102 resultados para bounded rationality


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Substantial research efforts have been expended to deal with the complexity of concurrent systems that is inherent to their analysis, e.g., works that tackle the well-known state space explosion problem. Approaches differ in the classes of properties that they are able to suitably check and this is largely a result of the way they balance the trade-off between analysis time and space employed to describe a concurrent system. One interesting class of properties is concerned with behavioral characteristics. These properties are conveniently expressed in terms of computations, or runs, in concurrent systems. This article introduces the theory of untanglings that exploits a particular representation of a collection of runs in a concurrent system. It is shown that a representative untangling of a bounded concurrent system can be constructed that captures all and only the behavior of the system. Representative untanglings strike a unique balance between time and space, yet provide a single model for the convenient extraction of various behavioral properties. Performance measurements in terms of construction time and size of representative untanglings with respect to the original specifications of concurrent systems, conducted on a collection of models from practice, confirm the scalability of the approach. Finally, this article demonstrates practical benefits of using representative untanglings when checking various behavioral properties of concurrent systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

First year Property Economics students enrolled in the Bachelor of Urban Development at QUT are required to undertake a number of compulsory subjects, alongside students undertaking studies in other disciplines. One such common unit is ‘Stewardship of Land’, an interdisciplinary unit that introduces students to the characteristics of land and land tenure with a focus on land use and property rights. It covers a range of issues including: native title, land contamination, heritage values, alternative uses, the property development process, impact of environmental and social factors, and the management of land, both urban and regional. Teaching such a diverse content to a diverse audience has in previous years proved difficult, from the perspectives of relevance, engagement and content overload. In 2011 a project was undertake to redevelop this unit to reflect ‘threshold concepts’, concepts that are “transformative, probably irreversible, integrative, often troublesome and probably bounded” (Meyer & Land, 2003) . This project involved the development of a new set of underlying concepts students should draw from the unit, application of these to the unit curriculum, and a survey of the student response to these changes. This paper reports on the threshold concepts developed for this unit, the changes this made to the unit curriculum, and a preliminary report on survey responses. Recommendations for other educators seeking to incorporate threshold concepts into their curricula are provided.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports on a four year Australian Research Council funded Linkage Project titled Skilling Indigenous Queensland, conducted in regional areas of Queensland, Australia from 2009 to 2013. The project sought to investigate vocational education, training (VET) and teaching, Indigenous learners’ needs, employer cultural and expectations and community culture and expectations to identify best practice in numeracy teaching for Indigenous VET learners. Specifically it focused on ways to enhance the teaching and learning of courses and the associated mathematics in such courses to benefit learners and increase their future opportunities of employment. To date thirty-nine teachers/trainers/teacher aides and two hundred and thirty-one students consented to participate in the project. Nine VET courses were nominated to be the focus on the study. This paper focuses on questionnaire and interview responses from four trainers, two teacher aides and six students. In recent years a considerable amount of funding has been allocated to increasing Indigenous Peoples’ participation in education and employment. This increased funding is predicated on the assumption that it will make a difference and contribute to closing the education gap between Indigenous and non-Indigenous Australians (Council of Australia Governments, 2009). The central tenet is that access to education for Indigenous People will create substantial social and economic benefits for regional and remote Indigenous People. The project’s aim is to address some of the issues associated with the gap. To achieve the aims, the project adopted a mixed methods design aimed at benefitting research participants and included: participatory collaborative action research (Kemmis & McTaggart, 1988) and, community research (Smith, 1999). Participatory collaborative action research refers to a is a “collective, self-reflective enquiry undertaken by participants in social situations in order to improve the rationality and justice of their own social and educational practices” (Kemmis et al., 1988, p. 5). Community research is described as an approach that “conveys a much more intimate, human and self-defined space” (p. 127). Community research relies on and validates the community’s own definitions. As the project is informed by the social at a community level, it is described as “community action research or emancipatory