18,546 research outputs found
2002 Fourteenth Annual IMSA Presentation Day
As you begin to turn the pages and learn about the extraordinary research work of IMSA\u27s young investigators, I hope you will begin to see what is possible.https://digitalcommons.imsa.edu/archives_sir/1023/thumbnail.jp
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
382 p.Libro ElectrĂłnicoEach of us has been in the computing field for more than 40 years. The book is the product of a lifetime of observing and participating in the changes it has brought. Each of us has been both a teacher and a learner in the field.
This book emerged from a general education course we have taught at Harvard, but it is not a textbook. We wrote this book to share what wisdom we have with as many people as we can reach. We try to paint a big picture,
with dozens of illuminating anecdotes as the brushstrokes. We aim to entertain you at the same time as we provoke your thinking.Preface
Chapter 1 Digital Explosion
Why Is It Happening, and What Is at Stake?
The Explosion of Bits, and Everything Else
The Koans of Bits
Good and Ill, Promise and Peril
Chapter 2 Naked in the Sunlight
Privacy Lost, Privacy Abandoned
1984 Is Here, and We Like It
Footprints and Fingerprints
Why We Lost Our Privacy, or Gave It Away
Little Brother Is Watching
Big Brother, Abroad and in the U.S.
Technology Change and Lifestyle Change
Beyond Privacy
Chapter 3 Ghosts in the Machine
Secrets and Surprises of Electronic Documents
What You See Is Not What the Computer Knows
Representation, Reality, and Illusion
Hiding Information in Images
The Scary Secrets of Old Disks
Chapter 4 Needles in the Haystack
Google and Other Brokers in the Bits Bazaar
Found After Seventy Years
The Library and the Bazaar
The Fall of Hierarchy
It Matters How It Works
Who Pays, and for What?
Search Is Power
You Searched for WHAT? Tracking Searches
Regulating or Replacing the Brokers
Chapter 5 Secret Bits
How Codes Became Unbreakable
Encryption in the Hands of Terrorists, and Everyone Else
Historical Cryptography
Lessons for the Internet Age
Secrecy Changes Forever
Cryptography for Everyone
Cryptography Unsettled
Chapter 6 Balance Toppled
Who Owns the Bits?
Automated Crimes—Automated Justice
NET Act Makes Sharing a Crime
The Peer-to-Peer Upheaval
Sharing Goes Decentralized
Authorized Use Only
Forbidden Technology
Copyright Koyaanisqatsi: Life Out of Balance
The Limits of Property
Chapter 7 You Can’t Say That on the Internet
Guarding the Frontiers of Digital Expression
Do You Know Where Your Child Is on the Web Tonight?
Metaphors for Something Unlike Anything Else
Publisher or Distributor?
Neither Liberty nor Security
The Nastiest Place on Earth
The Most Participatory Form of Mass Speech
Protecting Good Samaritans—and a Few Bad Ones
Laws of Unintended Consequences
Can the Internet Be Like a Magazine Store?
Let Your Fingers Do the Stalking
Like an Annoying Telephone Call?
Digital Protection, Digital Censorship—and Self-Censorship
Chapter 8 Bits in the Air
Old Metaphors, New Technologies, and Free Speech
Censoring the President
How Broadcasting Became Regulated
The Path to Spectrum Deregulation
What Does the Future Hold for Radio?
