2 resultados para Mathematical things

em WestminsterResearch - UK


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper I advance the theory of critical communication design by exploring the politics of data, information and knowledge visualisation in three bodies of work. Data reflects power relations, special interests and ideologies that determine which data is collected, what data is used and how it is used. In a review of Max Roser’s Our World in Data, I develop the concepts of digital positivism, datawash and darkdata. Looking at the Climaps by Emaps project, I describe how knowledge visualisation can support integrated learning on complex problems and nurture relational perception. Finally, I present my own Mapping Climate Communication project and explain how I used discourse mapping to develop the concept of discursive confusion and illustrate contradictions in this politicised area. Critical approaches to information visualisation reject reductive methods in favour of more nuanced ways of presenting information that acknowledge complexity and the political dimension on issues of controversy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The broad capabilities of current mobile devices have paved the way for Mobile Crowd Sensing (MCS) applications. The success of this emerging paradigm strongly depends on the quality of received data which, in turn, is contingent to mass user participation; the broader the participation, the more useful these systems become. However, there is an ongoing trend that tries to integrate MCS applications with emerging computing paradigms such as cloud computing. The intuition is that such a transition can significantly improve the overall efficiency while at the same time it offers stronger security and privacy-preserving mechanisms for the end-user. In this position paper, we dwell on the underpinnings of incorporating cloud computing techniques to facilitate the vast amount of data collected in MCS applications. That is, we present a list of core system, security and privacy requirements that must be met if such a transition is to be successful. To this end, we first address several competing challenges not previously considered in the literature such as the scarce energy resources of battery-powered mobile devices as well as their limited computational resources that they often prevent the use of computationally heavy cryptographic operations and thus offering limited security services to the end-user. Finally, we present a use case scenario as a comprehensive example. Based on our findings, we posit open issues and challenges, and discuss possible ways to address them, so that security and privacy do not hinder the migration of MCS systems to the cloud.