3,264 research outputs found
On the integration of digital technologies into mathematics classrooms
Troucheâs (2003) presentation at the Third Computer Algebra in Mathematics Education Symposium focused on the notions of instrumental genesis and of orchestration: the former concerning the mutual transformation of learner and artefact in the course of constructing knowledge with technology; the latter concerning the problem of integrating technology into classroom practice. At the Symposium, there was considerable discussion of the idea of situated abstraction, which the current authors have been developing over the last decade. In this paper, we summarise the theory of instrumental genesis and attempt to link it with situated abstraction. We then seek to broaden Troucheâs discussion of orchestration to elaborate the role of artefacts in the process, and describe how the notion of situated abstraction could be used to make sense of the evolving mathematical knowledge of a community as well as an individual. We conclude by elaborating the ways in which technological artefacts can provide shared means of mathematical expression, and discuss the need to recognise the diversity of studentâs emergent meanings for mathematics, and the legitimacy of mathematical expression that may be initially divergent from institutionalised mathematics
CARTE: An Observation Station to Regulate Activity in a Learning Context
This chapter discusses the introduction of a new concept called "regulation" into a use model, which is part of a theoretical observation model called trace-based system (TBS). This concept defines a retroaction mechanism in an observation station. We present the results of experiments, in a learning context, with a prototype observation station called Collection, activity Analysis and Regulation based on Traces Enriched (CARTE)
Webbing and orchestration. Two interrelated views on digital tools in mathematics education
The integration of digital tools in mathematics education is considered both
promising and problematic. To deal with this issue, notions of webbing and
instrumental orchestration are developed. However, the two seemed to be
disconnected, and having different cultural and theoretical roots. In this
article, we investigate the distinct and joint journeys of these two
theoretical perspectives. Taking some key moments in recent history as points
of de- parture, we conclude that the two perspectives share an importance
attributed to digital tools, and that initial differences, such as different
views on the role of digital tools and the role of the teacher, have become
more nuances. The two approaches share future chal- lenges to the organization
of teachers'collaborative work and their use of digital resources.Comment: Teaching Mathematics and its Applications (2014) to be complete
A Monitoring Language for Run Time and Post-Mortem Behavior Analysis and Visualization
UFO is a new implementation of FORMAN, a declarative monitoring language, in
which rules are compiled into execution monitors that run on a virtual machine
supported by the Alamo monitor architecture.Comment: In M. Ronsse, K. De Bosschere (eds), proceedings of the Fifth
International Workshop on Automated Debugging (AADEBUG 2003), September 2003,
Ghent. cs.SE/030902
Activity regulation for the participative creation of data on-line
International audienceThis paper discusses automatic regulation in participative Web systems. We present a generic solution with an original trace-centered approach. We describe an experiment with a general trace-based system (TBS) called CARTE (Collection, activity Analysis and Regulation based on Traces Enriched) featuring a regulation mechanism and we couple this system with an on-line generic platform for managing lexical resources called Jibikipedia
Une Station d'Observation pour des Situations d'Apprentissage Collaboratif Instrumenté
International audienceToute activitĂ© d'apprentissage collaboratif requiert naturellement un suivi de l'Ă©volution de l'apprenant. L'observation de ces activitĂ©s est donc indispensable pour tous les acteurs des situations d'apprentissage collaboratif instrumentĂ© (SACI). Dans cet article, nous prĂ©sentons un exemple de rĂ©sultat, issu d'expĂ©rimentations in situ, de l'opĂ©rationalisation de modĂšles centrĂ©s sur les traces d'activitĂ© des diffĂ©rentes parties d'un prototype de station d'observation. Nous montrons la difficultĂ© qu'il y a Ă exploiter les traces d'activitĂ© existantes, qui peuvent ĂȘtre trop nombreuses ou au contraire insuffisantes. Nous tentons ainsi d'apporter des rĂ©ponses aux problĂšmes de bruit et de silence, et Ă l'expressivitĂ© des traces par rapport aux niveaux d'observation souhaitĂ©s
Visualisation et régulation de l'activité des apprenants dans un EIAH tracé
International audienceNotre travail de recherche se situe dans le domaine de l'analyse des traces d'usage des EIAH. Dans ce papier, nous présentons une interface de visualisation des traces qui permet au tuteur d'observer l'activité d'un groupe d'apprenants au sein d'un EIAH tracé. L'interface permet des rétroactions du tuteur vers les apprenants en interagissant directement avec l'interface de visualisation. Un prototype implémentant cette interface a été validé lors d'une expérimentation que nous présentons
Dynamic monitoring of Android malware behavior: a DNS-based approach
The increasing technological revolution of the mobile smart devices fosters their wide use. Since mobile users rely on unofficial or thirdparty repositories in order to freely install paid applications, lots of security and privacy issues are generated. Thus, at the same time that Android phones become very popular and growing rapidly their market share, so it is the number of malicious applications targeting them.
Yet, current mobile malware detection and analysis technologies are very limited and ineffective. Due to the particular traits of mobile devices such as the power consumption constraints that make unaffordable
to run traditional PC detection engines on the device; therefore mobile security faces new challenges, especially on dynamic runtime malware detection. This approach is import because many instructions or infections could happen after an application is installed or executed.
On the one hand, recent studies have shown that the network-based analysis, where applications could be also analyzed by observing the network traffic they generate, enabling us to detect malicious activities occurring on the smart device. On the other hand, the aggressors rely on DNS to provide adjustable and resilient communication between compromised client machines and malicious infrastructure. So, having rich DNS traffic information is very important to identify malevolent behavior, then using DNS for malware detection is a logical step in the dynamic analysis because malicious URLs are common and the present danger for cybersecurity. Therefore, the main goal of this thesis is to combine and correlate two approaches: top-down detection by identifying malware domains using DNS traces at the network level, and bottom-up detection at the device level using the dynamic analysis in order to capture the URLs requested on a number of applications to pinpoint the malware. For malware detection and visualization, we propose a system which is based on dynamic analysis of API calls. Thiscan help Android malware analysts in visually inspecting what the application under study does, easily identifying such malicious functions.
Moreover, we have also developed a framework that automates the dynamic DNS analysis of Android malware where the captured URLs at the smartphone under scrutiny are sent to a remote server where they are: collected, identified within the DNS server records, mapped the extracted DNS records into this server in order to classify them either as benign or malicious domain. The classification is done through the usage of machine learning. Besides, the malicious URLs found are used in order to track and pinpoint other infected smart devices, not currently under monitoring
- âŠ