12,723 research outputs found
When Windmills Turn Into Giants: The Conundrum of Virtual Places
While many papers may claim that virtual environments have much to gain from architectural and urban planning theory, few seem to specify in any verifiable or falsifiable way, how notions of place and interaction are best combined and developed for specific needs. The following is an attempt to summarize a theory of place for virtual environments and explain both the shortcomings and the advantages of this theory
Consciousness: A Simple Information Theory Global Workspace Model
The asymptotic limit theorems of information theory permit a concise formulation of Bernard Baars' global workspace/global broadcast picture of consciousness, focusing on how networks of unconscious cognitive modules are driven by the classic 'no free lunch' argument into shifting, tunable, alliances having variable thresholds for signal detection. The model directly accounts for the punctuated characteristics of many conscious phenomena, and derives the inherent necessity of inattentional blindness and related effects
Developments in information technology, networks and services
A review of policy issues facing Scotland as it faces changing from an industrial society to a knowledge led economy. Identifies the key developments, external trends and internal pressures which library policy makers face. Identifies content creation, metadata, preservation, user support as the four key areas
A multi-player educational game for story writing
In this short paper, a multi-player interactive game called STORYWORLD BUILDER is described. The game enables children to collaboratively build a virtual “story world” and then role-play characters in that world. The educational purpose of the system is to motivate children to write better stories, by providing them with a collaborative, interactive, computer game-like environment in which stories can be enacted. We are interested in whether such a system can improve children’s story writing skills
Remote Sampling with Applications to General Entanglement Simulation
We show how to sample exactly discrete probability distributions whose
defining parameters are distributed among remote parties. For this purpose, von
Neumann's rejection algorithm is turned into a distributed sampling
communication protocol. We study the expected number of bits communicated among
the parties and also exhibit a trade-off between the number of rounds of the
rejection algorithm and the number of bits transmitted in the initial phase.
Finally, we apply remote sampling to the simulation of quantum entanglement in
its most general form possible, when an arbitrary number of parties share
systems of arbitrary dimensions on which they apply arbitrary measurements (not
restricted to being projective measurements). In case the dimension of the
systems and the number of possible outcomes per party is bounded by a constant,
it suffices to communicate an expected O(m^2) bits in order to simulate exactly
the outcomes that these measurements would have produced on those systems,
where m is the number of participants.Comment: 17 pages, 1 figure, 4 algorithms (protocols); Complete generalization
of previous paper arXiv:1303.5942 [cs.IT] -- Exact simulation of the GHZ
distribution -- by the same author
Taking Blockchain Seriously
In the present techno-political moment it is clear that ignoring or dismissing the hype surrounding blockchain is unwise, and certainly for regulatory authorities and governments who must keep a grip on the technology and those promoting it, in order to ensure democratic accountability and regulatory legitimacy within the blockchain ecosystem and beyond. Blockchain is telling (and showing) us something very important about the evolution of capital and neoliberal economic reason, and the likely impact in the near future on forms and patterns of work, social organization, and, crucially, on communities and individuals who lack influence over the technologies and data that increasingly shape and control their lives. In this short essay I introduce some of the problems in the regulation of blockchain and offer counter-narratives aimed at cutting through the hype fuelling the ascendency of this most contemporary of technologies
Recommended from our members
The Conundrum of Security in Modern Cloud Computing
In today’s economic climate organizations are seeking greater cost-saving measures, increased agility, and scalability that responds to the rapid changes in technology and business. Cloud computing, with its low cost pay-as-you-go business model, is helping organizations manage these changes while transforming information technology (IT) into an engine that drives business. Benefits from on-demand clouds provide users greater portability and the ability to access information from virtually anywhere: at home, a client location, when traveling, or at the office. The reduced costs and increased flexibility, however, associated with cloud computing also come with complex security issues and increased overall risk. When cloud services are moved beyond organizational boundaries, outside the border firewall, security is heightened for most organizations and navigating the complexity of these environments can be daunting. In this research paper we seek to help organizations make pragmatic decisions about where and when to use cloud solutions by outlining specific security issues that enterprises should address. We use external research sources and explore current security trends within cloud computing in order to provide background information, related research, and conclusions. We make use of colleagues, textbooks, peer reviewed journal articles, and Internet websites related to information technology and information security. Each section of our research is formatted similarly and presents pertinent security information, techniques, and tools that organizations would need in order to make relevant decisions when utilizing Software as a Service (SaaS), Platform as a Service (PaaS), or Infrastructure as a Service (IaaS)
- …