182 resultados para Discrete Mathematics in Computer Science


Relevância:

100.00% 100.00%

Publicador:

Resumo:

For Design Science Research (DSR) to gain wide credence as a research paradigm in Information Systems (IS), it must contribute to theory. “Theory cannot be improved until we improve the theorizing process, and we cannot improve the theorizing process until we describe it more explicitly, operate it more self-consciously, and decouple it from validation more deliberately” (Weick 1989, p. 516). With the aim of improved design science theorizing, we propose a DSR abstraction-layers framework that integrates, interlates, and harmonizes key methodological notions, primary of which are: 1) the Design Science (DS), Design Research (DR), and Routine Design (RD) distinction (Winter 2008); 2) Multi Grounding in IS Design Theory (ISDT) (Goldkuhl & Lind 2010); 3) the Idealized Model for Theory Development (IM4TD) (Fischer & Gregor 2011); and 4) the DSR Theorizing Framework (Lee et al. 2011). Though theorizing, or the abstraction process, has been the subject of healthy discussion in DSR, important questions remain. With most attention to date having focused on theorizing for Design Research (DR), a key stimulus of the layered view was the realization that Design Science (DS) produces abstract knowledge at a higher level of generality. The resultant framework includes four abstraction layers: (i) Design Research (DR) 1st Abstract Layer, (ii) Design Science (DS) 2nd Abstract Layer, (iii) DSR Incubation 3rd Layer, and (iv) Routine Design 4th Layer. Differentiating and inter-relating these layers will aid DSR researchers to discover, position, and amplify their DSR contributions. Additionally, consideration of the four layers can trigger creative perspectives that suggest unplanned outputs. The first abstraction layer, including its alternative patterns of activity, is well recognized in the literature. The other layers, however, are less well recognized; and the integrated representation of layers is novel.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We propose a reliable and ubiquitous group key distribution scheme that is suitable for ad hoc networks. The scheme has self-initialisation and self-securing features. The former feature allows a cooperation of an arbitrary number of nodes to initialise the system, and it also allows node admission to be performed in a decentralised fashion. The latter feature allows a group member to determine the group key remotely while maintaining the system security. We also consider a decentralised solution of establishing secure point-to-point communication. The solution allows a new node to establish a secure channel with every existing node if it has pre-existing secure channels with a threshold number of the existing nodes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is substantial attention worldwide to the quality of secondary school teaching in STEM in Education. This paper reports on the use of Outcome Mapping (OM) as an approach to guide and monitor change in teacher practice and a visual tool, shaped as a Star, to benchmark and monitor this behaviour. OM and the visual tool were employed to guide and document three secondary teachers’ behaviour as they planned, implemented and assessed a science unit in the new Australian standards-referenced curriculum. Five key outcome markers in the teachers’ behaviour were identified together with progress markers — cumulative qualitative indicators — leading to these outcomes. The use of a Star to benchmark and track teachers’ behaviours was particularly useful because it showed teacher behaviour on multiple dimensions simultaneously at various points in time. It also highlighted priorities in need of further attention and provided a pathway to achievement. Hence, OM and the Star representation provide both theoretical and pragmatic approaches to enhancing quality in STEM teaching.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Live migration of multiple Virtual Machines (VMs) has become an integral management activity in data centers for power saving, load balancing and system maintenance. While state-of-the-art live migration techniques focus on the improvement of migration performance of an independent single VM, only a little has been investigated to the case of live migration of multiple interacting VMs. Live migration is mostly influenced by the network bandwidth and arbitrarily migrating a VM which has data inter-dependencies with other VMs may increase the bandwidth consumption and adversely affect the performances of subsequent migrations. In this paper, we propose a Random Key Genetic Algorithm (RKGA) that efficiently schedules the migration of a given set of VMs accounting both inter-VM dependency and data center communication network. The experimental results show that the RKGA can schedule the migration of multiple VMs with significantly shorter total migration time and total downtime compared to a heuristic algorithm.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Environmental monitoring has become increasingly important due to the significant impact of human activities and climate change on biodiversity. Environmental sound sources such as rain and insect vocalizations are a rich and underexploited source of information in environmental audio recordings. This paper is concerned with the classification of rain within acoustic sensor re-cordings. We present the novel application of a set of features for classifying environmental acoustics: acoustic entropy, the acoustic complexity index, spectral cover, and background noise. In order to improve the performance of the rain classification system we automatically classify segments of environmental recordings into the classes of heavy rain or non-rain. A decision tree classifier is experientially compared with other classifiers. The experimental results show that our system is effective in classifying segments of environmental audio recordings with an accuracy of 93% for the binary classification of heavy rain/non-rain.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper describes a design framework intended to conceptually map the influence that game design has on the creative activity people engage in during gameplay. The framework builds on behavioral and verbal analysis of people playing puzzle games. The analysis was designed to better understand the extent to which gameplay activities within different games facilitate creative problem solving. We have used an expert review process to evaluate these games in terms of their game design elements and have taken a cognitive action approach to this process to investigate how particular elements produce the potential for creative activity. This paper proposes guidelines that build upon our understanding of the relationship between the creative processes that players undertake during a game and the components of the game that allow these processes to occur. These guidelines may be used in the game design process to better facilitate creative gameplay activity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a single pass algorithm for mining discriminative Itemsets in data streams using a novel data structure and the tilted-time window model. Discriminative Itemsets are defined as Itemsets that are frequent in one data stream and their frequency in that stream is much higher than the rest of the streams in the dataset. In order to deal with the data structure size, we propose a pruning process that results in the compact tree structure containing discriminative Itemsets. Empirical analysis shows the sound time and space complexity of the proposed method.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Editorial: This theme issue of BJSM presents key papers from the 3rd International Conference on Ambulatory Monitoring of Physical Activity and Movement (ICAMPAM). The July 2013 conference was hosted by the University of Massachusetts and was attended by researchers, clinicians, students and technology vendors for North America, Europe, Australasia and Asia...

