6,232 research outputs found
INSPIRAL: investigating portals for information resources and learning. Final project report
INSPIRAL's aims were to identify and analyse, from the perspective of the UK HE learner, the nontechnical, institutional and end-user issues with regard to linking VLEs and digital libraries, and to make recommendations for JISC strategic planning and investment. INSPIRAL's objectives -To identify key stakeholders with regard to the linkage of VLEs, MLEs and digital libraries -To identify key stakeholder forum points and dissemination routes -To identify the relevant issues, according to the stakeholders and to previous research, pertaining to the interaction (both possible and potential) between VLEs/MLEs and digital libraries -To critically analyse identified issues, based on stakeholder experience and practice; output of previous and current projects; and prior and current research -To report back to JISC and to the stakeholder communities, with results situated firmly within the context of JISC's strategic aims and objectives
Predictive information in Gaussian processes with application to music analysis
This is the author's accepted manuscript of this article. The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-642-40020-9.Lecture Notes in Computer ScienceLecture Notes in Computer ScienceWe describe an information-theoretic approach to the analysis of sequential data, which emphasises the predictive aspects of perception, and the dynamic process of forming and modifying expectations about an unfolding stream of data, characterising these using a set of process information measures. After reviewing the theoretical foundations and the definition of the predictive information rate, we describe how this can be computed for Gaussian processes, including how the approach can be adpated to non-stationary processes, using an online Bayesian spectral estimation method to compute the Bayesian surprise. We finish with a sample analysis of a recording of Steve Reich’s Drummin
The Audio Degradation Toolbox and its Application to Robustness Evaluation
We introduce the Audio Degradation Toolbox (ADT) for the controlled degradation of audio signals, and propose its usage as a means of evaluating and comparing the robustness of audio processing algorithms. Music recordings encountered in practical applications are subject to varied, sometimes unpredictable degradation. For example, audio is degraded by low-quality microphones, noisy recording environments, MP3 compression, dynamic compression in broadcasting or vinyl decay. In spite of this, no standard software for the degradation of audio exists, and music processing methods are usually evaluated against clean data. The ADT fills this gap by providing Matlab scripts that emulate a wide range of degradation types. We describe 14 degradation units, and how they can be chained to create more complex, `real-world' degradations. The ADT also provides functionality to adjust existing ground-truth, correcting for temporal distortions introduced by degradation. Using four different music informatics tasks, we show that performance strongly depends on the combination of method and degradation applied. We demonstrate that specific degradations can reduce or even reverse the performance difference between two competing methods. ADT source code, sounds, impulse responses and definitions are freely available for download
Bounds on the Capacity of the Relay Channel with Noncausal State Information at Source
We consider a three-terminal state-dependent relay channel with the channel
state available non-causally at only the source. Such a model may be of
interest for node cooperation in the framework of cognition, i.e.,
collaborative signal transmission involving cognitive and non-cognitive radios.
We study the capacity of this communication model. One principal problem in
this setup is caused by the relay's not knowing the channel state. In the
discrete memoryless (DM) case, we establish lower bounds on channel capacity.
For the Gaussian case, we derive lower and upper bounds on the channel
capacity. The upper bound is strictly better than the cut-set upper bound. We
show that one of the developed lower bounds comes close to the upper bound,
asymptotically, for certain ranges of rates.Comment: 5 pages, submitted to 2010 IEEE International Symposium on
Information Theor
Drum Transcription via Classification of Bar-level Rhythmic Patterns
acceptedMatthias Mauch is supported by a Royal Academy of Engineering
Research Fellowshi
A web of stakeholders and strategies: A case of broadband diffusion in South Korea
When a new technology is launched, its diffusion becomes an issue of importance. There are various stakeholders that influence diffusion. The question that remains to be determined is their identification and roles. This paper outlines how the strategies pursued by a government acting as the key stakeholder affected the diffusion of a new technology. The analysis is based on a theoretical framework derived from innovation diffusion and stakeholder theories. The empirical evidence comes from a study of broadband development in South Korea. A web of stakeholders and strategies is drawn in order to identify the major stakeholders involved and highlight their relations. The case of South Korea offers implications for other countries that are pursuing broadband diffusion strategies
Use of learning platforms to support continuing professional development in HEIs and schools: a report for Becta carried out by the Association for Information Technology in Teacher Education (ITTE)
Prescription for nursing informatics in pre-registration nurse education.
Nurses need to be able to use information and communications technology not only to support their own practice, but also to help their patients make best use of it. This article argues that nurses are not currently adequately prepared to work with information and technology through their pre-registration education. Reflecting the lack of nursing informatics expertise, it is recommended that all pre-registration nursing programmes should have access to a nursing informatics specialist. A prescription to meet the informatics needs of the newly qualified nurse is proposed. This places the areas that need to be included in pre-registration education into broad groups that both articulate the competencies that nurses need to develop, and indicate why they are needed, rather than providing context-free checklists of skills. This is presented as a binary scatter chart with two axes, skill to knowledge and technology to information
Abstract Model Counting: A Novel Approach for Quantification of Information Leaks
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10We present a novel method for Quantitative Information Flow analysis. We show how the problem of computing information leakage can be viewed as an extension of the Satisfiability Modulo Theories (SMT) problem. This view enables us to develop a framework for QIF analysis based on the framework DPLL(T) used in SMT solvers. We then show that the methodology of Symbolic Execution (SE) also fits our framework. Based on these ideas, we build two QIF analysis tools: the first one employs CBMC, a bounded model checker for ANSI C, and the second one is built on top of Symbolic PathFinder, a Symbolic Executor for Java. We use these tools to quantify leaks in industrial code such as C programs from the Linux kernel, a Java tax program from the European project HATS, and anonymity protocol
- …