research” (Smith, 1999, p. 127). It seeks to demonstrate benefit to the community, making positive differences in the lives of Indigenous People and communities. The data collection techniques included survey questionnaires, video recording of teaching and learning processes, teacher reflective video analysis of teaching, observations, semi-structured interviews and student numeracy testing. As a result of these processes, the findings indicate that VET course teachers work hard to adopt contextualising strategies to their teaching, however this process is not always straight forward because of the perceptions of how mathematics has been taught and learned historically. Further teachers, trainers and students have high expectations of one another with the view to successful outcomes from the courses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The future emergence of many types of airborne vehicles and unpiloted aircraft in the national airspace means collision avoidance is of primary concern in an uncooperative airspace environment. The ability to replicate a pilot’s see and avoid capability using cameras coupled with vision based avoidance control is an important part of an overall collision avoidance strategy. But unfortunately without range collision avoidance has no direct way to guarantee a level of safety. Collision scenario flight tests with two aircraft and a monocular camera threat detection and tracking system were used to study the accuracy of image-derived angle measurements. The effect of image-derived angle errors on reactive vision-based avoidance performance was then studied by simulation. The results show that whilst large angle measurement errors can significantly affect minimum ranging characteristics across a variety of initial conditions and closing speeds, the minimum range is always bounded and a collision never occurs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Lockyer Valley is situated 80 km west of Brisbane and is bounded on the sou th and west by the Great Dividing Range. The valley is a major western sub - catchment of the larger Brisbane River drainage system and is drained by the Lockyer Creek. The Lockyer catchment forms approximately 20% of the total Brisbane River catchment and has an area of around 2900 km2. The Lockyer Creek is an ephemeral drainage system, and the stream and associated alluvium are the main source for irrigation water supply in the Lockyer Valley. The catchment is comprised of a number of well -defined, elongate tributaries in the south, and others in the north, which are more meandering in nature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While substantial research on intelligent transportation systems has focused on the development of novel wireless communication technologies and protocols, relatively little work has sought to fully exploit proximity-based wireless technologies that passengers actually carry with them today. This paper presents the real-world deployment of a system that exploits public transit bus passengers’ Bluetooth-capable devices to capture and reconstruct micro- and macro-passenger behavior. We present supporting evidence that approximately 12% of passengers already carry Bluetooth-enabled devices and that the data collected on these passengers captures with almost 80 % accuracy the daily fluctuation of actual passengers flows. The paper makes three contributions in terms of understanding passenger behavior: We verify that the length of passenger trips is exponentially bounded, the frequency of passenger trips follows a power law distribution, and the microstructure of the network of passenger movements is polycentric.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In spite of the activism of professional bodies and researchers, empirical evidence shows that project management still does not deliver the expected benefits and promises. Hence, many have questioned the validity of the hegemonic rationalist paradigm anchored in the Enlightenment and Natural Sciences tradition supporting project management research and practice for the last 60 years and the lack of relevance to practice of the current conceptual base of project management. In order to address these limitations many authors, taking a post-modernist stance in social sciences, build on ‘pre-modern’ philosophies such as the Aristotelian one, specially emphasizing the role of praxis (activity), and phronesis (practical wisdom, prudence). Indeed, ‘Praxis … is the central category of the philosophy which is not merely an interpretation of the world, but is also a guide to its transformation …’ (Vazquez, 1977:. 149). Therefore, praxis offers an important focus for practitioners and researchers in social sciences, one in which theory is integrated with practice at the point of intervention. Simply stated, praxis can serve as a common ground for those interested in basic and applied research by providing knowledge of the reality in which action, informed by theory, takes place. Consequently, I suggest a ‘praxeological’ style of reasoning (praxeology being defined as study or science of human actions and conduct, including praxis, practices and phronesis) and to go beyond the ‘Theory-Practice’ divide. Moreover, I argue that we need to move away from the current dichotomy between the two classes ‘scholars experts-researchers’ and ‘managers/workers-practitioners-participants’. Considering one single class of ‘PraXitioner’, becoming a phronimos, may contribute to create new perspectives and open up new ways of thinking and acting in project situations. Thus, I call for a Perestroika in researching and acting in project management situations. My intent is to suggest a balanced praxeological view of the apparent opposition between social and natural science approaches. I explore, in this chapter, three key questions, covering the ontological, epistemological and praxeological dimensions of project management in action. 