323 research outputs found
Self-Presentation Techniques Used by Local Television Sports Broadcasters on Twitter
Using self-presentation theory as a guide, this study examined if local sports broadcasters in the United States were more likely to write about their work life (front stage) or their personal life (backstage) when on Twitter. A content analysis of 19,649 tweets from 201 sportscasters throughout the United States revealed that the majority of tweets (77.4%) demonstrated front stage personas (a work-related tool), with the remaining 22.6% categorized as backstage personas (giving details about their personal lives). This illustrates that sportscasters’ interactions with followers online are, in essence, not much different from their interactions with them on television, in that they are simply giving them scores and news. Additional analysis addressed the difference in tweet content based on gender and what size city the broadcaster worked in. Theoretical implications regarding self-presentation theory and practical implications for sports media members are discussed.
Trajectory and Policy Aware Sender Anonymity in Location Based Services
We consider Location-based Service (LBS) settings, where a LBS provider logs
the requests sent by mobile device users over a period of time and later wants
to publish/share these logs. Log sharing can be extremely valuable for
advertising, data mining research and network management, but it poses a
serious threat to the privacy of LBS users. Sender anonymity solutions prevent
a malicious attacker from inferring the interests of LBS users by associating
them with their service requests after gaining access to the anonymized logs.
With the fast-increasing adoption of smartphones and the concern that historic
user trajectories are becoming more accessible, it becomes necessary for any
sender anonymity solution to protect against attackers that are
trajectory-aware (i.e. have access to historic user trajectories) as well as
policy-aware (i.e they know the log anonymization policy). We call such
attackers TP-aware.
This paper introduces a first privacy guarantee against TP-aware attackers,
called TP-aware sender k-anonymity. It turns out that there are many possible
TP-aware anonymizations for the same LBS log, each with a different utility to
the consumer of the anonymized log. The problem of finding the optimal TP-aware
anonymization is investigated. We show that trajectory-awareness renders the
problem computationally harder than the trajectory-unaware variants found in
the literature (NP-complete in the size of the log, versus PTIME). We describe
a PTIME l-approximation algorithm for trajectories of length l and empirically
show that it scales to large LBS logs (up to 2 million users)
Technology, Counseling, and the Autism Spectrum: Using Tech to Promote Growth and Healing with Autism Spectrum Clients
Autism spectrum clients in counseling are challenging due to limitations in perspective taking as well as emotional/cognitive delays. Many autism spectrum clients use technology as a way to feel safe and relate to the world around them. Computer/tablet/video games have rich metaphors and themes that can help these young people understand themselves and the world around them and can be used to enhance self-representation and social, emotional, and cognitive growth
Computer/Video Games as a Play Therapy Tool in Reducing Emotional Disturbances in Children
The purpose of this study is to examine the effectiveness of computer/video games as a play therapy tool for children suffering from an emotional disturbance of sadness (pervasive feelings of irritability, loss of enjoyment in activities previously enjoyed, withdrawal from friends or family, decline in school performance, and hopelessness). Children who suffer from emotional disturbances have problems functioning in school, in social and family settings, as well as transitioning into adulthood. Play therapy is an effective and creative way to work with children with emotional disturbances. Play becomes a way for the child to communicate and heal. Computer/video games are fun and inviting to children, and have been used in many different settings with children. To examine the effectiveness of computer/video games as a play therapy tool in treating emotional disturbances, a qualitative, collective case study design was used. Overall, the findings from the study supported the fact that children suffering from emotional disturbances encounter difficulties academically, emotionally, and socially. The findings support the literature that play therapy is effective in treating children suffering from emotional problems. Finally, the findings confirmed the usefulness of video and computer games as a play therapy tool with children suffering from the emotional disturbance of sadness
To Publish or Perish: What Faculty Need to Know About Scholarly Activity
This session will feature a panel presentation to include Counselor Education and Family Studies leadership, published faculty, and counseling journal editorial board members. The topic will be on the expectations for faculty and tips for successful (unsuccessful) manuscript submission
Fabrication and performance of selectively oxidized vertical-cavity lasers
Includes bibliographical references.We report the high yield fabrication and reproducible performance of selectively oxidized vertical-cavity surface emitting lasers. We show that linear oxidation rates of AlGaAs without an induction period allows reproducible fabrication of buried oxide current apertures within monolithic distributed Bragg reflectors. The oxide layers do not induce obvious crystalline defects, and continuous wave operation in excess of 650 h has been obtained. The high yield fabrication enables relatively high laser performance over a wide wavelength span. We observe submilliamp threshold currents over a wavelength range of up to 75 nm, and power conversion efficiencies at 1 mW output power of greater than 20% over a 50-nm wavelength range.The work at Sandia National Laboratories was supported in part by the United States DOE under contract No. DE-AC04-94AL85000
Neutron diffraction and multinuclear solid state NMR investigation into the structures of oxide ion conducting La9.6Si6O26.4 and La8Sr2Si6O26, and their hydrated phases
Robust Principles: Architectural Design Principles for Adversarially Robust CNNs
Our research aims to unify existing works' diverging opinions on how
architectural components affect the adversarial robustness of CNNs. To
accomplish our goal, we synthesize a suite of three generalizable robust
architectural design principles: (a) optimal range for depth and width
configurations, (b) preferring convolutional over patchify stem stage, and (c)
robust residual block design through adopting squeeze and excitation blocks and
non-parametric smooth activation functions. Through extensive experiments
across a wide spectrum of dataset scales, adversarial training methods, model
parameters, and network design spaces, our principles consistently and markedly
improve AutoAttack accuracy: 1-3 percentage points (pp) on CIFAR-10 and
CIFAR-100, and 4-9 pp on ImageNet. The code is publicly available at
https://github.com/poloclub/robust-principles.Comment: Published at BMVC'2
Classification of non-Riemannian doubled-yet-gauged spacetime
Assuming covariant fields as the `fundamental' variables,
Double Field Theory can accommodate novel geometries where a Riemannian metric
cannot be defined, even locally. Here we present a complete classification of
such non-Riemannian spacetimes in terms of two non-negative integers,
, . Upon these backgrounds, strings become
chiral and anti-chiral over and directions respectively, while
particles and strings are frozen over the directions. In
particular, we identify as Riemannian manifolds, as
non-relativistic spacetime, as Gomis-Ooguri non-relativistic string,
as ultra-relativistic Carroll geometry, and as Siegel's
chiral string. Combined with a covariant Kaluza-Klein ansatz which we further
spell, leads to Newton-Cartan gravity. Alternative to the conventional
string compactifications on small manifolds, non-Riemannian spacetime such as
, may open a new scheme of the dimensional reduction from ten to
four.Comment: 1+41 pages; v2) Refs added; v3) Published version; v4) Sign error in
(2.51) correcte
- …