392 resultados para Read-to-peer

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Peer to peer systems have been widely used in the internet. However, most of the peer to peer information systems are still missing some of the important features, for example cross-language IR (Information Retrieval) and collection selection / fusion features. Cross-language IR is the state-of-art research area in IR research community. It has not been used in any real world IR systems yet. Cross-language IR has the ability to issue a query in one language and receive documents in other languages. In typical peer to peer environment, users are from multiple countries. Their collections are definitely in multiple languages. Cross-language IR can help users to find documents more easily. E.g. many Chinese researchers will search research papers in both Chinese and English. With Cross-language IR, they can do one query in Chinese and get documents in two languages. The Out Of Vocabulary (OOV) problem is one of the key research areas in crosslanguage information retrieval. In recent years, web mining was shown to be one of the effective approaches to solving this problem. However, how to extract Multiword Lexical Units (MLUs) from the web content and how to select the correct translations from the extracted candidate MLUs are still two difficult problems in web mining based automated translation approaches. Discovering resource descriptions and merging results obtained from remote search engines are two key issues in distributed information retrieval studies. In uncooperative environments, query-based sampling and normalized-score based merging strategies are well-known approaches to solve such problems. However, such approaches only consider the content of the remote database but do not consider the retrieval performance of the remote search engine. This thesis presents research on building a peer to peer IR system with crosslanguage IR and advance collection profiling technique for fusion features. Particularly, this thesis first presents a new Chinese term measurement and new Chinese MLU extraction process that works well on small corpora. An approach to selection of MLUs in a more accurate manner is also presented. After that, this thesis proposes a collection profiling strategy which can discover not only collection content but also retrieval performance of the remote search engine. Based on collection profiling, a web-based query classification method and two collection fusion approaches are developed and presented in this thesis. Our experiments show that the proposed strategies are effective in merging results in uncooperative peer to peer environments. Here, an uncooperative environment is defined as each peer in the system is autonomous. Peer like to share documents but they do not share collection statistics. This environment is a typical peer to peer IR environment. Finally, all those approaches are grouped together to build up a secure peer to peer multilingual IR system that cooperates through X.509 and email system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Whereas Lessig's recent work engages with questions of culture and creativity in society, this paper looks at the role of culture and creativity in the law. The paper evaluates the Napster, DeCSS, Felten and Sklyarov litigation in terms of the new social, legal, economic and cultural relations being produced. This involves a deep discussion of law's economic relations, and the implications of this for litigation strategy. The paper concludes with a critique of recent attempts to define copyright law in terms of first amendment rights and communicative freedom.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper presents research findings about the use of remote desktop applications to teach music sequencing software. It highlights the successes, shortcomings and interactive issues encountered during a pilot project with a theoretical focus on a specific interactive bottleneck. The paper proposes a new delivery and partnership model to widen this bottleneck, which currently hinders interactions between the technical support, education and professional development communities in music technology.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Principal Topic: ''In less than ten years music labels will not exist anymore.'' Michael Smelli, former Global COO Sony/BMG MCA/QUT IMP Business Lab Digital Music Think Thanks 9 May 2009, Brisbane Big music labels such as EMI, Sony BMG and UMG have been responsible for promoting and producing a myriad of stars in the music industry over the last decades. However, the industry structure is under enormous threat with the emergence of a new innovative era of digital music. Recent years have seen a dramatic shift in industry power with the emergence of Napster and other file sharing sites, iTunes and other online stores, iPod and the MP3 revolution. Myspace.com and other social networking sites are connecting entrepreneurial artists with fans and creating online music communities independent of music labels. In 2008 the digital music business internationally grew by around 25% to 3.7 Billion US-Dollar. Digital platforms now account for around 20% of recorded music sales, up from 15 % in 2007 (IFPI Digital music report 2009). CD sales have fallen by 40% since their peak levels. Global digital music sales totalled an estimated US$ 3 Billion in 2007, an increase of 40% on 2006 figures. Digital sales account for an estimated 15% of global market, up from 11% in 2006 and zero in 2003. The music industry is more advanced in terms of digital revenues than any other creative or entertainment industry (except games). Its