76,866 research outputs found
RFCs, MOOs, LMSs: Assorted Educational Devices\ud
This paper discusses implicit social consequences of four basic internet protocols. The results are then related to the field of computer-assisted teaching. An educational on-line community is described and compared to the emerging standard of web-based learning management.\u
Toward a document evaluation methodology: What does research tell us about the validity and reliability of evaluation methods?
Although the usefulness of evaluating documents has become generally accepted among communication professionals, the supporting research that puts evaluation practices empirically to the test is only beginning to emerge. This article presents an overview of the available research on troubleshooting evaluation methods. Four lines of research are distinguished concerning the validity of evaluation methods, sample composition, sample size, and the implementation of evaluation results during revisio
Isabelle/PIDE as Platform for Educational Tools
The Isabelle/PIDE platform addresses the question whether proof assistants of
the LCF family are suitable as technological basis for educational tools. The
traditionally strong logical foundations of systems like HOL, Coq, or Isabelle
have so far been counter-balanced by somewhat inaccessible interaction via the
TTY (or minor variations like the well-known Proof General / Emacs interface).
Thus the fundamental question of math education tools with fully-formal
background theories has often been answered negatively due to accidental
weaknesses of existing proof engines.
The idea of "PIDE" (which means "Prover IDE") is to integrate existing
provers like Isabelle into a larger environment, that facilitates access by
end-users and other tools. We use Scala to expose the proof engine in ML to the
JVM world, where many user-interfaces, editor frameworks, and educational tools
already exist. This shall ultimately lead to combined mathematical assistants,
where the logical engine is in the background, without obstructing the view on
applications of formal methods, formalized mathematics, and math education in
particular.Comment: In Proceedings THedu'11, arXiv:1202.453
Semantics for incident identification and resolution reports
In order to achieve a safe and systematic treatment of security protocols, organizations release a number of technical
briefings describing how to detect and manage security incidents. A critical issue is that this document set may suffer from
semantic deficiencies, mainly due to ambiguity or different granularity levels of description and analysis. An approach to
face this problem is the use of semantic methodologies in order to provide better Knowledge Externalization from incident
protocols management. In this article, we propose a method based on semantic techniques for both, analyzing and specifying
(meta)security requirements on protocols used for solving security incidents. This would allow specialist getting better
documentation on their intangible knowledge about them.Ministerio de Economía y Competitividad TIN2013-41086-
The battle between standards: TCP/IP vs OSI victory through path dependency or by quality?
Between the end of the 1970s and 1994 a fierce competition existed between two possible standards, TCP/IP and OSI, to solve the problem of interoperability of computer networks. Around 1994 it became evident that TCP/IP and not OSI had become the dominant standard. We specifically deal with the question whether the current dominance of the TCP/IP standard is the result of third degree path dependency or of choices based on assessments of it being technical-economically superior to the OSI standard and protocols
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning
The secret keys of critical network authorities - such as time, name,
certificate, and software update services - represent high-value targets for
hackers, criminals, and spy agencies wishing to use these keys secretly to
compromise other hosts. To protect authorities and their clients proactively
from undetected exploits and misuse, we introduce CoSi, a scalable witness
cosigning protocol ensuring that every authoritative statement is validated and
publicly logged by a diverse group of witnesses before any client will accept
it. A statement S collectively signed by W witnesses assures clients that S has
been seen, and not immediately found erroneous, by those W observers. Even if S
is compromised in a fashion not readily detectable by the witnesses, CoSi still
guarantees S's exposure to public scrutiny, forcing secrecy-minded attackers to
risk that the compromise will soon be detected by one of the W witnesses.
Because clients can verify collective signatures efficiently without
communication, CoSi protects clients' privacy, and offers the first
transparency mechanism effective against persistent man-in-the-middle attackers
who control a victim's Internet access, the authority's secret key, and several
witnesses' secret keys. CoSi builds on existing cryptographic multisignature
methods, scaling them to support thousands of witnesses via signature
aggregation over efficient communication trees. A working prototype
demonstrates CoSi in the context of timestamping and logging authorities,
enabling groups of over 8,000 distributed witnesses to cosign authoritative
statements in under two seconds.Comment: 20 pages, 7 figure
BlogForever D3.2: Interoperability Prospects
This report evaluates the interoperability prospects of the BlogForever platform. Therefore, existing interoperability models are reviewed, a Delphi study to identify crucial aspects for the interoperability of web archives and digital libraries is conducted, technical interoperability standards and protocols are reviewed regarding their relevance for BlogForever, a simple approach to consider interoperability in specific usage scenarios is proposed, and a tangible approach to develop a succession plan that would allow a reliable transfer of content from the current digital archive to other digital repositories is presented
Global information technology infrastructure for a global non-profit organisation : a thesis presented in partial fulfilment of the requirements for the degree of Master of Technology at Massey University
Page 103 missing from vault and scanned copyWith the recent worldwide growth of the Internet, computers are becoming interconnected in a global communications network. Most people view the Internet as a universal communications medium that can replace telephone, television, and radio. Historically, for organisations and enterprises that could afford to do so, expensive telecommunication lines and Wide Area Network technologies were used for global communications, which allowed computers to communicate using proprietary protocols. For non-profit organisations in particular, the Internet has made it possible to connect offices and individuals, using open standard protocols, at a fraction of the cost of other alternatives. This study focuses on the investigation and development of a global communication system and information technology (IT) infrastructure that uses the Internet as its communication platform for a particular non-profit organisation, OMF International. Without a clear understanding of the limitations of the technologies involved, the development of an IT project is likely to be flawed or fail. (Standish Group, 1995) The findings from this investigation revealed that a global communication system and IT infrastructure, suitable for OMF International, needed to overcome limitations in the use and access of the Internet, the unreliability of different email systems to deliver email messages, and financial and human resource constraints. The study found that methods used in 'for-profit' organisations for the development of an IT infrastructure, were applicable to this non-profit organisation, resulting in the successful implementation of a global communication system and IT infrastructure. The choice of IT solutions and technologies within OMF was often based on functionality rather than feasibility, and its global IT infrastructure requirements were overlooked. The study found that by comparison Lotus Notes' client/server IT infrastructure requirements were considerably less than that of Microsoft Exchange client/server, however, alternative low-cost open standard messaging options were more affordable. Conclusively, open standard IT solutions for global communications are better suited that for this non-profit organisation, than proprietary solutions. The study also highlighted the need for an IT architecture, that would provide a plan and strategic context for future IT development within OMF International, which would overcome problems with concurrent IT projects using different technologies
- …