911 resultados para 1145
Resumo:
CubIT is a multi-user, large-scale presentation and collaboration framework installed at the Queensland University of Technology’s (QUT) Cube facility, an interactive facility made up 48 multi-touch screens and very large projected display screens. CubIT was built to make the Cube facility accessible to QUT’s academic and student population. The system allows users to upload, interact with and share media content on the Cube’s very large display surfaces. CubIT implements a unique combination of features including RFID authentication, content management through multiple interfaces, multi-user shared workspace support, drag and drop upload and sharing, dynamic state control between different parts of the system and execution and synchronisation of the system across multiple computing nodes.
Resumo:
In this paper, we propose a semi-supervised approach of anomaly detection in Online Social Networks. The social network is modeled as a graph and its features are extracted to detect anomaly. A clustering algorithm is then used to group users based on these features and fuzzy logic is applied to assign degree of anomalous behavior to the users of these clusters. Empirical analysis shows effectiveness of this method.
Resumo:
The Transport Layer Security (TLS) protocol is the most widely used security protocol on the Internet. It supports negotiation of a wide variety of cryptographic primitives through different cipher suites, various modes of client authentication, and additional features such as renegotiation. Despite its widespread use, only recently has the full TLS protocol been proven secure, and only the core cryptographic protocol with no additional features. These additional features have been the cause of several practical attacks on TLS. In 2009, Ray and Dispensa demonstrated how TLS renegotiation allows an attacker to splice together its own session with that of a victim, resulting in a man-in-the-middle attack on TLS-reliant applications such as HTTP. TLS was subsequently patched with two defence mechanisms for protection against this attack. We present the first formal treatment of renegotiation in secure channel establishment protocols. We add optional renegotiation to the authenticated and confidential channel establishment model of Jager et al., an adaptation of the Bellare--Rogaway authenticated key exchange model. We describe the attack of Ray and Dispensa on TLS within our model. We show generically that the proposed fixes for TLS offer good protection against renegotiation attacks, and give a simple new countermeasure that provides renegotiation security for TLS even in the face of stronger adversaries.
Resumo:
Road surface skid resistance has been shown to have a strong relationship to road crash risk, however, applying the current method of using investigatory levels to identify crash prone roads is problematic as they may fail in identifying risky roads outside of the norm. The proposed method analyses a complex and formerly impenetrable volume of data from roads and crashes using data mining. This method rapidly identifies roads with elevated crash-rate, potentially due to skid resistance deficit, for investigation. A hypothetical skid resistance/crash risk curve is developed for each road segment, driven by the model deployed in a novel regression tree extrapolation method. The method potentially solves the problem of missing skid resistance values which occurs during network-wide crash analysis, and allows risk assessment of the major proportion of roads without skid resistance values.
Resumo:
The Web is a steadily evolving resource comprising much more than mere HTML pages. With its ever-growing data sources in a variety of formats, it provides great potential for knowledge discovery. In this article, we shed light on some interesting phenomena of the Web: the deep Web, which surfaces database records as Web pages; the Semantic Web, which de�nes meaningful data exchange formats; XML, which has established itself as a lingua franca for Web data exchange; and domain-speci�c markup languages, which are designed based on XML syntax with the goal of preserving semantics in targeted domains. We detail these four developments in Web technology, and explain how they can be used for data mining. Our goal is to show that all these areas can be as useful for knowledge discovery as the HTML-based part of the Web.
Resumo:
Driving can be dangerous, especially for young and inexperienced drivers. To help address the issue of inexperience a gamified logbook application was developed for Learner drivers. The application aims to encourage learners to undertake a wider range of practice, while also making it easier to record their mandatory practice sessions. This paper reports on the design of this application, focusing on the effect that adding gamification can have on the usability and user experience of the application and the importance of playability testing for gamified systems. Two versions of the application were developed, one with game elements and one without game elements. This paper presents findings from a study that compares the user experience of these two versions of the application with twelve recent Learner drivers. Overall, participants reported that the gamified version was more engaging and motivating than the non-gamified version, however neither versions were preferred over the other. We theorise that this may have occurred due to a number of usability issues that arose, including an increased difficulty in learnability due to the added game elements. These design issues are important to address in future gamified system designs.
