12,010 research outputs found

    TOWARDS ENHANCED E-COLLABORATION IN ACADEMIA A HOLISTIC MODEL FOR DEVELOPMENT OF E-COLLABORATION SOFTWARE

    Get PDF
    Henriksson, Aron. Neculau, Andrei. 2008. Towards Enhanced E-collaboration in Academia. A Holistic Model for Development E-collaboration Software. The Royal Institute of Technology, Stockholm, Sweden. Information and Communication Technology.E-collaboration is an inherently complex activity that encompasses many factors that supplement the pivotal technical elements. This paper investigates the various aspects of e-collaboration from an academic viewpoint, and reiterates the call for a holistic approach towards e-collaboration research and development. Moreover, the use of collaboration tools by IT students is surveyed, which substantiates the belief that e-collaboration needs to be further promoted in academia. We present a conceptual model that hopefully can provide some guidance for further research on e-collaboration and development of e-collaboration suites.E-collaboration, Academia, Requirements, Boundaries, Holistic

    A document management methodology based on similarity contents

    Get PDF
    The advent of the WWW and distributed information systems have made it possible to share documents between different users and organisations. However, this has created many problems related to the security, accessibility, right and most importantly the consistency of documents. It is important that the people involved in the documents management process have access to the most up-to-date version of documents, retrieve the correct documents and should be able to update the documents repository in such a way that his or her document are known to others. In this paper we propose a method for organising, storing and retrieving documents based on similarity contents. The method uses techniques based on information retrieval, document indexation and term extraction and indexing. This methodology is developed for the E-Cognos project which aims at developing tools for the management and sharing of documents in the construction domain

    Mechanisms of Endogenous Institutional Change

    Get PDF
    This paper proposes an analytical-cum-conceptual framework for understanding the nature of institutions as well as their changes. In doing so, it attempts to achieve two things: First, it proposes a way to reconcile an equilibrium (endogenous) view of institutions with the notion of agents’ bounded rationality by introducing such concepts as a summary representation of equilibrium as common knowledge of agents. Second, it specifies some generic mechanisms of institutional coherence and change -- overlapping social embededdness, Schumpeterian innovation in bundling games and dynamic institutional complementarities -- useful for understanding the dynamic interactions of economic, political, social and organizational factors.

    Continuous Improvement Through Knowledge-Guided Analysis in Experience Feedback

    Get PDF
    Continuous improvement in industrial processes is increasingly a key element of competitiveness for industrial systems. The management of experience feedback in this framework is designed to build, analyze and facilitate the knowledge sharing among problem solving practitioners of an organization in order to improve processes and products achievement. During Problem Solving Processes, the intellectual investment of experts is often considerable and the opportunities for expert knowledge exploitation are numerous: decision making, problem solving under uncertainty, and expert configuration. In this paper, our contribution relates to the structuring of a cognitive experience feedback framework, which allows a flexible exploitation of expert knowledge during Problem Solving Processes and a reuse such collected experience. To that purpose, the proposed approach uses the general principles of root cause analysis for identifying the root causes of problems or events, the conceptual graphs formalism for the semantic conceptualization of the domain vocabulary and the Transferable Belief Model for the fusion of information from different sources. The underlying formal reasoning mechanisms (logic-based semantics) in conceptual graphs enable intelligent information retrieval for the effective exploitation of lessons learned from past projects. An example will illustrate the application of the proposed approach of experience feedback processes formalization in the transport industry sector

    Gaming security by obscurity

    Get PDF
    Shannon sought security against the attacker with unlimited computational powers: *if an information source conveys some information, then Shannon's attacker will surely extract that information*. Diffie and Hellman refined Shannon's attacker model by taking into account the fact that the real attackers are computationally limited. This idea became one of the greatest new paradigms in computer science, and led to modern cryptography. Shannon also sought security against the attacker with unlimited logical and observational powers, expressed through the maxim that "the enemy knows the system". This view is still endorsed in cryptography. The popular formulation, going back to Kerckhoffs, is that "there is no security by obscurity", meaning that the algorithms cannot be kept obscured from the attacker, and that security should only rely upon the secret keys. In fact, modern cryptography goes even further than Shannon or Kerckhoffs in tacitly assuming that *if there is an algorithm that can break the system, then the attacker will surely find that algorithm*. The attacker is not viewed as an omnipotent computer any more, but he is still construed as an omnipotent programmer. So the Diffie-Hellman step from unlimited to limited computational powers has not been extended into a step from unlimited to limited logical or programming powers. Is the assumption that all feasible algorithms will eventually be discovered and implemented really different from the assumption that everything that is computable will eventually be computed? The present paper explores some ways to refine the current models of the attacker, and of the defender, by taking into account their limited logical and programming powers. If the adaptive attacker actively queries the system to seek out its vulnerabilities, can the system gain some security by actively learning attacker's methods, and adapting to them?Comment: 15 pages, 9 figures, 2 tables; final version appeared in the Proceedings of New Security Paradigms Workshop 2011 (ACM 2011); typos correcte

    Creationism and evolution

    Get PDF
    In Tower of Babel, Robert Pennock wrote that “defenders of evolution would help their case immeasurably if they would reassure their audience that morality, purpose, and meaning are not lost by accepting the truth of evolution.” We first consider the thesis that the creationists’ movement exploits moral concerns to spread its ideas against the theory of evolution. We analyze their arguments and possible reasons why they are easily accepted. Creationists usually employ two contradictive strategies to expose the purported moral degradation that comes with accepting the theory of evolution. On the one hand they claim that evolutionary theory is immoral. On the other hand creationists think of evolutionary theory as amoral. Both objections come naturally in a monotheistic view. But we can find similar conclusions about the supposed moral aspects of evolution in non-religiously inspired discussions. Meanwhile, the creationism-evolution debate mainly focuses — understandably — on what constitutes good science. We consider the need for moral reassurance and analyze reassuring arguments from philosophers. Philosophers may stress that science does not prescribe and is therefore not immoral, but this reaction opens the door for the objection of amorality that evolution — as a naturalistic world view at least — supposedly endorses. We consider that the topic of morality and its relation to the acceptance of evolution may need more empirical research
    • …
    corecore