66 research outputs found
The Doyen of Dixie: A Survey of the Banjo Stylings of Uncle Dave Macon
David Harrison Macon (1870-1952) is often memorialized for his showmanship rather than his banjo playing. To compartmentalize such a significant American musician yields a wide gap within scholarship about Macon, country music history and the banjo. Macon’s banjo playing, documented through over two-hundred and fifty recordings made between the 1920s and 1950s, represents an array of cultures, eras, ethnicities, and styles all preserved in the repertoire of one of the most prolific country musicians of the 20th century. This study reveals Macon’s playing by considering such factors as influences that preceded his professional tenure, identifying elements within his playing from specific stylistic origins, and by technically notating selections from Macon’s canon that represent those influences. To understand the instrumental playing of one of early country music’s most important figures broadens understanding of banjo influences from the nineteenth century which laid the foundation for the instrument’s renaissance in the twentieth century
Search Rank Fraud De-Anonymization in Online Systems
We introduce the fraud de-anonymization problem, that goes beyond fraud
detection, to unmask the human masterminds responsible for posting search rank
fraud in online systems. We collect and study search rank fraud data from
Upwork, and survey the capabilities and behaviors of 58 search rank fraudsters
recruited from 6 crowdsourcing sites. We propose Dolos, a fraud
de-anonymization system that leverages traits and behaviors extracted from
these studies, to attribute detected fraud to crowdsourcing site fraudsters,
thus to real identities and bank accounts. We introduce MCDense, a min-cut
dense component detection algorithm to uncover groups of user accounts
controlled by different fraudsters, and leverage stylometry and deep learning
to attribute them to crowdsourcing site profiles. Dolos correctly identified
the owners of 95% of fraudster-controlled communities, and uncovered fraudsters
who promoted as many as 97.5% of fraud apps we collected from Google Play. When
evaluated on 13,087 apps (820,760 reviews), which we monitored over more than 6
months, Dolos identified 1,056 apps with suspicious reviewer groups. We report
orthogonal evidence of their fraud, including fraud duplicates and fraud
re-posts.Comment: The 29Th ACM Conference on Hypertext and Social Media, July 201
UA12/2/1 Grad Guide
Magazine edition of the College Heights Herald featuring the Class of 2022. Crawford, Ashlyn. Dear 2022 Graduates Jones, Tea. Survival Guide for Post Graduate Job Prep Wilson, Gabby. Time for Your Close-up! Wilson, Gabby. Your Grad Book List Honeck, Adelle. Taking Risks: Advice to Graduates Potter College of Arts & Letters College of Health & Human Services College of Education & Behavioral Sciences Ogden College of Science & Engineering Gordon Ford College of Business Brush, Bailey. Grad Playlis
Hubungan Kualitas Tidur dan Kejadian Stroke Iskemik di Bangsal dan Poliklinik Saraf RSUD Dokter Abdul Aziz Singkawang
Latar belakang. Stroke merupakan penyebab utama dari kecacatan dan kematian di seluruh dunia. Gangguan kualitas tidur dalam beberapa tahun terakhir ini dipandang sebagai faktor potensial penyebab terjadinya stroke. Ketidakcukupan kualitasdan kuantitas tidur dapat merusak memori dan kemampuan kognitif. Jika hal ini berlanjut hingga bertahun-tahun maka akan berdampak pada risiko terjadinya stroke iskemik. Tujuan. Penelitian ini bertujuan untuk mengetahui hubungan kualitas tidur dan kejadian stroke iskemik di RSUD Dokter Abdul Aziz Singkawang. Metode. Penelitian analitik dengan desain penelitian kasus-kontrol menggunakan kuesioner PSQI (Piitsburgh Sleep Quality Index). Penelitian dilakukan di bangsal penyakit dalam dan poliklinik saraf RSUD dr. Abdul Aziz Singkawang. Kasus-kasus yang memenuhi kriteria diteliti secara retrospektif dengan menggunakan data yang diperoleh dari wawancara menggunakan kuesioner PSQI dan rekam medik. Hasil penelitian diuji dengan uji statistik chi square dengan program SPSS 22.0. Hasil. Analisis statistik diperoleh nilai significancy yang didapatkan dengan uji chi-square adalah 0,037 (p<0,05) dan OR sebesar 0,323. Hasil analisis statistik menunjukkan terdapatnya hubungan bermakna antara kualitas tidur dan kejadian stroke iskemik. Kesimpulan. Terdapat hubungan yang bermakna antara kualitas tidur dan kejadian stroke iskemik. Kualitas tidur yang baik merupakan faktor protektif pada kejadian stroke iskemik.
