116 resultados para swd: Ubiquitous Computing


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper looks at intervention programmes to improve the representation of female students in computing education and the computer industry, A multiple case study methodology was used to look at major intervention programmes conducted in Australia. One aspect of the research focused on the programme champions; those women from the computing industry, those working within government organisations and those in academia who instigated the programmes. The success of these intervention programmes appears to have been highly dependent upon not only the design of the programme but on the involvement of these strong individuals who were passionate and worked tirelessly to ensure the programme's success. This paper provides an opportunity for the voices of these women to be heard. It describes the champions' own initial involvement with computing which frequently motivated and inspired them to conduct such programmes. The research found that when these types of intervention programmes were conducted by academic staff the work was undervalued compared to when the activities were conducted by staff in industry or in government. The academic environment was often not supportive of academics who conducted intervention programmes for female students.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The vision of volunteer computing is to provide large scale computational infrastructure by using dynamic collections of donated desktop computers. There have been many works that highlighted the significant benefits of volunteer computing but little on the security and privacy threats associated with its exploitation. However, volunteer computing is vulnerable to a variety of attacks and presents numerous significant security threats to the stakeholders. This paper presents security and privacy threat taxonomy along with the security features developed to cope with such threats.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The overall performance of a distributed system often depends on the effectiveness of its interconnection network. Thus, the study of the communication networks for distributed systems is very important, which is the focus of this paper. In particular, we address the problem of interconnection networks performance modeling for heterogeneous meta-computing systems. We consider the meta-computing system as a typical multi-cluster system. Since the heterogeneity is becoming common in such systems, we take into account network as well as cluster size heterogeneity to propose the model. To this end, we present an analytical network model and validate the model through comprehensive simulation. The results of the simulation demonstrated that the proposed model exhibits a good degree of accuracy for various system organizations and under different working conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Grid users and their jobs need credentials to access grid resources and services. It is important to minimize the exposure of credentials to adversaries. A practical solution is needed that works with existing software and is easy to deploy, administer, and maintain. Thus, credential management services are the wave of the future for virtual organizations such as Grid computing. This paper describes architecture of a scalable, secure and reliable on-line credential management service called SafeBox for InterGrid computing platform. SafeBox provides InterGrid users with secure mechanism for storing one or multiple credentials and access them based on need at anytime from anywhere.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes to address the need for more innovation in organisational information security by adding a security requirement engineering focus. Based on the belief that any heavyweight security requirements process in organisational security will be doomed to fail, we developed a security requirement approach with three dimensions. The use of a simple security requirements process in the first dimension has been augmented by an agile security approach. However, introducing this second dimension of agile security does provide support for, but does not necessarily stimulate, innovation. A third dimension is, therefore, needed to ensure there is a proper focus in the organisation's efforts to identify potential new innovations in their security. To create this focus three common shortcomings in organisational information security have been identified. The resulting security approach that addresses these shortcomings is called Ubiquitous Information Security. This paper will demonstrate the potential of this new approach by briefly discussing its possible application in two areas: Ubiquitous Identity Management and Ubiquitous Wireless Security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This special issue is in response to the increasing convergence between grids and pervasive computing, while different approaches exist, challenges and opportunities are numerous in this context (Parashar and Pierson, to appear). The research papers selected for this special issue represent recent progresses in the field, including works on mobile ad-hoc grids, service and data discovery, context-aware application building and context accuracy, and communication. All of these papers not only provide novel ideas and state-of-the-art techniques in the field, but also stimulate future research in the Pervasive Grid environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many intervention programmes to encourage greater female participation in computer education and careers have been conducted in the last twenty years. These intervention programmes take considerable time, effort and money to design and implement. If success were to be measured by an increase in the percentage of female students undertaking computing courses then these programmes would have to be considered a failure. This paper describes a research project which examined fourteen intervention programmes in detail. From the perspective of the programme champions each of the intervention programmes was considered successful, even when this success was restricted to specific areas or limited to small groups of individuals. Formal evaluation appeared to have been an afterthought rather than a priority of many of the programme champions. Some programmes appeared to be less effective due to the lack of targeted and clear goals or predetermined evaluation criteria. It is recommended that during the initial planning phase for intervention programmes a clear objective is to consider what a successful programme would look like and what the evaluation criteria would be. Further work is needed to understand how intervention programmes can be better designed and evaluated so that their impact and success can be expanded.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Participation in post-compulsory computing education has declined over recent years, both in the senior years of secondary school and at university. This trend has been observed in most developed countries, despite reported and projected skills shortages in Information Technology (IT) industries. Within the computing education enrollment mix, girls and women continue to be under-represented and recent years have seen female participation fall even more rapidly than that of males. This article reports on findings of an Australian study which explored secondary school students’ beliefs about and attitudes towards computing education and careers in IT. Factors that might discourage girls in particular from pursuing post-compulsory computing education and careers are discussed, along with broader implications for school education in an era when information and communication technologies are an integral part of our daily lives. Findings include the persistence among both boys and girls of inaccurate and outdated views of the field of IT and low expectations of both school IT curricula and pedagogy in terms of their relevance and interest for students. Many of the issues identified as discouraging students in general from pursuing computing education appear to have a greater discouraging effect on girls, and this is compounded by stereotypical views of the field as male-dominated and unwelcoming to women and girls.