Conclusion After the Explosion
Bits Lighting Up the World
A Few Bits in Conclusion
Appendix The Internet as System and Spirit
The Internet as a Communication System
The Internet Spirit
Endnotes
Inde
Trusting with Skill: Testimony, Reliability and Epistemic Justification
The majority of what you believe is based on the testimony of others; what your parents and teachers have taught you, what you read online or see on the news, etc. And most of the time you accept what these sources tell you without independently verifying them with your own senses or reasoning. If these beliefs (as well as all of the beliefs built upon them) are thought to be justified, then an account of testimonial justification must be detailed which can account for this justification. If such an account cannot be given, it at best becomes a mystery how those beliefs are justified, and at worse you are thrust into a new kind of skepticism since most of what you believe will fail to be knowledge. In this dissertation I examine the two main accounts of testimonial justification in the literature, show how each is inadequate, and ultimately give my own account of how beliefs based on testimony can be, and usually are, justified.Chapters One through Four examine the two main theories of testimonial justification, reductionism and non-reductionism, and I show that both views possess fatal flaws which render them unsuitable as plausible explanations for how agents can justifiably hold testimonial-based beliefs. In Chapter Five I examine a couple of promising nonstandard accounts of testimonial justification; Jennifer Lackey's `duelist' account and Sanford Goldberg's `extendedness hypothesis,' and ultimately dismiss these well. Finally, Chapter Six ends the dissertation by detailing my own account of testimonial justification and shows how it can avoid the problems which plague the theories above
Ernst Denert Award for Software Engineering 2020
This open access book provides an overview of the dissertations of the eleven nominees for the Ernst Denert Award for Software Engineering in 2020. The prize, kindly sponsored by the Gerlind & Ernst Denert Stiftung, is awarded for excellent work within the discipline of Software Engineering, which includes methods, tools and procedures for better and efficient development of high quality software. An essential requirement for the nominated work is its applicability and usability in industrial practice. The book contains eleven papers that describe the works by Jonathan Brachthäuser (EPFL Lausanne) entitled What You See Is What You Get: Practical Effect Handlers in Capability-Passing Style, Mojdeh Golagha’s (Fortiss, Munich) thesis How to Effectively Reduce Failure Analysis Time?, Nikolay Harutyunyan’s (FAU Erlangen-Nürnberg) work on Open Source Software Governance, Dominic Henze’s (TU Munich) research about Dynamically Scalable Fog Architectures, Anne Hess’s (Fraunhofer IESE, Kaiserslautern) work on Crossing Disciplinary Borders to Improve Requirements Communication, Istvan Koren’s (RWTH Aachen U) thesis DevOpsUse: A Community-Oriented Methodology for Societal Software Engineering, Yannic Noller’s (NU Singapore) work on Hybrid Differential Software Testing, Dominic Steinhofel’s (TU Darmstadt) thesis entitled Ever Change a Running System: Structured Software Reengineering Using Automatically Proven-Correct Transformation Rules, Peter Wägemann’s (FAU Erlangen-Nürnberg) work Static Worst-Case Analyses and Their Validation Techniques for Safety-Critical Systems, Michael von Wenckstern’s (RWTH Aachen U) research on Improving the Model-Based Systems Engineering Process, and Franz Zieris’s (FU Berlin) thesis on Understanding How Pair Programming Actually Works in Industry: Mechanisms, Patterns, and Dynamics – which actually won the award. The chapters describe key findings of the respective works, show their relevance and applicability to practice and industrial software engineering projects, and provide additional information and findings that have only been discovered afterwards, e.g. when applying the results in industry. This way, the book is not only interesting to other researchers, but also to industrial software professionals who would like to learn about the application of state-of-the-art methods in their daily work
Accuracy Assessment of forecasting services
English: A service system is a dynamic configuration of people, technologies, organisations and
shared information that create and deliver value to customers and other stakeholders [1].
The following cases are examples of customers receiving a service: taking a bus to go
somewhere, or going to a restaurant to have a meal, or for a small IT (information
technology) company, contracting a service to a bigger one in order to save costs and time.
Service-oriented architecture (SOA) has become more popular during last years. Basically,
this emerging development paradigm allows service providers to offer loosely coupled
services. These services are normally only owned by the providers. As a result, the service
user or client does not have to worry about the development, maintenance, infrastructure,
or any other issue of how the service is working. To sum up, the user just has to find and
choose the proper service.
On the one hand, it presents several advantages. Firstly, common functionality can be
contracted as a service in order to be able to focus on the own core missions. Secondly, it
decreases the cost, since it is cheaper to contract a service than creating it yourself. Thirdly,
clients take benefit of provider’s latest technologies.
On the other hand, there is one big drawback: lack of trust. When you contract a service, you
lose the direct control, the provider has access to your own data, you depend on him, and
you experiment delays since your functionality is not working in-home.