1. Are the research approaches being currently used appropriate for generating contributions that matter to both theory and practice with regards to what a ‘project’ is or to what we do when we call a specific situation ‘a project’? 2. On the basis of which intellectual virtues is the knowledge generated and what is the impact for theory and practice? 3. Are the modes of action of the practitioners ‘prudent’ and are they differentiating or reconciling formal and abstract rationality from substantive rationality and situated reasoning with regards to the mode of action they adopt in particular project situations? The investigation of the above questions leads me to debate about ‘Project Management-as-Praxis’, and to suggest ‘A’ (not ‘THE’) ‘praxeological’ style of reasoning and mode of inquiry – acknowledging a non-paradigmatic, subjective and kaleidoscopic perspective – for ‘Knowing-as-Practicing’ in project management. In short, this is about making a ‘Projects Science’ that matters.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Expert searchers engage with information as information brokers, researchers, reference librarians, information architects, faculty who teach advanced search, and in a variety of other information-intensive professions. Their experiences are characterized by a profound understanding of information concepts and skills and they have an agile ability to apply this knowledge to interacting with and having an impact on the information environment. This study explored the learning experiences of searchers to understand the acquisition of search expertise. The research question was: What can be learned about becoming an expert searcher from the learning experiences of proficient novice searchers and highly experienced searchers? The key objectives were: (1) to explore the existence of threshold concepts in search expertise; (2) to improve our understanding of how search expertise is acquired and how novice searchers, intent on becoming experts, can learn to search in more expertlike ways. The participant sample drew from two population groups: (1) highly experienced searchers with a minimum of 20 years of relevant professional experience, including LIS faculty who teach advanced search, information brokers, and search engine developers (11 subjects); and (2) MLIS students who had completed coursework in information retrieval and online searching and demonstrated exceptional ability (9 subjects). Using these two groups allowed a nuanced understanding of the experience of learning to search in expertlike ways, with data from those who search at a very high level as well as those who may be actively developing expertise. The study used semi-structured interviews, search tasks with think-aloud narratives, and talk-after protocols. Searches were screen-captured with simultaneous audio-recording of the think-aloud narrative. Data were coded and analyzed using NVivo9 and manually. Grounded theory allowed categories and themes to emerge from the data. Categories represented conceptual knowledge and attributes of expert searchers. In accord with grounded theory method, once theoretical saturation was achieved, during the final stage of analysis the data were viewed through lenses of existing theoretical frameworks. For this study, threshold concept theory (Meyer & Land, 2003) was used to explore which concepts might be threshold concepts. Threshold concepts have been used to explore transformative learning portals in subjects ranging from economics to mathematics. A threshold concept has five defining characteristics: transformative (causing a shift in perception), irreversible (unlikely to be forgotten), integrative (unifying separate concepts), troublesome (initially counter-intuitive), and may be bounded. Themes that emerged provided evidence of four concepts which had the characteristics of threshold concepts. These were: information environment: the total information environment is perceived and understood; information structures: content, index structures, and retrieval algorithms are understood; information vocabularies: fluency in search behaviors related to language, including natural language, controlled vocabulary, and finesse using proximity, truncation, and other language-based tools. The fourth threshold concept was concept fusion, the integration of the other three threshold concepts and further defined by three properties: visioning (anticipating next moves), being light on one's 'search feet' (dancing property), and profound ontological shift (identity as searcher). In addition to the threshold concepts, findings were reported that were not concept-based, including praxes and traits of expert searchers. A model of search expertise is proposed with the four threshold concepts at its core that also integrates the traits and praxes elicited from the study, attributes which are likewise long recognized in LIS research as present in professional searchers. The research provides a deeper understanding of the transformative learning experiences involved in the acquisition of search expertise. It adds to our understanding of search expertise in the