2 resultados para Program Design

em DRUM (Digital Repository at the University of Maryland)


Relevância:

30.00% 30.00%

Publicador:

Resumo:

In support of the achievement goal theory (AGT), empirical research has demonstrated psychosocial benefits of the mastery-oriented learning climate. In this study, we examined the effects of perceived coaching behaviors on various indicators of psychosocial well-being (competitive anxiety, self-esteem, perceived competence, enjoyment, and future intentions for participation), as mediated by perceptions of the coach-initiated motivational climate, achievement goal orientations and perceptions of sport-specific skills efficacy. Using a pre-post test design, 1,464 boys, ages 10-15 (M = 12.84 years, SD = 1.44), who participated in a series of 12 football skills clinics were surveyed from various locations across the United States. Using structural equation modeling (SEM) path analysis and hierarchical regression analysis, the cumulative direct and indirect effects of the perceived coaching behaviors on the psychosocial variables at post-test were parsed out to determine what types of coaching behaviors are more conducive to the positive psychosocial development of youth athletes. The study demonstrated that how coaching behaviors are perceived impacts the athletes’ perceptions of the motivational climate and achievement goal orientations, as well as self-efficacy beliefs. These effects in turn affect the athletes’ self-esteem, general competence, sport-specific competence, competitive anxiety, enjoyment, and intentions to remain involved in the sport. The findings also clarify how young boys internalize and interpret coaches’ messages through modification of achievement goal orientations and sport-specific efficacy beliefs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The big data era has dramatically transformed our lives; however, security incidents such as data breaches can put sensitive data (e.g. photos, identities, genomes) at risk. To protect users' data privacy, there is a growing interest in building secure cloud computing systems, which keep sensitive data inputs hidden, even from computation providers. Conceptually, secure cloud computing systems leverage cryptographic techniques (e.g., secure multiparty computation) and trusted hardware (e.g. secure processors) to instantiate a “secure” abstract machine consisting of a CPU and encrypted memory, so that an adversary cannot learn information through either the computation within the CPU or the data in the memory. Unfortunately, evidence has shown that side channels (e.g. memory accesses, timing, and termination) in such a “secure” abstract machine may potentially leak highly sensitive information, including cryptographic keys that form the root of trust for the secure systems. This thesis broadly expands the investigation of a research direction called trace oblivious computation, where programming language techniques are employed to prevent side channel information leakage. We demonstrate the feasibility of trace oblivious computation, by formalizing and building several systems, including GhostRider, which is a hardware-software co-design to provide a hardware-based trace oblivious computing solution, SCVM, which is an automatic RAM-model secure computation system, and ObliVM, which is a programming framework to facilitate programmers to develop applications. All of these systems enjoy formal security guarantees while demonstrating a better performance than prior systems, by one to several orders of magnitude.