digital share is more than twice that of newspapers (7%), films (35) or books (2%). All these shifts present new possibilities for music entrepreneurs to act entrepreneurially and promote their music independently of the major music labels. Diffusion of innovations has a long tradition in both sociology (e.g. Rogers 1962, 2003) and marketing (Bass 1969, Mahajan et al., 1990). The context of the current project is theoretically interesting in two respects. First, the role of online social networks replaces traditional face-to-face word of mouth communications. Second, as music is a hedonistic product, this strongly influences the nature of interpersonal communications and their diffusion patterns. Both of these have received very little attention in the diffusion literature to date, and no studies have investigated the influence of both simultaneously. This research project is concerned with the role of social networks in this new music industry landscape, and how this may be leveraged by musicians willing to act entrepreneurially. Our key research question we intend to address is: How do online social network communities impact the nature, pattern and speed that music diffuses? Methodology/Key Propositions : We expect the nature/ character of diffusion of popular, generic music genres to be different from specialized, niche music. To date, only Moe & Fader (2002) and Lee et al. (2003) investigated diffusion patterns of music and these focus on forecast weekly sales of music CDs based on the advance purchase orders before the launch, rather than taking a detailed look at diffusion patterns. Consequently, our first research questions are concerned with understanding the nature of online communications within the context of diffusion of music and artists. Hence, we have the following research questions: RQ1: What is the nature of fan-to-fan ''word of mouth'' online communications for music? Do these vary by type of artist and genre of music? RQ2: What is the nature of artist-to-fan online communications for music? Do these vary by type of artist and genre of music? What types of communication are effective? Two outcomes from research social network theory are particularly relevant to understanding how music might diffuse through social networks. Weak tie theory (Granovetter, 1973), argues that casual or infrequent contacts within a social network (or weak ties) act as a link to unique information which is not normally contained within an entrepreneurs inner circle (or strong tie) social network. A related argument, structural hole theory (Burt, 1992), posits that it is the absence of direct links (or structural holes) between members of a social network which offers similar informational benefits. Although these two theories argue for the information benefits of casual linkages, and diversity within a social network, others acknowledge that a balanced network which consists of a mix of strong ties, weak ties is perhaps more important overall (Uzzi, 1996). It is anticipated that the network structure of the fan base for different types of artists and genres of music will vary considerably. This leads to our third research question: RQ3: How does the network structure of online social network communities impact the pattern and speed that music diffuses? The current paper is best described as theory elaboration. It will report the first exploratory phase designed to develop and elaborate relevant theory (the second phase will be a quantitative study of network structure and diffusion). We intend to develop specific research propositions or hypotheses from the above research questions. To do so we will conduct three focus group discussions of independent musicians and three focus group discussions of fans active in online music communication on social network sites. We will also conduct five case studies of bands that have successfully built fan bases through social networking sites (e.g. myspace.com, facebook.com). The idea is to identify which communication channels they employ and the characteristics of the fan interactions for different genres of music. We intend to conduct interviews with each of the artists and analyse their online interaction with their fans. Results and Implications : At the current stage, we have just begun to conduct focus group discussions. An analysis of the themes from these focus groups will enable us to further refine our research questions into testable hypotheses. Ultimately, our research will provide a better understanding of how social networks promote the diffusion of music, and how this varies for different genres of music. Hence, some music entrepreneurs will be able to promote their music more effectively. The results may be further generalised to other industries where online peer-to-peer communication is common, such as other forms of entertainment and consumer technologies.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Despite the dangers associated with drink walking, limited research is currently available regarding the factors which influence individuals to engage in this risky behaviour. This study examined the influence of psychosocial factors upon individuals’ intentions to drink walk across four experimental scenarios (and a control condition). Specifically, a 2 × 2 repeated measures design was utilised in which all of the scenarios incorporated a risky pedestrian crossing situation (i.e., a pedestrian crossing against a red man signal) but differed according to the level of group identity (i.e., low/strangers and high/friends) and conformity (low and high). Individuals were assessed for their intentions to drink walk within each of these different scenarios. Undergraduate students (N = 151), aged 17–30 years, completed a questionnaire. Overall, most of the study's hypotheses were supported with individuals reporting the highest intentions to drink walk when in the presence of friends (i.e., high group identity) and their friends were said to be also crossing against the red man signal (i.e., high conformity). The findings may have significant implications for the design of countermeasures to reduce drink walking. For instance, the current findings would suggest that potentially effective strategies may be to promote resilience to peer influence as well as highlight the negative consequences associated with following the behaviour of other intoxicated pedestrians who are crossing against a red signal.