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study presents a theoretical basis for and outlines the method of finding the Lie point symmetries of systems of partial differential equations. It seeks to determine which of five computer algebra packages is best at finding these symmetries. The chosen packages are LIEPDE and DIMSYM for REDUCE, LIE and BIGLIE for MUMATH, DESOLV for MAPLE, and MATHLIE for MATHEMATICA. This work concludes that while all of the computer packages are useful, DESOLV appears to be the most successful system at determining the complete set of Lie symmetries. Also, the study describes REDUCEVAR, a new package for MAPLE, that reduces the number of independent variables in systems of partial differential equations, using particular Lie point symmetries. It outlines the results of some testing carried out on this package. It concludes that REDUCEVAR is a very useful tool in performing the reduction of independent variables according to Lie's theory and is highly accurate in identifying cases where the symmetries are not suitable for finding S/G equations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fifty years ago there were no stored-program electronic computers in the world. Even thirty years ago a computer was something that few organisations could afford, and few people could use. Suddenly, in the 1960s and 70s, everything changed and computers began to become accessible. Today* the need for education in Business Computing is generally acknowledged, with each of Victoria's seven universities offering courses of this type. What happened to promote the extremely rapid adoption of such courses is the subject of this thesis. I will argue that although Computer Science began in Australia's universities of the 1950s, courses in Business Computing commenced in the 1960s due to the requirement of the Commonwealth Government for computing professionals to fulfil its growing administrative needs. The Commonwealth developed Programmer-in-Training courses were later devolved to the new Colleges of Advanced Education. The movement of several key figures from the Commonwealth Public Service to take up positions in Victorian CAEs was significant, and the courses they subsequently developed became the model for many future courses in Business Computing. The reluctance of the universities to become involved in what they saw as little more than vocational training, opened the way for the CAEs to develop this curriculum area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The thesis reviews the literature relating to girls and computing within a framework which is structured around three specific questions. First, are there differences between girls and boys in their participation in class computing activities and/or in non-class computing activities? Second, do these differences in participation in computing activities have broader implications which justify the growing concern about the under-representation of girls? Third, wahy are girls under-represented in these activities? Although the available literature is predominantly descriptive, the underlying implicit theoretical model is essentially a social learning model. Girl's differential participation is attributed to learned attitudes towards computing rathan to differences between girls and boys in general ability. These attitudes, which stress the masculine, mathematical, technological aspects of computing are developed through modelling, direct experience, intrinsic and extrinsic reinforcement and generalisation from pre-existing, attitudes to related curriculum areas. In the literature it is implicitly assumed that these attitudes underlie girl's decisions to self-select out of computing activities. In this thesis predictions from a social learning model are complemented by predictions derived from expectancy-value, cognitive dissonance and self-perception theories. These are tested in three separate studies. Study one provides data from a pretest-posttest study of 24 children in a year four class learning BASIC. It examines pre- and posttest differences between girls and boys in computing experience, knowledge and achievement as well as the factors relating to computing achievement. Study two uses a pretest-posttest control group design to study the gender differences in the impact of the introduction of Logo into years 1, 3, 5 and 7 in both a coeducational and single-sex setting using a sample of 222 children from three schools. Study three utilises a larger sample of 1176 students, drawn from three secondary schools and five primary schools, enabling an evaluation of gender differences in relation to a wide range of class computing experiences and in a broader range of school contexts. The overall results are consistent across the three studies, supporting the contention that social factors, rather than ability differences influence girls' participation and achievement in computing. The more global theoretical framework, drawing on social learning, expectancy-value, cognitive dissonance and self-perception theories, provides a more adequate explanation of gender differences in participation than does any one of these models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two issues were addressed. 1. Women are underrepresented in computing courses and in the computing workplace. Despite almost two decades of recognition of the issue and of intervention to correct it, the proportion of women in computing continues to decline. 2. There is a shortage of people with appropriate skills and qualifications in computing, and, more specifically, a need for people with particular personality attributes. There is an increasing demand for computing personnel to have good communication and interpersonal skills, but the predominant personality types of computing people do not include these characteristics. The research relating to the underrepresentation of women was conducted as a series of interviews with university students, female computing professionals and secondary school girls. The main findings of these studies were: 1) schoolgirls are interested in careers that are interesting and varied and provide opportunities for interaction with others; 2) schoolgirls perceive computing as involving working alone; 3) women working in computing describe careers that are interesting, varied, and people-oriented; 4) tertiary computing students equated 'computing' with 'programming'; and 5) single interventions are unlikely to result in individuals in the targeted group deciding to study computing. The perception of schoolgirls that computing involves working alone, which is reinforced by many tertiary computing courses, suggested that the type of person who is likely to be attracted to computing is one who would prefer to work alone. It was predicted that schoolboys would have similar perceptions of computing. Thus, computing is likely to attract students who would prefer to work alone. For various social and stereotypical reasons addressed by previous research, these students will be predominantly male. In the final study, preferred Myers-Briggs Type Indicator and Strong Interest Inventory personality types were suggested for computer programmers, systems designers and systems analysts. The existing literature and the 'types' of 72 study participants tended to confirm that 1) certain personality types are overrepresented in computing; 2) these types are well suited to programming and design tasks; and 3) there is an underrepresentation of individuals who have the combination of analytical, communication and people skills that are required particularly of analysts but also of many others working in computing today. Interviews with participants supported the earlier findings that computing careers are perceived by students to be technical and involve working in isolation, but for many computing people this is not the reality.