23,837 research outputs found

    GIS and urban design

    Get PDF
    Although urban planning has used computer models and information systems sincethe 1950s and architectural practice has recently restructured to the use of computeraideddesign (CAD) and computer drafting software, urban design has hardly beentouched by the digital world. This is about to change as very fine scale spatial datarelevant to such design becomes routinely available, as 2dimensional GIS(geographic information systems) become linked to 3dimensional CAD packages,and as other kinds of photorealistic media are increasingly being fused with thesesoftware. In this chapter, we present the role of GIS in urban design, outlining whatcurrent desktop software is capable of and showing how various new techniques canbe developed which make such software highly suitable as basis for urban design.We first outline the nature of urban design and then present ideas about how varioussoftware might form a tool kit to aid its process. We then look in turn at: utilisingstandard mapping capabilities within GIS relevant to urban design; buildingfunctional extensions to GIS which measure local scale accessibility; providingsketch planning capability in GIS and linking 2-d to 3-d visualisations using low costnet-enabled CAD browsers. We finally conclude with some speculations on thefuture of GIS for urban design across networks whereby a wide range of participantsmight engage in the design process digitally but remotely

    Of babies and bath water: Is there any place for Austin and Grice in interpersonal pragmatics?

    Get PDF
    This paper discusses a particular strand of interpersonal pragmatics that may be known as ‘discursive’ pragmatics and attempts to delineate what is entailed in such an approach. Some scholars may characterise it as placing emphasis on participant evaluations, others may foreground the analysis of contextualised and sequential texts, while still others consider it to include both of these. In general, though, discursive pragmatics often seems to involve a reaction to, and a contrast with, so-called Gricean intention-based approaches. In this paper I argue that, far from discarding the insights of Grice, Austin and others, a discursive approach to interpersonal pragmatics should embrace those aspects of non-discursive pragmatics that provide us with a ‘tool-kit’ and a vocabulary for examining talk-in-interaction. At the same time, I will argue that the shortcomings of the speaker-based, intention- focused pragmatics can be compensated for, not by privileging hearer evaluations of meaning, but by taking an ethnographic and, to some extent, ethnomethodological approach to the analysis of naturally-occurring discourse data. By providing a critique of Locher and Watts’ (2005) paradigmatic example of a discursive approach to politeness and then a sample analysis of interactional data, I demonstrate how a combination of insights from Gricean pragmatics and from ethnomethodology allows the analyst to comment on the construction and negotiation of meaning in discourse, without having recourse to notions of either intention or evaluation

    ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks

    Full text link
    Despite the fact that cyberattacks are constantly growing in complexity, the research community still lacks effective tools to easily monitor and understand them. In particular, there is a need for techniques that are able to not only track how prominently certain malicious actions, such as the exploitation of specific vulnerabilities, are exploited in the wild, but also (and more importantly) how these malicious actions factor in as attack steps in more complex cyberattacks. In this paper we present ATTACK2VEC, a system that uses temporal word embeddings to model how attack steps are exploited in the wild, and track how they evolve. We test ATTACK2VEC on a dataset of billions of security events collected from the customers of a commercial Intrusion Prevention System over a period of two years, and show that our approach is effective in monitoring the emergence of new attack strategies in the wild and in flagging which attack steps are often used together by attackers (e.g., vulnerabilities that are frequently exploited together). ATTACK2VEC provides a useful tool for researchers and practitioners to better understand cyberattacks and their evolution, and use this knowledge to improve situational awareness and develop proactive defenses

    Understanding Occupational and Skill Demand in New Jersey's Utilities Industry

    Get PDF
    The utilities industry provides essential electricity, gas, water and sewer, and local telephone services to residents and businesses throughout New Jersey. This report summarizes the skill, knowledge, and educational requirements of key occupations in gas, electric, water and sewer, and telephone services. It also identifies strategies for meeting the workforce challenges facing the industry

    Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation

    Full text link
    We present Anadroid, a static malware analysis framework for Android apps. Anadroid exploits two techniques to soundly raise precision: (1) it uses a pushdown system to precisely model dynamically dispatched interprocedural and exception-driven control-flow; (2) it uses Entry-Point Saturation (EPS) to soundly approximate all possible interleavings of asynchronous entry points in Android applications. (It also integrates static taint-flow analysis and least permissions analysis to expand the class of malicious behaviors which it can catch.) Anadroid provides rich user interface support for human analysts which must ultimately rule on the "maliciousness" of a behavior. To demonstrate the effectiveness of Anadroid's malware analysis, we had teams of analysts analyze a challenge suite of 52 Android applications released as part of the Auto- mated Program Analysis for Cybersecurity (APAC) DARPA program. The first team analyzed the apps using a ver- sion of Anadroid that uses traditional (finite-state-machine-based) control-flow-analysis found in existing malware analysis tools; the second team analyzed the apps using a version of Anadroid that uses our enhanced pushdown-based control-flow-analysis. We measured machine analysis time, human analyst time, and their accuracy in flagging malicious applications. With pushdown analysis, we found statistically significant (p < 0.05) decreases in time: from 85 minutes per app to 35 minutes per app in human plus machine analysis time; and statistically significant (p < 0.05) increases in accuracy with the pushdown-driven analyzer: from 71% correct identification to 95% correct identification.Comment: Appears in 3rd Annual ACM CCS workshop on Security and Privacy in SmartPhones and Mobile Devices (SPSM'13), Berlin, Germany, 201

