494 resultados para Modular invariant theory
Resumo:
"The 3rd edition of this classic book offers practitioners, researchers and students a comprehensive introduction to, and overview of, career theory; introduces the Systems Theory Framework of career development; and demonstrates its considerable contemporary and innovative application to practice. A number of authors have identified the framework as one of a small number of significant innovations in the career development literature. The Systems Theory Framework of career development was developed to provide coherence to the career development field by providing a comprehensive conceptualisation of the many existing theories and concepts relevant to understanding career development. It is not designed to be a theory of career development; rather systems theory is introduced as the basis for an overarching, or metatheoretical, framework within which all concepts of career development, described in the plethora of career theories, can be usefully positioned and utilised in both theory and practice. It has been applied to the career development of children, adolescents and women. Since its first publication, the Systems Theory Framework has been the basis of numerous publications focusing on theoretical application and integration, practice and research, with a growing number of these by authors other than the framework developers. Its application across cultures also has been emphasised. The theoretical and practical unity of the Systems Theory Framework makes this book a worthy addition to the professional libraries of practitioners, researchers and students, new to, or experienced in, the field of career development."--PUBLISHER WEBSITE
Resumo:
Since the establishment of Australia’s earliest formal studies in landscape architecture, landscape planning has been a traditional focus within post-graduate studies at QUT. Study in this area has evolved from an earlier emphasis on applied physical geography through to traditional techniques and processes in visual assessment and management. The emphasis on these techniques has shifted again to a more complex exploration of natural, economic, social and cultural landscapes. Recently, the School has explored more innovative and complex dimensions of human and natural landscapes. This has involved a focus on particular regions under pressure from local social and economic change. These have included the under-threat ‘picturesque’ landscapes of the Blackall Range and the Tweed Valley. Attempts to bridge the institution and the landscape have unearthed, through a studio focus, strong connections with notions of sustainable villages, roadside interpretation, way finding, local economic initiatives, special area creation, cultural heritage brokering and ecological enhancements. These initiatives have spanned both local practice interests and academic pursuits. Central to this exploration is the concept of problem solving through the investigation of the concept of ‘multiple scales’. An open, yet intensive program is being developed with a team of ‘futurist’ practitioners offering a range of experiences and perspectives to students. The program is being increasingly linked to design studios so that landscape planning and landscape design form a fabric of inquiry that works towards reclaiming complex landscapes.
Resumo:
One of the first architects to write a book was Vitruvius, the Roman architect who published De Architectura in the 1st century BC, a book that would become the foundation for Western Architectural Thought. When I was an undergraduate, the history of architecture was taught via a series of books by architects that were at least, if not more significant than the buildings. From De Architectura to Alberti’s rejoinder De re aedificatoria (On the Art of Building) in the fifteenth century, Palladio’s Quattro Libri (The Four Books of Architecture) 1570, and Laugier’s Essai sur l'Architecture 1753. In the 1990s, we treasured the heroic architecture books of the 20th century from Le Corbusier, Vers une Architecture, to Aldo Rossi’s the Architecture of the City, Rem Koolhaas’s Delirious New York, and of course Robert Venturi’s Learning from Las Vegas which for me was the very starting point for the postmodern movement.
Resumo:
In 2008 we brought together much work at the intersection of entrepreneurship and human resource management (HRM) (Barrett & Mayson, 2008), after calls for more research (Baron, 2003; Katz, Aldrich, Welbourne & Williams, 2000; Tansky & Heneman, 2003). More has been collated since (Soriano, Dobon & Tansky, 2010; Tansky, Soriano & Dobon, 2010). We think it is now time again to regroup, pull conversational threads together and have a critical look at recent research at the intersection of HRM and Entrepreneurship. As editors of International Handbook of Entrepreneurship and HRM (Barrett & Mayson, 2008) we were privileged to collect 23 wonderfully diverse chapters from scholars around the globe addressing a range of issues at the intersection of the two pertinent disciplines or fields: HRM and entrepreneurship. This edition represented a coalescing of ideas that had been swirling about for some time. In three sections, the first dealt with theory and research methods, the second with the nature of HRM in small and entrepreneurial firms and the third with the functional aspects of HRM. At the time we were aware that the handbook did not cover the entire field and many topics were left unexplored. For example, the topic of regulation was generally absent while issues such as career advancement, performance management, organisational change and gender, diversity and ethnicity were also missing. In essence, the majority of those contributions sought to develop an understanding of the context in which particular aspects of HRM can be played out.