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As detailed by a number of scholars (Emmison & Smith, 2000, 2012; Harrison, 1996, 2002, 2004), photographs and the process of photographing can provide fertile ground for sociological investigation. Examining the production of photography can tell us much about inclusion/omission and power/knowledge in a variety of social settings. Recently, some researchers have begun to utilise the participatory action research methodology, PhotoVoice, where people take and share photographs as a means of communicating and advocating on a specific topic. While medical sociologists have used PhotoVoice to communicate the impacts of disease in vulnerable populations (eg Burles, 2010), little social research has been done that combines PhotoVoice and older persons. This is interesting given the world’s population is ageing and the general lack of research that examines what daily life is like for older people living in aged care (Timonen & O’Dwyer, 2009). In response, a recent project tracked 10 participants who recently transitioned into living in residential aged care (RAC). The project combined the use of PhotoVoice methodology with repeated in-depth interviews. Residents were asked to orally and visually describe the positives and negative aspects of their daily lives. In the first instance, they shared the use of a RAC owned camera and later had the opportunity to access a camera for their sole use. Photographic analysis emphasised the value of centring the participant as an autonomous photographer in social research. In the photographs captured on a shared use camera, the photographs tended to depict predominately positive life stories (e.g. weekly morning tea outings, social activities). In comparison, the photographs captured on the sole use camera also described intimate but everyday activities, spaces, objects and people that frequented in their daily lives. Shifting the responsibility of the camera and photography solely to the participants resulted in the residents disrupting conventions of ‘suitable’ subject matter to photograph (Harrison, 2004) and in doing so, provided a much richer insight into what daily life is like in aged care.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The role that specific emotions, such as pride and triumph, play during instruction in science education is an under-researched field of study. Emotions are recognized as central to learning yet little is known about the way in which they are produced in naturalistic settings, how emotions relate to classroom learning during interactions, and what antecedent factors are associated with emotional experiences during instruction. Data sources for the study include emotion diaries, student written artifacts, video recordings of class interactions, and interviews. Emotions produced in the moment during classroom interactions are analyzed from video data and audio data through a novel theoretical framework related to the sociology of human emotions. These direct observations are compared with students’ recollected emotional experiences reported through emotion diaries and interviews. The study establishes links between pride and triumph within classroom interactions and instructional tasks during learning episodes in a naturalistic setting. We discuss particular classroom activities that are associated with justified feelings of pride and triumph. More specifically, classroom events associated with these emotions were related to understanding science concepts, social interactions, and achieving success on challenging tasks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesting applications including Internet retail, trustless audit, and a treasurer allocating funds among departments. A specification of HD wallets has even been accepted as Bitcoin standard BIP32. Unfortunately, in all existing HD wallets---including BIP32 wallets---an attacker can easily recover the master private key given the master public key and any child private key. This vulnerability precludes use cases such as a combined treasurer-auditor, and some in the Bitcoin community have suspected that this vulnerability cannot be avoided. We propose a new HD wallet that is not subject to this vulnerability. Our HD wallet can tolerate the leakage of up to m private keys with a master public key size of O(m). We prove that breaking our HD wallet is at least as hard as the so-called "one more" discrete logarithm problem.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Real-world cryptographic protocols such as the widely used Transport Layer Security (TLS) protocol support many different combinations of cryptographic algorithms (called ciphersuites) and simultaneously support different versions. Recent advances in provable security have shown that most modern TLS ciphersuites are secure authenticated and confidential channel establishment (ACCE) protocols, but these analyses generally focus on single ciphersuites in isolation. In this paper we extend the ACCE model to cover protocols with many different sub-protocols, capturing both multiple ciphersuites and multiple versions, and define a security notion for secure negotiation of the optimal sub-protocol. We give a generic theorem that shows how secure negotiation follows, with some additional conditions, from the authentication property of secure ACCE protocols. Using this framework, we analyse the security of ciphersuite and three variants of version negotiation in TLS, including a recently proposed mechanism for detecting fallback attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper reports on the current field of narrative-based game design through case study analysis with a particular focus on balancing high narrative agency with low production resources.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Distributed systems are widely used for solving large-scale and data-intensive computing problems, including all-to-all comparison (ATAC) problems. However, when used for ATAC problems, existing computational frameworks such as Hadoop focus on load balancing for allocating comparison tasks, without careful consideration of data distribution and storage usage. While Hadoop-based solutions provide users with simplicity of implementation, their inherent MapReduce computing pattern does not match the ATAC pattern. This leads to load imbalances and poor data locality when Hadoop's data distribution strategy is used for ATAC problems. Here we present a data distribution strategy which considers data locality, load balancing and storage savings for ATAC computing problems in homogeneous distributed systems. A simulated annealing algorithm is developed for data distribution and task scheduling. Experimental results show a significant performance improvement for our approach over Hadoop-based solutions.