6 resultados para ILLODIE-AIF (Computer program)

em DRUM (Digital Repository at the University of Maryland)


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Gemstone Team ILL (Interactive Language Learning)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Gemstone Team MICE (Modifying and Improving Computer Ergonomics)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Archaeological Reconnaissance Survey of United States Naval Academy will provide the Navy with a rich understanding of the history of this property. A National Register of Historic Places District, such as the Academy, deserves a thorough analysis of its past, in order to preserve what exists and to plan for the future. The goal of this project is to investigate the history of the Academy through traditional historic research, innovative computer analysis of historic maps, oral history interviews, and tract histories. This information has been synthesized to provide the Navy with a planning tool for Public Works, a concise look at the cartographic history of the Academy, and reference manual of the vast amounts of information which have been gathered during the course of this project. This information can serve as a reference tool to help the Public Works department comply with Section 106 regulations of the Historic Sites Preservation Act, with regard to construction. It can also serve as a source of cartographic history for those interested in the Academy's physical development, and as a way of preserving the culture of residents in Annapolis. This program and archaeological survey will ultimately serve to add to the rich history of the United States Naval Academy while preserving an important part of our nation's heritage.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Gemstone Team FACE

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Behavioral Parent Training (BPT) is a well-established therapy that reduces child externalized behaviors and parent stress. Although BPT was originally developed for parents of children with defiant behaviors, the program’s key concepts are relevant to parenting all children. Since parents might not fully utilize BPT due to cost and program location, we created an online game as a low-cost, easily accessible alternative or complement to BPT. We tested the game with nineteen undergraduate students at the University of Maryland. The experimental group completed pretest survey on core BPT knowledge, played the game, and completed a BPT posttest, while the control group completed a pretest and posttest survey over a three week period. Participants in the experimental group also completed a survey to indicate their satisfaction with the overall program. The experimental group demonstrated significantly higher levels of BPT knowledge than the control group and high levels of satisfaction. This suggests that an interactive, online BPT platform is an engaging and accessible way for parents to learn key concepts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The big data era has dramatically transformed our lives; however, security incidents such as data breaches can put sensitive data (e.g. photos, identities, genomes) at risk. To protect users' data privacy, there is a growing interest in building secure cloud computing systems, which keep sensitive data inputs hidden, even from computation providers. Conceptually, secure cloud computing systems leverage cryptographic techniques (e.g., secure multiparty computation) and trusted hardware (e.g. secure processors) to instantiate a “secure” abstract machine consisting of a CPU and encrypted memory, so that an adversary cannot learn information through either the computation within the CPU or the data in the memory. Unfortunately, evidence has shown that side channels (e.g. memory accesses, timing, and termination) in such a “secure” abstract machine may potentially leak highly sensitive information, including cryptographic keys that form the root of trust for the secure systems. This thesis broadly expands the investigation of a research direction called trace oblivious computation, where programming language techniques are employed to prevent side channel information leakage. We demonstrate the feasibility of trace oblivious computation, by formalizing and building several systems, including GhostRider, which is a hardware-software co-design to provide a hardware-based trace oblivious computing solution, SCVM, which is an automatic RAM-model secure computation system, and ObliVM, which is a programming framework to facilitate programmers to develop applications. All of these systems enjoy formal security guarantees while demonstrating a better performance than prior systems, by one to several orders of magnitude.