days report

    Get PDF
    This report describes the tenth edition of the SESAR Innovation Days, which took place as a virtual event between 7th and 10th December 2020
    corecore