That is why the user has to decide previously which service is the most appropriate for his
needs. Each client has different needs: quality (it varies among services), reputation (a
famous or recommended provider usually gives more confidence), speed (agreements not to
break thresholds), security (contract and trust in the provider), personalisation (preferential
treatment from the provider), and locality (law is not the same in all countries). Therefore, a
customer needs to know about the best service(s).Among all kind of services, we concentrate on forecasting services. Forecasting services
show in advance a condition or occurrence about the future. There are plenty of domains:
weather forecasts, stock market prices, results in betting shops, elections…
Let us see a domain which is really familiar to all of us: weather forecast. When we are
planning to travel, going somewhere or just deciding what to wear first thing in the morning,
we wonder about weather conditions. To make these decisions, we check the weather
forecast on TV news, a thermometer, or on a web site. However, sometimes we check
several predictions and they do not agree. Which one will be the most accurate?
Our goal in this master thesis is to assess the accuracy of these forecasting services in order
to help prospective users to choose the best one according to their needs. To do it, we are
going to compare forecast predictions with actual real observations
Ernst Denert Award for Software Engineering 2020
This open access book provides an overview of the dissertations of the eleven nominees for the Ernst Denert Award for Software Engineering in 2020. The prize, kindly sponsored by the Gerlind & Ernst Denert Stiftung, is awarded for excellent work within the discipline of Software Engineering, which includes methods, tools and procedures for better and efficient development of high quality software. An essential requirement for the nominated work is its applicability and usability in industrial practice. The book contains eleven papers that describe the works by Jonathan Brachthäuser (EPFL Lausanne) entitled What You See Is What You Get: Practical Effect Handlers in Capability-Passing Style, Mojdeh Golagha’s (Fortiss, Munich) thesis How to Effectively Reduce Failure Analysis Time?, Nikolay Harutyunyan’s (FAU Erlangen-Nürnberg) work on Open Source Software Governance, Dominic Henze’s (TU Munich) research about Dynamically Scalable Fog Architectures, Anne Hess’s (Fraunhofer IESE, Kaiserslautern) work on Crossing Disciplinary Borders to Improve Requirements Communication, Istvan Koren’s (RWTH Aachen U) thesis DevOpsUse: A Community-Oriented Methodology for Societal Software Engineering, Yannic Noller’s (NU Singapore) work on Hybrid Differential Software Testing, Dominic Steinhofel’s (TU Darmstadt) thesis entitled Ever Change a Running System: Structured Software Reengineering Using Automatically Proven-Correct Transformation Rules, Peter Wägemann’s (FAU Erlangen-Nürnberg) work Static Worst-Case Analyses and Their Validation Techniques for Safety-Critical Systems, Michael von Wenckstern’s (RWTH Aachen U) research on Improving the Model-Based Systems Engineering Process, and Franz Zieris’s (FU Berlin) thesis on Understanding How Pair Programming Actually Works in Industry: Mechanisms, Patterns, and Dynamics – which actually won the award. The chapters describe key findings of the respective works, show their relevance and applicability to practice and industrial software engineering projects, and provide additional information and findings that have only been discovered afterwards, e.g. when applying the results in industry. This way, the book is not only interesting to other researchers, but also to industrial software professionals who would like to learn about the application of state-of-the-art methods in their daily work
Understanding citizen science and environmental monitoring: final report on behalf of UK Environmental Observation Framework
Citizen science can broadly be defined as the involvement of volunteers in science. Over the past decade there has
been a rapid increase in the number of citizen science initiatives. The breadth of environmental-based citizen
science is immense. Citizen scientists have surveyed for and monitored a broad range of taxa, and also contributed
data on weather and habitats reflecting an increase in engagement with a diverse range of observational science.
Citizen science has taken many varied approaches from citizen-led (co-created) projects with local community
groups to, more commonly, scientist-led mass participation initiatives that are open to all sectors of society. Citizen
science provides an indispensable means of combining environmental research with environmental education and
wildlife recording.
Here we provide a synthesis of extant citizen science projects using a novel cross-cutting approach to objectively
assess understanding of citizen science and environmental monitoring including: 1. Brief overview of knowledge on the motivations of volunteers.
2. Semi-systematic review of environmental citizen science projects in order to understand the variety of
extant citizen science projects.
3. Collation of detailed case studies on a selection of projects to complement the semi-systematic review.
4. Structured interviews with users of citizen science and environmental monitoring data focussing on policy, in
order to more fully understand how citizen science can fit into policy needs.
5. Review of technology in citizen science and an exploration of future opportunities
- …