1,909 research outputs found

    The reflection and self-assessment of student interpreters through logbooks : a case study

    Get PDF
    The aims of the current study are threefold. The first aim is to investigate how writing reflective journals may facilitate student interpreters’ learning process in becoming more reflective and in assessing their own interpreting performance. The second aim is to investigate the relationship between self-assessment and reflection. The third aim is to explore how different scaffolding tools may have influenced the development of students’ reflective thinking and their approach to self-assessment. Initially, educational theories, theoretical constructs on reflection and learner self-assessment were reviewed to examine the concepts of reflection and self-assessment in the context of interpreter training. Empirical studies on the functions of reflective journals and on self-assessment, particularly those carried out in the field of interpreting were explored to help the researcher design the theoretical framework. As a case study, logbooks were collected from students taking introductory interpreting courses in a translator and interpreter training institute in a British university. The main method adopted for the analysis of the logbooks collected was thematic analysis. The themes which emerged from the data enabled the researcher to explain how writing reflective journals can shape student interpreters’ learning process and how scaffolding tools used in the study influence students’ self-assessment and reflection. The study found that the student interpreters in this case study focused more on self-assessment of their interpretation performance in their logbooks. However, this study also found evidence showing that writing logbooks have indeed helped students to become more reflective. The scaffolding tools provided, according to the result of this case study, appear to have significant influence to help some participants to move beyond reflecting on individual learning experience and to think about the learning experience from a long-term perspective

    Emergence of multicluster chimera states

    Get PDF
    We thank Prof. L. Huang for helpful discussions. This work was partially supported by ARO under Grant No. W911NF-14-1-0504 and by NSF of China under Grant No. 11275003. The visit of NY to Arizona State University was partially sponsored by Prof. Z. Zheng and the State Scholarship Fund of China.Peer reviewedPublisher PD

    Multiagent model and mean field theory of complex auction dynamics

    Get PDF
    Acknowledgements We are grateful to Ms Yinan Zhao for providing the data and to Yuzhong Chen and Cancan Zhou for discussions and suggestions. This work was supported by ARO under Grant No. W911NF-14-1-0504 and by NSFC under Grants Nos. 11275003 and 61174165. The visit of QC to Arizona State University was partially sponsored by the State Scholarship Fund of China.Peer reviewedPublisher PD

    Spatiotemporal patterns and predictability of cyberattacks

    Full text link
    A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term "spatio" refers to the IP address space. In particular, we focus on analyzing {\em macroscopic} properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack "fingerprints" and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches
    corecore