Resumo:
Organisational dependence upon IT continues to grow yet experiences of satisfaction vary widely. Problematic, aged IT is often cited as being a fundamental problem in this respect and this is commonly termed legacy information systems. However, in this paper the author offers an alternative, and arguably more comprehensive, theory of legacy information systems that accommodates multiple viewpoints and recognises its inherent dynamism. The paper suggests a theory of legacy information systems that comprises of the concepts of temporal effects, interpretations and characteristics. It is argued that legacy information systems are constructed of many ‘legacies’ that are handed down continuously, forming an amorphous set of sociotechnical interdependencies and relationships.
Resumo:
In 2001 45% (2.7 billion) of the world’s population of approximately 6.1 billion lived in ‘moderate poverty’ on less than US $ 2 per person per day (World Population Summary, 2012). In the last 60 years there have been many theories attempting to explain development, why some countries have the fastest growth in history, while others stagnate and so far no way has been found to explain the differences. Traditional views imply that development is the aggregation of successes from multiple individual business enterprises, but this ignores the interactions between and among institutions, organisations and individuals in the economy, which can often have unpredictable effects. Complexity Development Theory proposes that by viewing development as an emergent property of society, we can help create better development programs at the organisational, institutional and national levels. This paper asks how the principals of CAS can be used to develop CDT principals used to develop and operate development programs at the bottom of the pyramid in developing economies. To investigate this research question we conduct a literature review to define and describe CDT and create propositions for testing. We illustrate these propositions using a case study of an Asset Based Community Development (ABCD) Program for existing and nascent entrepreneurs in the Democratic Republic of the Congo (DRC). We found evidence that all the principals of CDT were related to the characteristics of CAS. If this is the case, development programs will be able to select which CAS needed to test these propositions.
Resumo:
This is the third TAProViz workshop being run at BPM. The intention this year is to consolidate on the results of the previous successful workshops by further developing this important topic, identifying the key research topics of interest to the BPM visualization community. We note this year the continuing interest in the visualisation of process mining data and resultant process models. More info at: http://wst.univie.ac.at/topics/taproviz14/
Resumo:
Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a cryptographically secure password-based mutual authentication protocol is run inside a confidential (but not necessarily authenticated) channel such as TLS; the password protocol is bound to the established channel to prevent active attacks. Such protocols are useful in practice for a variety of reasons: security no longer relies on users' ability to validate server certificates and can potentially be implemented with no modifications to the secure channel protocol library. We provide a systematic study of such authentication protocols. Building on recent advances in modelling TLS, we give a formal definition of the intended security goal, which we call password-authenticated and confidential channel establishment (PACCE). We show generically that combining a secure channel protocol, such as TLS, with a password authentication protocol, where the two protocols are bound together using either the transcript of the secure channel's handshake or the server's certificate, results in a secure PACCE protocol. Our prototype based on TLS is available as a cross-platform client-side Firefox browser extension and a server-side web application which can easily be installed on deployed web browsers and servers.
Resumo:
A system is something that can be separated from its surrounds, but this definition leaves much scope for refinement. Starting with the notion of measurement, we explore increasingly contextual system behaviour, and identify three major forms of contextuality that might be exhibited by a system: (a) between components; (b) between system and experimental method, and; (c) between a system and its environment. Quantum Theory is shown to provide a highly useful formalism from which all three forms of contextuality can be analysed, offering numerous tests for contextual behaviour, as well as modelling possibilities for systems that do indeed display it. I conclude with the introduction of a Contextualised General Systems Theory based upon an extension of this formalism.
Resumo:
The purpose of this book by two Australian authors is to: introduce the audience to the full complement of contextual elements found within program theory; offer practical suggestions to engage with theories of change, theories of action and logic models; and provide substantial evidence for this approach through scholarly literature, practice case studies together with the authors' combined experience of 60 years.
Resumo:
Building information models are increasingly being utilised for facility management of large facilities such as critical infrastructures. In such environments, it is valuable to utilise the vast amount of data contained within the building information models to improve access control administration. The use of building information models in access control scenarios can provide 3D visualisation of buildings as well as many other advantages such as automation of essential tasks including path finding, consistency detection, and accessibility verification. However, there is no mathematical model for building information models that can be used to describe and compute these functions. In this paper, we show how graph theory can be utilised as a representation language of building information models and the proposed security related functions. This graph-theoretic representation allows for mathematically representing building information models and performing computations using these functions.
Resumo:
The Queensland University of Technology Research Team has recently edited a book on the idea of information experience. Authors from many parts of the world and focussed on many contexts have contributed chapters. The book represents the first attempt to profile and discuss information experience as a research domain and a research object, together with emphasis on different theories and methods being used in workplace, educational and community contexts. In this session members of the editorial team will introduce the book. We anticipate it will be of interest to any information professionals, students or researchers interested in understanding peoples' information experience.