Étude d'une Boîte à Outils Multi-Dispositifs
International audienceLes boîtes à outils graphiques actuelles ne gèrent qu'un clavier, une souris et un nombre limité de techniques d'interaction. La prolifération de nouveaux dispositifs, en particulier pour les jeux, la CAO, le dessin et l'accès aux handicapés n'est donc pas prise en compte. Cet article présente une étude des difficultés à gérer les modes d'interaction étendus au niveau des boîtes à outils, ainsi qu'une architecture de widget découplant la gestion des événements de la présentation. Cette architecture est réminiscente du modèle MVC de Smalltalk : elle redonne son existence à la composante contrôle qui avait disparue des boîtes à outils. Cependant, notre version définit une interface générique de communication avec la partie vue du widget. Plusieurs contrôleurs peuvent fonctionner en parallèle dans le même widget, autorisant l'interaction pa- rallèle tout en évitant les conflits à un niveau de granularité correspondant aux zones visuelles gérées par le widget. Nous montrons une implémentation partielle de l'architecture dans Java Swing et décrivons quelques contrôleurs spécifiques que nous avons implémentés : un pointeur contrôlé par le clavier et un autre par la voix. Ces pointeurs coexistent et fonctionnent parallèlement sans que l'interface utilisateur ne soit modifiée
Grizzly Football Game Day Program, September 8, 1984
Program created for a Grizzly football game.https://scholarworks.umt.edu/grizzlyfootball_programs_asc/1062/thumbnail.jp
Playing Hide-and-Seek with Spammers: Detecting Evasive Adversaries in the Online Social Network Domain
Online Social Networks (OSNs) have seen an enormous boost in popularity in recent years. Along with this popularity has come tribulations such as privacy concerns, spam, phishing and malware. Many recent works have focused on automatically detecting these unwanted behaviors in OSNs so that they may be removed. These works have developed state-of-the-art detection schemes that use machine learning techniques to automatically classify OSN accounts as spam or non-spam. In this work, these detection schemes are recreated and tested on new data. Through this analysis, it is clear that spammers are beginning to evade even these detectors. The evasion tactics used by spammers are identified and analyzed. Then a new detection scheme is built upon the previous ones that is robust against these evasion tactics. Next, the difficulty of evasion of the existing detectors and the new detector are formalized and compared. This work builds a foundation for future researchers to build on so that those who would like to protect innocent internet users from spam and malicious content can overcome the advances of those that would prey on these users for a meager dollar
Recommended from our members
Analyzing Neoliberalism in Theory and Practice: The Case of Performance-Based Funding for Higher Education
Neoliberal ideas – whether the new public management, principal-agent theory, or performance management – have provided rationale for sweeping reforms in the governance and operation of higher education. Despite this, little attention has been devoted to how well neoliberal theory illuminates the policy process by which neoliberal policy is enacted and implemented. This paper expands our understanding of the origins, implementation, and impacts of neoliberal policies by examining the case of performance-based funding (PBF) for higher education in the United States, Europe, Canada, Australia, and elsewhere. With regard to policy origins, neoliberal theory anticipates the key role that top government officials play in the development of PBF but fails to anticipate the important roles of business and higher education institutions in the formation of neoliberal policies. Neoliberal theory notes the important role of monetary incentives as policy instruments and the obstacles posed by gaming on the part of agents, but the implementation of PBF also involves other policy instruments and faces additional obstacles to implementation. Policy outcomes fitting the neoliberal focus on organizational effectiveness and efficiency are only weakly produced by PBF, but PBF is associated with a host of unintended impacts that neoliberal theory ignores
- …