context of today's information environment and has implications for teaching advanced search, for research more broadly within library and information science, and for methodologies used to explore threshold concepts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Enterprise social networks are organizationally bounded online platforms for users to interact with another and maintain interpersonal relationships. The allure of these technologies is often seen in intra-organizational communication, collaboration and innovation. How these technologies actually support organizational innovation efforts remains unclear. A specific challenge is whether digital content on these platforms converts to actual innovation development efforts. In this study we set out to examine innovation-centric content flows on enterprise social networking platforms, and advance a conceptual model that seeks to explain which innovation conveyed in the digital content will traverse from the digital platform into regular processes. We describe important constructs of our model and offer strategies for the operationalization of the constructs. We conclude with an outlook to our ongoing empirical study that will explore and validate the key propositions of our model, and we sketch some potential implications for industry and academia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Widespread scholarly interest in ethics in research with children, as an extant field of inquiry and practice, is a relatively new phenomenon. The discipline of ethics can be traced back to the Hippocratic school, but its contemporary applications in the everyday worlds of children and those around them are gaining greater attention from theorists, practitioners, and those involved in policy. Heightened international awareness of the United Nations Convention on the Rights of the Child (1979) gave significant impetus to increasing international awareness of children’s rights to provision, protection, and participation in everyday contexts, including those in which research occurs. Understandings of research ethics and of children’s involvement in research relate to broader understandings of children and childhood drawn from developmental science, sociology, human geography, health sciences, and children’s human rights to participation and protection. Key understandings pertain to children’s competence to participate in research, to operate as reliable informants with respect to their own lives, to provide voluntary informed consent and dissent in research, and to make meaningful decisions about the nature and extent of their participation. The field is international and interdisciplinary, although bounded by legislative, policy, and jurisdictional requirements governing research—its conduct and dissemination. So, too, the burgeoning work of ethics committees, whether in relation to health research or social research, is evidence of a sharpened focus on governance of child research. Oxford Bibliographies offers a suite of perspectives, resources, and strategies to guide the researcher, practitioner, and policymaker and serves to challenge readers to interrogate conceptual understandings, methodologies, and dissemination of research with and about children. Exploration of the suite opens up new possibilities for considering children’s rights to participation in matters that affect their lives and for children to be seen and heard in research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values. In this work, we address more granular leakage: partial leakage of long-term secrets of protocol principals, even after the session key is established. We introduce a generic key exchange security model, which can be instantiated allowing bounded or continuous leakage, even when the adversary learns certain ephemeral secrets or session keys. Our model is the strongest known partial-leakage-based security model for key exchange protocols. We propose a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the proposed model, by introducing a new concept: the leakage-resilient NAXOS trick. We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient public-key cryptosystem.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Feeling the wool and needles and constructing the knitting is very different to looking at knitting or thinking about knitting. Creating with the material slows everything down enough to enable significant connection with the process. Knitting as a mode for researching involves corporeal activity/philosophy that foregrounds a physical rationality, and this offers critical investigation of knowledge conventions that hierarchize intellectual activity as something that seeks to justify or clarify via a cerebral mode of presenting reasonable and rational arguments...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Feeling the wool and needles and constructing the knitting is very different to looking at knitting or thinking about knitting. Creating with the material slows everything down enough to enable significant connection with the process. Knitting as a mode for researching involves corporeal activity/philosophy that foregrounds a physical rationality, and this offers critical investigation of knowledge conventions that hierarchize intellectual activity as something that seeks to justify or clarify via a cerebral mode of presenting reasonable and rational arguments...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no bounds on the total leakage. We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage.