6 resultados para Introdouctory Programming, Tutoring, Feedback, eLearning, Program Annotations

em Digital Commons at Florida International University


Relevância:

40.00% 40.00%

Publicador:

Resumo:

If we classify variables in a program into various security levels, then a secure information flow analysis aims to verify statically that information in a program can flow only in ways consistent with the specified security levels. One well-studied approach is to formulate the rules of the secure information flow analysis as a type system. A major trend of recent research focuses on how to accommodate various sophisticated modern language features. However, this approach often leads to overly complicated and restrictive type systems, making them unfit for practical use. Also, problems essential to practical use, such as type inference and error reporting, have received little attention. This dissertation identified and solved major theoretical and practical hurdles to the application of secure information flow. ^ We adopted a minimalist approach to designing our language to ensure a simple lenient type system. We started out with a small simple imperative language and only added features that we deemed most important for practical use. One language feature we addressed is arrays. Due to the various leaking channels associated with array operations, arrays have received complicated and restrictive typing rules in other secure languages. We presented a novel approach for lenient array operations, which lead to simple and lenient typing of arrays. ^ Type inference is necessary because usually a user is only concerned with the security types for input/output variables of a program and would like to have all types for auxiliary variables inferred automatically. We presented a type inference algorithm B and proved its soundness and completeness. Moreover, algorithm B stays close to the program and the type system and therefore facilitates informative error reporting that is generated in a cascading fashion. Algorithm B and error reporting have been implemented and tested. ^ Lastly, we presented a novel framework for developing applications that ensure user information privacy. In this framework, core computations are defined as code modules that involve input/output data from multiple parties. Incrementally, secure flow policies are refined based on feedback from the type checking/inference. Core computations only interact with code modules from involved parties through well-defined interfaces. All code modules are digitally signed to ensure their authenticity and integrity. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Multicultural Communication Bridge Program, an ongoing project at the Broward Correctional Institution, utilizes creative movement, writing, and drawing as treatment modalities with long-term incarcerated women. This type of programming is new in the prison system thus literature and research supporting the outcomes with this population are lacking. Therefore, a qualitative study was conducted to determine the efficacy of the program. Nine inmates, who have been involved in the program for at least one year, were interviewed to gather information about their personal experiences as a result of their participation. Common themes that were noted include an increase in trust, the expression of emotions, an increase in self esteem, and an improvement in interactions with others. These attributes are believed to be beneficial to these women to ensure a successful community reintegration upon their release from prison. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The major barrier to practical optimization of pavement preservation programming has always been that for formulations where the identity of individual projects is preserved, the solution space grows exponentially with the problem size to an extent where it can become unmanageable by the traditional analytical optimization techniques within reasonable limit. This has been attributed to the problem of combinatorial explosion that is, exponential growth of the number of combinations. The relatively large number of constraints often presents in a real-life pavement preservation programming problems and the trade-off considerations required between preventive maintenance, rehabilitation and reconstruction, present yet another factor that contributes to the solution complexity. In this research study, a new integrated multi-year optimization procedure was developed to solve network level pavement preservation programming problems, through cost-effectiveness based evolutionary programming analysis, using the Shuffled Complex Evolution (SCE) algorithm.^ A case study problem was analyzed to illustrate the robustness and consistency of the SCE technique in solving network level pavement preservation problems. The output from this program is a list of maintenance and rehabilitation treatment (M&R) strategies for each identified segment of the network in each programming year, and the impact on the overall performance of the network, in terms of the performance levels of the recommended optimal M&R strategy. ^ The results show that the SCE is very efficient and consistent in the simultaneous consideration of the trade-off between various pavement preservation strategies, while preserving the identity of the individual network segments. The flexibility of the technique is also demonstrated, in the sense that, by suitably coding the problem parameters, it can be used to solve several forms of pavement management programming problems. It is recommended that for large networks, some sort of decomposition technique should be applied to aggregate sections, which exhibit similar performance characteristics into links, such that whatever M&R alternative is recommended for a link can be applied to all the sections connected to it. In this way the problem size, and hence the solution time, can be greatly reduced to a more manageable solution space. ^ The study concludes that the robust search characteristics of SCE are well suited for solving the combinatorial problems in long-term network level pavement M&R programming and provides a rich area for future research. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this study was to examine the relationship between participation in a retention program designed to promote academic and social integration and the persistence rates of first generation, low-income college students at an urban, public multiethnic university. Archival data were collected from the university’s Office of Institutional Research and the retention program office and included SAT/ACT scores, GPA, gender, ethnicity, and program participation data. A total of 292 first-generation, low-income students who were admitted to the university in the summer of 1999 were identified for the study. A group of 166 students were selected for the comparison group because they had not participated in the retention program; 126 students had participated in the retention program. ^ Three major research questions guided this study: (a) Are there differences in persistence rates and other academic characteristics of underprepared, low-income, first generation college students who participate and do not participate in the retention program?; (b) Does involvement in the retention program predict student persistence of first generation low-income, underprepared students?, and (c) Can predictors of GPA be identified for students in the retention program using program and descriptive variables? ^ A series of logistic regression analyses were conducted to assess the relationship between various retention services and the persistence and graduation rates of participants. The results showed that there were statistically significant relationships between participation and non-participation in the retention program and having higher GPAs and higher graduation and persistence rates. Of the four program features, participation in tutoring, workshops, and social events were found to be predictors of graduation. College GPA was also found to be a predictor of graduation for all students. The results also showed that women were more likely to graduate than men.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study investigated the effectiveness of goal setting and attributional feedback on self-efficacy for writing and writing achievement of students who are gifted underachievers. Students in grades 3, 4 and 5 participated. Five dependent measures were investigated: fluency, syntax, range, diversity and organization. The results indicated that a systematic writing instruction program increased self-efficacy for writing. In addition the self-efficacy strategies of goal setting and attributional feedback improve self-efficacy and increased some areas of writing achievement. The dependent measures most affected were fluency, syntax and organization. The students in this study did not improve their levels of vocabulary. This study included many practical applications for teachers to use in a classroom setting. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Multicultural Communication Bridge Program, an ongoing project at the Broward Correctional Institution, utilizes creative movement, writing, and drawing as treatment modalities with long-term incarcerated women. This type of programming is new in the prison system thus literature and research supporting the outcomes with this population are lacking. Therefore, a qualitative study was conducted to determine the efficacy of the program. Nine inmates, who have been involved in the program for at least one year, were interviewed to gather information about their personal experiences as a result of their participation. Common themes that were noted include an increase in trust, the expression of emotions, an increase in self esteem, and an improvement in interactions with others. These attributes are believed to be beneficial to these women to ensure a successful community reintegration upon their release from prison.