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Higher Education's widening participation agenda prioritises improving access to university for low-SES students. Parallel with these ambitious national participation targets, is the challenge for universities to significantly improve student retention rates; hence, the need to implement strategies aimed to improve the quality of the student learning experience and build a 'sense of belonging'. Within the framework of the First Year Experience Program, Queensland University of Technology has embarked on establishing a whole-of-institution model for peer programs that aims to: 1) improve the student learning experience and outcomes; and, 2) establish quality assured and sustainable programs. This paper reports on the maturation university-wide peer program strategy and considers the challenges of implementing, evaluating and resourcing a sustainable and inclusive approach to peer programs.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The first year of a property degree program is a time to establish threshold concept knowledge to acculturise students into their discipline or professional group. Due to the foundational nature of first year in many property degrees, students are enrolled in large, multi-disciplinary classes. There are several challenges in the delivery of large first year multi-disciplinary units to engage the student in a community of leaning to aid in student retention. Through action based research this study shows how social networking, particularly Facebook, can be used to create a sense of community across large, multi-disciplinary units to illicit ‘real time’ feedback from students and encourage peer to peer learning. This study assesses the benefits of using social media and considers the potential limitations of this medium.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Students experience university as peers. Peer-to-peer interaction offers unique opportunities for fostering the academic, social and emotional wellbeing of students (Kuh, 2008). Peer programs provide a formalisation of this relationship enabling students to partake both as peer leaders and program participants. The success of such programs is reliant on the university having a reserve of motivated and trained peer leaders. From their initial experience of peer programs as participants in first year and their ongoing involvement as peer leaders, students grow their graduate capabilities and employability skills through scaffolded peer leadership and training opportunities. Universities aspire to produce graduates who are inspirational leaders, effective collaborators and competent professionals ready to participate in the global community (DEEWR, 2012; Shook & Keup, 2012). This poster describes a model which scaffolds the development of peer leaders’ graduate capabilities using a university-wide supporting framework to grow a range of peer-to-peer initiatives across a variety of coordinated peer programs underpinned by a social justice framework (Gidley, Hampson, Wheller & Bereded-Samuel, 2010; Nelson & Creagh, 2012).

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This thesis developed and evaluated strategies for social and ubiquitous computing designs that can enhance connected learning and networking opportunities for users in coworking spaces. Based on a social and a technical design intervention deployed at the State Library of Queensland, the research findings illustrate the potential of combining social, spatial and digital affordances in order to nourish peer-to-peer learning, creativity, inspiration, and innovation. The study proposes a hybrid notion of placemaking as a new way of thinking about the design of coworking and interactive learning spaces.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This article assesses the extent to which the recently formulated Chinese concept of “Responsible Protection” (RP) offers a valuable contribution to the normative debate over R2P’s third pillar following the controversy over military intervention in Libya. While RP draws heavily on previous proposals such as the original 2001 ICISS report and Brazil’s “Responsibility while Protecting” (RwP), by amalgamating and re-packaging these earlier ideas in a more restrictive form the initiative represents a new and distinctive interpretation of R2P. However, some aspects of RP are framed too narrowly to provide workable guidelines for determining the permissibility of military intervention for civilian protection purposes, and should therefore be clarified and refined. Nevertheless, the Chinese proposal remains significant because it offers important insights into Beijing’s current stance on R2P. More broadly, China’s RP and Brazil’s RwP initiatives illustrate the growing willingness of rising, non-Western powers to assert their own normative preferences on sovereignty, intervention and global governance.