    Process improvement : the creation and evaluation of process alternatives

    Get PDF
    Companies continuously strive to improve their processes to increase productivity and delivered quality against lower costs. With Business Process Redesign (BPR) projects such improvement goals can be achieved. BPR involves the restructuring of business processes, stimulated by the application of information technology. Although BPR is widely applied in industry, a systematic approach that helps a team in deriving designs for better performing business processes is lacking. The approach for Process Improvement by Creating and Evaluating process alternatives (in short: the PrICE approach) is developed to describe and support the concrete steps that will lead a design team from the as-is process to the to-be process. The starting point for the PrICE approach is a model of an existing process. The as-is model contains tasks and their execution ordering, data elements that are created and used, resources and their allocation and performance information. First, redesign opportunities are identified in the process model. A redesign opportunity leads to a combination of a certain redesign operation and a process part on which this operation can be applied. The PrICE approach consists of four steps. The first step of the PrICE approach describes the selection of redesign operations. Eight redesign operations have been developed, each supporting a particular type of redesign creation. We introduce two possible means to select applicable operations: process measures and process mining. Process measures provide a global view on the characteristics of the process and their values may reveal weaknesses in the process. The idea of process mining is to discover, monitor and improve business processes by extracting knowledge from event logs. Process mining results point out what type of changes may be beneficial. Moreover, bottlenecks, i.e., parts of the process that need improvement, are detected. The second step of the approach is the selection of process parts. In this step we focus on the selection of a process part in such a way that the application of a redesign operation results in a correct process model. The third step of the approach concentrates on the creation of process alternatives. An application of a redesign operation to a selected process part results in an alternative process model. An overview of the created alternatives is provided with the process alternatives tree. The root node of the tree is the original model and the other nodes represent the created alternatives. Each of the nodes may serve as a starting point for the creation of another alternative. In the last step of the approach, the performance of the process alternatives is evaluated with simulation. Simulation provides quantitative estimates for the performance, e.g., on time or costs, of a process model. By comparing the simulation results of the models in an alternatives tree, a quantitatively supported choice for the best alternative model, the to-be process, can be made. The PrICE approach is supported with the PrICE tool kit. The tool support is implemented as part of the Process Mining (ProM) framework. The tool kit supports the application of the various steps of the approach. The first two steps are supported with the process mining techniques that are available in ProM. The main features of the PrICE tool kit are the user guidance in the selection of process parts, the creation of process alternatives, the construction of the process alternatives tree and the evaluation of the alternatives with simulation. After the selection of a redesign operation, a process part for redesign is selected by the user by clicking on the tasks in the process model. Colors are used to guide the user and show which tasks may be added to the current selection to form a process part. This way, it is ensured that the input for the creation of a process alternative is such that a correct alternative model can be created. After the creation of an alternative model, the process alternatives tree is updated with a new node representing this alternative. Each node in the alternatives tree can be selected as starting point for the creation of another process alternative. With regard to the evaluation of the alternatives, one can select a subset of nodes for simulation or simulate the complete tree. A simulation study is performed in batch, i.e., all selected models are simulated without user interaction. Afterwards, the simulation results are displayed on the tree nodes. In addition, colors are used to guide the user in finding the best performing alternatives. The developed tool support demonstrates the feasibility of our ideas. This feasibility is also illustrated with several applications of the tool kit to real life processes. Apart from the development of the PrICE approach and tool kit, the thesis includes several other contributions. A contribution is the creation of correct process models. We refer to a process model as correct if the workflow structure is sound and if the data distribution is correct. A correct data distribution is an assignment of the data elements to the tasks in the process in such a way that the data elements necessary for the execution of a task have been written when the task becomes enabled. Requirements on the workflow structure and data distribution are set on the selection of process parts and the creation of alternatives to ensure the construction of correct process alternatives. Another contribution is the overview of the created process alternatives with the process alternatives tree. An alternative model may be created from the original model (the root node) or from one of the alternative models (any other node). The alternatives tree is also used as input for the evaluation of the performance of the alternatives and to provide an overview of the simulation results. A final contribution is the enhancement of the practical use of simulation for process redesign. On the one hand, the automation of the simulation study reduces the necessary time investment because intermediate input from the user is not required. On the other hand, we present a simulation plan that facilitates the understanding of the various aspects that should be addressed in a simulation study

    Independent Orbiter Assessment (IOA): Analysis of the crew equipment subsystem

    Get PDF
    The results of the Independent Orbiter Assessment (IOA) of the Failure Modes and Effects Analysis (FMEA) and Critical Items List (CIL) are presented. The IOA approach features a top-down analysis of the hardware to determine failure modes, criticality, and potential critical (PCIs) items. To preserve independence, this analysis was accomplished without reliance upon the results contained within the NASA FMEA/CIL documentation. The independent analysis results coresponding to the Orbiter crew equipment hardware are documented. The IOA analysis process utilized available crew equipment hardware drawings and schematics for defining hardware assemblies, components, and hardware items. Each level of hardware was evaluated and analyzed for possible failure modes and effects. Criticality was assigned based upon the severity of the effect for each failure mode. Of the 352 failure modes analyzed, 78 were determined to be PCIs
    • …
    corecore