248,262 research outputs found

    To Tag or Not To Tag: The Interplay of the Twitch Tag System and LGBTQIA+ Visibility in Live Streaming

    Get PDF
    Video Game Live Streaming (VGLS) has become increasingly popular in recent years. Twitch, one of the largest streaming sites, has implemented measures to protect and promote marginalized groups, including the LGBTQIA+ community. One example is the "LGBTQIA+" tag - a tag a streamer can attach to their steam. However, little is known regarding how the Twitch VGLS community actually reacts to this design feature and how such a feature affects LGBTQIA+ streamers’ online presence and experiences of visibility. By qualitatively analyzing 381 threads and comments from the Twitch subreddit (r/Twitch), in this paper we identify the impacts of the Twitch Tag system on the VGLS community’s perceptions of gender and sexuality in streaming, the streaming community’s ability to find LGBTQIA+ streamers, and harassment towards LGBTQIA+ streamers. We not only expand existing knowledge of LGBTQIA+ gamers’ unique experiences of online presence and visibility in streaming but also provide potential design recommendations for future live streaming platforms to better support LGBTQIA+ streamers and viewers

    To Tag or Not to Tag ? Harvesting Adjacent Metadata in Large-Scale Tagging Systems

    Get PDF
    We present HAMLET, a suite of principles, scoring models and algorithms to automatically propagate metadata along edges in a document neighborhood. As a showcase scenario we consider tag prediction in community-based Web 2.0 tagging applications. Experiments using real-world data demonstrate the viability of our approach in large-scale environments where tags are scarce. To the best of our knowledge, HAMLET is the first system to promote an efficient and precise reuse of shared metadata in highly dynamic, large-scale Web 2.0 tagging systems

    Preliminary results in tag disambiguation using DBpedia

    Get PDF
    The availability of tag-based user-generated content for a variety of Web resources (music, photos, videos, text, etc.) has largely increased in the last years. Users can assign tags freely and then use them to share and retrieve information. However, tag-based sharing and retrieval is not optimal due to the fact that tags are plain text labels without an explicit or formal meaning, and hence polysemy and synonymy should be dealt with appropriately. To ameliorate these problems, we propose a context-based tag disambiguation algorithm that selects the meaning of a tag among a set of candidate DBpedia entries, using a common information retrieval similarity measure. The most similar DBpedia en-try is selected as the one representing the meaning of the tag. We describe and analyze some preliminary results, and discuss about current challenges in this area

    Transitions between homophilic and heterophilic modes of cooperation

    Full text link
    Cooperation is ubiquitous in biological and social systems. Previous studies revealed that a preference toward similar appearance promotes cooperation, a phenomenon called tag-mediated cooperation or communitarian cooperation. This effect is enhanced when a spatial structure is incorporated, because space allows agents sharing an identical tag to regroup to form locally cooperative clusters. In spatially distributed settings, one can also consider migration of organisms, which has a potential to further promote evolution of cooperation by facilitating spatial clustering. However, it has not yet been considered in spatial tag-mediated cooperation models. Here we show, using computer simulations of a spatial model of evolutionary games with organismal migration, that tag-based segregation and homophilic cooperation arise for a wide range of parameters. In the meantime, our results also show another evolutionarily stable outcome, where a high level of heterophilic cooperation is maintained in spatially well-mixed patterns. We found that these two different forms of tag-mediated cooperation appear alternately as the parameter for temptation to defect is increased.Comment: 16 pages, 7 figure

    Practical Schemes For Privacy & Security Enhanced RFID

    Full text link
    Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access control to the tag that cater for more complex usage scenarios. In this paper we investigate such scenarios, and propose a model and corresponding privacy friendly protocols for efficient and fine-grained management of access permissions to tags. In particular we propose an efficient mutual authentication protocol between a tag and a reader that achieves a reasonable level of privacy, using only symmetric key cryptography on the tag, while not requiring a costly key-search algorithm at the reader side. Moreover, our protocol is able to recover from stolen readers.Comment: 18 page

    Characterization of key triacylglycerol biosynthesis processes in rhodococci.

    Get PDF
    Oleaginous microorganisms have considerable potential for biofuel and commodity chemical production. Under nitrogen-limitation, Rhodococcus jostii RHA1 grown on benzoate, an analog of lignin depolymerization products, accumulated triacylglycerols (TAGs) to 55% of its dry weight during transition to stationary phase, with the predominant fatty acids being C16:0 and C17:0. Transcriptomic analyses of RHA1 grown under conditions of N-limitation and N-excess revealed 1,826 dysregulated genes. Genes whose transcripts were more abundant under N-limitation included those involved in ammonium assimilation, benzoate catabolism, fatty acid biosynthesis and the methylmalonyl-CoA pathway. Of the 16 atf genes potentially encoding diacylglycerol O-acyltransferases, atf8 transcripts were the most abundant during N-limitation (~50-fold more abundant than during N-excess). Consistent with Atf8 being a physiological determinant of TAG accumulation, a Δatf8 mutant accumulated 70% less TAG than wild-type RHA1 while atf8 overexpression increased TAG accumulation 20%. Genes encoding type-2 phosphatidic acid phosphatases were not significantly expressed. By contrast, three genes potentially encoding phosphatases of the haloacid dehalogenase superfamily and that cluster with, or are fused with other Kennedy pathway genes were dysregulated. Overall, these findings advance our understanding of TAG metabolism in mycolic acid-containing bacteria and provide a framework to engineer strains for increased TAG production

    Guided Open Vocabulary Image Captioning with Constrained Beam Search

    Full text link
    Existing image captioning models do not generalize well to out-of-domain images containing novel scenes or objects. This limitation severely hinders the use of these models in real world applications dealing with images in the wild. We address this problem using a flexible approach that enables existing deep captioning architectures to take advantage of image taggers at test time, without re-training. Our method uses constrained beam search to force the inclusion of selected tag words in the output, and fixed, pretrained word embeddings to facilitate vocabulary expansion to previously unseen tag words. Using this approach we achieve state of the art results for out-of-domain captioning on MSCOCO (and improved results for in-domain captioning). Perhaps surprisingly, our results significantly outperform approaches that incorporate the same tag predictions into the learning algorithm. We also show that we can significantly improve the quality of generated ImageNet captions by leveraging ground-truth labels.Comment: EMNLP 201

    A Cloud-based RFID Authentication Protocol with Insecure Communication Channels

    Get PDF
    © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Radio Frequency Identification (RFID) has becomea widespread technology to automatically identify objects and withthe development of cloud computing, cloud-based RFID systemsattract more research these days. Several cloud-based RFIDauthentication protocols have been proposed to address privacyand security properties in the environment where the cloudprovider is untrusted therefore the tag’s data are encrypted andanonymously stored in the cloud database. However, most of thecloud-based RFID authentication protocols assume securecommunication channels between the reader and the cloud server.To protect data transmission between the reader and the cloudserver without any help from a third party, this paper proposes acloud-based RFID authentication protocol with insecurecommunication channels (cloud-RAPIC) between the reader and the cloud server. The cloud-RAPIC protocol preserves tag privacyeven when the tag does not update its identification. The cloudRAPIC protocol has been analyzed using the UPriv model andAVISPA verification tool which have proved that the protocolpreserves tag privacy and protects data secrecy
    • 

    corecore