2,667 research outputs found

    Girls in the 'Hood: The Importance of Feeling Safe

    Get PDF
    Looks at how adolescent girls benefited from moving out of extremely poor, high-crime neighborhoods into lower poverty areas through the Moving to Opportunity program. Focuses on reduced "female fear" as one reason why girls benefited more than boys

    TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-based Intrusion Detection System

    Get PDF
    Intrusion detection systems (IDS) play a pivotal role in computer security by discovering and repealing malicious activities in computer networks. Anomaly-based IDS, in particular, rely on classification models trained using historical data to discover such malicious activities. In this paper, an improved IDS based on hybrid feature selection and two-level classifier ensembles is proposed. An hybrid feature selection technique comprising three methods, i.e. particle swarm optimization, ant colony algorithm, and genetic algorithm, is utilized to reduce the feature size of the training datasets (NSL-KDD and UNSW-NB15 are considered in this paper). Features are selected based on the classification performance of a reduced error pruning tree (REPT) classifier. Then, a two-level classifier ensembles based on two meta learners, i.e., rotation forest and bagging, is proposed. On the NSL-KDD dataset, the proposed classifier shows 85.8% accuracy, 86.8% sensitivity, and 88.0% detection rate, which remarkably outperform other classification techniques recently proposed in the literature. Results regarding the UNSW-NB15 dataset also improve the ones achieved by several state of the art techniques. Finally, to verify the results, a two-step statistical significance test is conducted. This is not usually considered by IDS research thus far and, therefore, adds value to the experimental results achieved by the proposed classifier

    Olympic Trolls: Mainstream Memes and Digital Discord

    Get PDF
    While the mainstream press have often used the accusation of trolling to cover almost any form of online abuse, the term itself has a long and changing history. In scholarly work, trolling has morphed from a description of newsgroup and discussion board commentators who appeared genuine but were actually just provocateurs, through to contemporary analyses which focus on the anonymity, memes and abusive comments most clearly represented by users of the iconic online image board 4chan, and, at times, the related Anonymous political movement. To explore more mainstream examples of what might appear to be trolling at first glance, this paper analyses the Channel Nine Fail (Ch9Fail) Facebook group which formed in protest against the quality of the publicly broadcast Olympic Games coverage in Australia in 2012. While utilising many tools of trolling, such as the use of memes, deliberately provocative humour and language, targeting celebrities, and attempting to provoke media attention, this paper argues that the Ch9Fail group actually demonstrates the increasingly mainstream nature of many online communication strategies once associated with trolls. The mainstreaming of certain activities which have typified trolling highlight these techniques as part of a more banal everyday digital discourse; despite mainstream media presenting trolls are extremist provocateurs, many who partake in trolling techniques are simply ordinary citizens expressing themselves online

    The social media contradiction: Data mining and digital death

    Get PDF

    Joss Whedon, Dr. Horrible, and the Future of Web Media

    Get PDF
    In the 2007 Writers Guild of America strike, one of the areas in dispute was the question of residual payments for online material. On the picket line, Buffy creator Joss Whedon discussed new ways online media production could be financed. After the strike, Whedon self-funded a web media production, Dr. Horrible's Sing-Along Blog. Whedon and his collaborators positioned Dr. Horrible as an experiment, investigating whether original online media content created outside of studio funding could be financially viable. Dr. Horrible was a bigger hit than expected, with a paid version topping the iTunes charts and a DVD release hitting the number two position on Amazon. This article explores which factors most obviously contributed to Dr. Horrible's success, whether these factors are replicable by other media creators, the incorporation of fan labor into web media projects, and how web-specific content creation relates to more traditional forms of media production

    Scheduling Refactoring Opportunities Using Computational Search

    Full text link
    Maintaining a high-level code quality can be extremely expensive since time and monetary pressures force programmers to neglect improving the quality of their source code. Refactoring is an extremely important solution to reduce and manage the growing complexity of software systems. Developers often need to make trade-offs between code quality, available resources and delivering a product on time, and such management support is beyond the scope and capability of existing refactoring engines. The problem of finding the optimal sequence in which the refactoring opportunities, such as bad smells, should be ordered is rarely studied. Due to the large number of possible scheduling solutions to explore, software engineers cannot manually find an optimal sequence of refactoring opportunities that may reduce the effort and time required to efficiently improve the quality of software systems. In this paper, we use bi-level multi-objective optimization to the refactoring opportunities management problem. The upper level generates a population of solutions where each solution is defined as an ordered list of code smells to fix which maximize the benefits in terms of quality improvements and minimize the cost in terms of number of refactorings to apply. The lower level finds the best sequence of refactorings that fixes the maximum number of code smells with a minimum number of refactorings for each solution (code smells sequence) in the upper level. The statistical analysis of our experiments over 30 runs on 6 open source systems and 1 industrial project shows a significant reduction in effort and better improvements of quality when compared to state-of-art bad smells prioritization techniques. The manual evaluation performed by software engineers also confirms the relevance of our refactoring opportunities scheduling solutions.Master of ScienceComputer Science, College of Engineering and Computer ScienceUniversity of Michigan-Dearbornhttp://deepblue.lib.umich.edu/bitstream/2027.42/136063/1/Scheduling Refactoring Opportunities Using Computational Search.pd
    corecore