76,866 research outputs found

    RFCs, MOOs, LMSs: Assorted Educational Devices\ud

    Get PDF
    This paper discusses implicit social consequences of four basic internet protocols. The results are then related to the field of computer-assisted teaching. An educational on-line community is described and compared to the emerging standard of web-based learning management.\u

    Toward a document evaluation methodology: What does research tell us about the validity and reliability of evaluation methods?

    Get PDF
    Although the usefulness of evaluating documents has become generally accepted among communication professionals, the supporting research that puts evaluation practices empirically to the test is only beginning to emerge. This article presents an overview of the available research on troubleshooting evaluation methods. Four lines of research are distinguished concerning the validity of evaluation methods, sample composition, sample size, and the implementation of evaluation results during revisio

    Isabelle/PIDE as Platform for Educational Tools

    Full text link
    The Isabelle/PIDE platform addresses the question whether proof assistants of the LCF family are suitable as technological basis for educational tools. The traditionally strong logical foundations of systems like HOL, Coq, or Isabelle have so far been counter-balanced by somewhat inaccessible interaction via the TTY (or minor variations like the well-known Proof General / Emacs interface). Thus the fundamental question of math education tools with fully-formal background theories has often been answered negatively due to accidental weaknesses of existing proof engines. The idea of "PIDE" (which means "Prover IDE") is to integrate existing provers like Isabelle into a larger environment, that facilitates access by end-users and other tools. We use Scala to expose the proof engine in ML to the JVM world, where many user-interfaces, editor frameworks, and educational tools already exist. This shall ultimately lead to combined mathematical assistants, where the logical engine is in the background, without obstructing the view on applications of formal methods, formalized mathematics, and math education in particular.Comment: In Proceedings THedu'11, arXiv:1202.453

    Semantics for incident identification and resolution reports

    Get PDF
    In order to achieve a safe and systematic treatment of security protocols, organizations release a number of technical briefings describing how to detect and manage security incidents. A critical issue is that this document set may suffer from semantic deficiencies, mainly due to ambiguity or different granularity levels of description and analysis. An approach to face this problem is the use of semantic methodologies in order to provide better Knowledge Externalization from incident protocols management. In this article, we propose a method based on semantic techniques for both, analyzing and specifying (meta)security requirements on protocols used for solving security incidents. This would allow specialist getting better documentation on their intangible knowledge about them.Ministerio de Economía y Competitividad TIN2013-41086-

    The battle between standards: TCP/IP vs OSI victory through path dependency or by quality?

    Get PDF
    Between the end of the 1970s and 1994 a fierce competition existed between two possible standards, TCP/IP and OSI, to solve the problem of interoperability of computer networks. Around 1994 it became evident that TCP/IP and not OSI had become the dominant standard. We specifically deal with the question whether the current dominance of the TCP/IP standard is the result of third degree path dependency or of choices based on assessments of it being technical-economically superior to the OSI standard and protocols

    Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning

    Get PDF
    The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts. To protect authorities and their clients proactively from undetected exploits and misuse, we introduce CoSi, a scalable witness cosigning protocol ensuring that every authoritative statement is validated and publicly logged by a diverse group of witnesses before any client will accept it. A statement S collectively signed by W witnesses assures clients that S has been seen, and not immediately found erroneous, by those W observers. Even if S is compromised in a fashion not readily detectable by the witnesses, CoSi still guarantees S's exposure to public scrutiny, forcing secrecy-minded attackers to risk that the compromise will soon be detected by one of the W witnesses. Because clients can verify collective signatures efficiently without communication, CoSi protects clients' privacy, and offers the first transparency mechanism effective against persistent man-in-the-middle attackers who control a victim's Internet access, the authority's secret key, and several witnesses' secret keys. CoSi builds on existing cryptographic multisignature methods, scaling them to support thousands of witnesses via signature aggregation over efficient communication trees. A working prototype demonstrates CoSi in the context of timestamping and logging authorities, enabling groups of over 8,000 distributed witnesses to cosign authoritative statements in under two seconds.Comment: 20 pages, 7 figure

    BlogForever D3.2: Interoperability Prospects

    Get PDF
    This report evaluates the interoperability prospects of the BlogForever platform. Therefore, existing interoperability models are reviewed, a Delphi study to identify crucial aspects for the interoperability of web archives and digital libraries is conducted, technical interoperability standards and protocols are reviewed regarding their relevance for BlogForever, a simple approach to consider interoperability in specific usage scenarios is proposed, and a tangible approach to develop a succession plan that would allow a reliable transfer of content from the current digital archive to other digital repositories is presented

    Global information technology infrastructure for a global non-profit organisation : a thesis presented in partial fulfilment of the requirements for the degree of Master of Technology at Massey University

    Get PDF
    Page 103 missing from vault and scanned copyWith the recent worldwide growth of the Internet, computers are becoming interconnected in a global communications network. Most people view the Internet as a universal communications medium that can replace telephone, television, and radio. Historically, for organisations and enterprises that could afford to do so, expensive telecommunication lines and Wide Area Network technologies were used for global communications, which allowed computers to communicate using proprietary protocols. For non-profit organisations in particular, the Internet has made it possible to connect offices and individuals, using open standard protocols, at a fraction of the cost of other alternatives. This study focuses on the investigation and development of a global communication system and information technology (IT) infrastructure that uses the Internet as its communication platform for a particular non-profit organisation, OMF International. Without a clear understanding of the limitations of the technologies involved, the development of an IT project is likely to be flawed or fail. (Standish Group, 1995) The findings from this investigation revealed that a global communication system and IT infrastructure, suitable for OMF International, needed to overcome limitations in the use and access of the Internet, the unreliability of different email systems to deliver email messages, and financial and human resource constraints. The study found that methods used in 'for-profit' organisations for the development of an IT infrastructure, were applicable to this non-profit organisation, resulting in the successful implementation of a global communication system and IT infrastructure. The choice of IT solutions and technologies within OMF was often based on functionality rather than feasibility, and its global IT infrastructure requirements were overlooked. The study found that by comparison Lotus Notes' client/server IT infrastructure requirements were considerably less than that of Microsoft Exchange client/server, however, alternative low-cost open standard messaging options were more affordable. Conclusively, open standard IT solutions for global communications are better suited that for this non-profit organisation, than proprietary solutions. The study also highlighted the need for an IT architecture, that would provide a plan and strategic context for future IT development within OMF International, which would overcome problems with concurrent IT projects using different technologies

    Great Bay Estuary Water Quality Monitoring Program: Quality Assurance Project Plan 2019 - 2023

    Get PDF
    corecore