248,262 research outputs found
To Tag or Not To Tag: The Interplay of the Twitch Tag System and LGBTQIA+ Visibility in Live Streaming
Video Game Live Streaming (VGLS) has become increasingly popular in recent years. Twitch, one of the largest streaming sites, has implemented measures to protect and promote marginalized groups, including the LGBTQIA+ community. One example is the "LGBTQIA+" tag - a tag a streamer can attach to their steam. However, little is known regarding how the Twitch VGLS community actually reacts to this design feature and how such a feature affects LGBTQIA+ streamersâ online presence and experiences of visibility. By qualitatively analyzing 381 threads and comments from the Twitch subreddit (r/Twitch), in this paper we identify the impacts of the Twitch Tag system on the VGLS communityâs perceptions of gender and sexuality in streaming, the streaming communityâs ability to find LGBTQIA+ streamers, and harassment towards LGBTQIA+ streamers. We not only expand existing knowledge of LGBTQIA+ gamersâ unique experiences of online presence and visibility in streaming but also provide potential design recommendations for future live streaming platforms to better support LGBTQIA+ streamers and viewers
To Tag or Not to Tag ? Harvesting Adjacent Metadata in Large-Scale Tagging Systems
We present HAMLET, a suite of principles, scoring models and algorithms to automatically propagate metadata along edges in a document neighborhood. As a showcase scenario we consider tag prediction in community-based Web 2.0 tagging applications. Experiments using real-world data demonstrate the viability of our approach in large-scale environments where tags are scarce. To the best of our knowledge, HAMLET is the first system to promote an efficient and precise reuse of shared metadata in highly dynamic, large-scale Web 2.0 tagging systems
Preliminary results in tag disambiguation using DBpedia
The availability of tag-based user-generated content for a variety of Web resources (music, photos, videos, text, etc.) has largely increased in the last years. Users can assign tags freely and then use them to share and retrieve information. However, tag-based sharing and retrieval is not optimal due to the fact that tags are plain text labels without an explicit or formal meaning, and hence polysemy and synonymy should be dealt with appropriately. To ameliorate these problems, we propose a context-based tag disambiguation algorithm that selects the meaning of a tag among a set of candidate DBpedia entries, using a common information retrieval similarity measure. The most similar DBpedia en-try is selected as the one representing the meaning of the tag. We describe and analyze some preliminary results, and discuss about current challenges in this area
Transitions between homophilic and heterophilic modes of cooperation
Cooperation is ubiquitous in biological and social systems. Previous studies
revealed that a preference toward similar appearance promotes cooperation, a
phenomenon called tag-mediated cooperation or communitarian cooperation. This
effect is enhanced when a spatial structure is incorporated, because space
allows agents sharing an identical tag to regroup to form locally cooperative
clusters. In spatially distributed settings, one can also consider migration of
organisms, which has a potential to further promote evolution of cooperation by
facilitating spatial clustering. However, it has not yet been considered in
spatial tag-mediated cooperation models. Here we show, using computer
simulations of a spatial model of evolutionary games with organismal migration,
that tag-based segregation and homophilic cooperation arise for a wide range of
parameters. In the meantime, our results also show another evolutionarily
stable outcome, where a high level of heterophilic cooperation is maintained in
spatially well-mixed patterns. We found that these two different forms of
tag-mediated cooperation appear alternately as the parameter for temptation to
defect is increased.Comment: 16 pages, 7 figure
Practical Schemes For Privacy & Security Enhanced RFID
Proper privacy protection in RFID systems is important. However, many of the
schemes known are impractical, either because they use hash functions instead
of the more hardware efficient symmetric encryption schemes as a efficient
cryptographic primitive, or because they incur a rather costly key search time
penalty at the reader. Moreover, they do not allow for dynamic, fine-grained
access control to the tag that cater for more complex usage scenarios.
In this paper we investigate such scenarios, and propose a model and
corresponding privacy friendly protocols for efficient and fine-grained
management of access permissions to tags. In particular we propose an efficient
mutual authentication protocol between a tag and a reader that achieves a
reasonable level of privacy, using only symmetric key cryptography on the tag,
while not requiring a costly key-search algorithm at the reader side. Moreover,
our protocol is able to recover from stolen readers.Comment: 18 page
Characterization of key triacylglycerol biosynthesis processes in rhodococci.
Oleaginous microorganisms have considerable potential for biofuel and commodity chemical production. Under nitrogen-limitation, Rhodococcus jostii RHA1 grown on benzoate, an analog of lignin depolymerization products, accumulated triacylglycerols (TAGs) to 55% of its dry weight during transition to stationary phase, with the predominant fatty acids being C16:0 and C17:0. Transcriptomic analyses of RHA1 grown under conditions of N-limitation and N-excess revealed 1,826 dysregulated genes. Genes whose transcripts were more abundant under N-limitation included those involved in ammonium assimilation, benzoate catabolism, fatty acid biosynthesis and the methylmalonyl-CoA pathway. Of the 16 atf genes potentially encoding diacylglycerol O-acyltransferases, atf8 transcripts were the most abundant during N-limitation (~50-fold more abundant than during N-excess). Consistent with Atf8 being a physiological determinant of TAG accumulation, a Îatf8 mutant accumulated 70% less TAG than wild-type RHA1 while atf8 overexpression increased TAG accumulation 20%. Genes encoding type-2 phosphatidic acid phosphatases were not significantly expressed. By contrast, three genes potentially encoding phosphatases of the haloacid dehalogenase superfamily and that cluster with, or are fused with other Kennedy pathway genes were dysregulated. Overall, these findings advance our understanding of TAG metabolism in mycolic acid-containing bacteria and provide a framework to engineer strains for increased TAG production
Guided Open Vocabulary Image Captioning with Constrained Beam Search
Existing image captioning models do not generalize well to out-of-domain
images containing novel scenes or objects. This limitation severely hinders the
use of these models in real world applications dealing with images in the wild.
We address this problem using a flexible approach that enables existing deep
captioning architectures to take advantage of image taggers at test time,
without re-training. Our method uses constrained beam search to force the
inclusion of selected tag words in the output, and fixed, pretrained word
embeddings to facilitate vocabulary expansion to previously unseen tag words.
Using this approach we achieve state of the art results for out-of-domain
captioning on MSCOCO (and improved results for in-domain captioning). Perhaps
surprisingly, our results significantly outperform approaches that incorporate
the same tag predictions into the learning algorithm. We also show that we can
significantly improve the quality of generated ImageNet captions by leveraging
ground-truth labels.Comment: EMNLP 201
A Cloud-based RFID Authentication Protocol with Insecure Communication Channels
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Radio Frequency Identification (RFID) has becomea widespread technology to automatically identify objects and withthe development of cloud computing, cloud-based RFID systemsattract more research these days. Several cloud-based RFIDauthentication protocols have been proposed to address privacyand security properties in the environment where the cloudprovider is untrusted therefore the tagâs data are encrypted andanonymously stored in the cloud database. However, most of thecloud-based RFID authentication protocols assume securecommunication channels between the reader and the cloud server.To protect data transmission between the reader and the cloudserver without any help from a third party, this paper proposes acloud-based RFID authentication protocol with insecurecommunication channels (cloud-RAPIC) between the reader and the cloud server. The cloud-RAPIC protocol preserves tag privacyeven when the tag does not update its identification. The cloudRAPIC protocol has been analyzed using the UPriv model andAVISPA verification tool which have proved that the protocolpreserves tag privacy and protects data secrecy
- âŠ