Resumo:
This paper describes a method for analysing videogames based on game activities. It examines the impact of these activities on the player experience. The research approach applies heuristic checklists that deconstruct games in terms of cognitive processes that players engage in during gameplay (e.g., addressing goals, interpreting feedback). For this study we examined three puzzle games, Portal 2, I-Fluid and Braid. The Player Experience of Need Satisfaction (PENS) survey is used to measure player experience following gameplay. Cognitive action provided within games is examined in light of reported player experiences to determine the extent to which these activities influence players’ feelings of competence, autonomy, intuitive control and presence. Findings indicate that the positive experiences are directly influenced by game activity design. Our study also demonstrates the value of expert review in deconstructing gameplay activity as a means of providing direction for game design that enhances the player experience.
Resumo:
This paper presents research that investigated the role of conflict in the editorial process of the online encyclopedia, Wikipedia. The study used a grounded approach to analyzing 147 conversations about quality from the archived history of the Wikipedia article 'Australia'. It found that conflict in Wikipedia is a generative friction, regulated by references to policy as part of a coordinated effort within the community to improve the quality of articles.
Resumo:
In contemporary game development circles the ‘game making jam’ has become an important rite of passage and baptism event, an exploration space and a central indie lifestyle affirmation and community event. Game jams have recently become a focus for design researchers interested in the creative process. In this paper we tell the story of an established local game jam and our various documentation and data collection methods. We present the beginnings of the current project, which seeks to map the creative teams and their process in the space of the challenge, and which aims to enable participants to be more than the objects of the data collection. A perceived issue is that typical documentation approaches are ‘about’ the event as opposed to ‘made by’ the participants and are thus both at odds with the spirit of the jam as a phenomenon and do not really access the rich playful potential of participant experience. In the data collection and visualisation projects described here, we focus on using collected data to re-include the participants in telling stories about their experiences of the event as a place-based experience. Our goal is to find a means to encourage production of ‘anecdata’ - data based on individual story telling that is subjective, malleable, and resists collection via formal mechanisms - and to enable mimesis, or active narrating, on the part of the participants. We present a concept design for data as game based on the logic of early medieval maps and we reflect on how we could enable participation in the data collection itself.
Resumo:
Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.
Resumo:
This paper describes the results of a study designed to understand the components contributing to a participant's assessment of threatening situations in a competitive First Person Shooter (FPS) game Quake III: Arena. The analysis process described compares theoretical, questionnaire based data with that of actual game play footage and identifies how skill and experience can affect a player's ability to accurately assess threat. This research also identifies relationships between variables contributing to a participant's threat assessment process which are not usually acknowledged in game AI design. A suggestion for integrating player-like threat based decision making processes is proposed.
Resumo:
This paper provides an outline of genre as we currently know it, and examines the changes occurring as games become more complex. Recent research we've undertaken suggests that our perception of which games fall into which genre category is subjective and that genre hybridization continues to blur our understanding of these categories. Consequently, it is becoming increasingly difficult to categorise game play experience based on traditional genre classifications. We examine the use of videogame activities as a useful mechanism for supplementing our understanding of videogame genre. Through considering activity as a means of classifying game experiences we may obtain a much more nuanced understanding of how players engage with games within a particular genre and across genres.
Resumo:
This paper discusses findings made during a study of energy use feedback in the home (eco-feedback), well after the novelty has worn off. Contributing towards four important knowledge gaps in the research, we explore eco-feedback over longer time scales, focusing on instances where the feedback was not of lasting benefit to users rather than when it was. Drawing from 23 semi-structured interviews with Australian householders, we found that an initially high level of engagement gave way over time to disinterest, neglect and in certain cases, technical malfunction. Additionally, preconceptions concerned with the “purpose” of the feedback were found to affect use. We propose expanding the scope of enquiry for eco-feedback in several ways, and describe how eco-feedback that better supports decision-making in the “maintenance phase”, i.e. once the initial novelty has worn off, may be key to longer term engagement.
Resumo:
Recently, researchers have noted that traditional knowledge systems (TKSs) can inspire technology design. They have also noted that the interdependency between Aboriginal culture and “landscape” provides insight into an embodied approach to HCI [1]: People’s experience of place and construction of space does not separate the mind, the body, and the surroundings [2]. However, we notice that increased recognition of Aboriginal TKS is no easy panacea for the constraints on design prescribed by the way the “technology race” (pun intended) abstracts spaces. Instead, paradoxes for the cultural “localization” of technology, mentioned in previous columns in this series, emerge from complex power relations between TKSs and dominant knowledge.
Resumo:
RNA-mediated silencing in plants can spread from cell to cell and over a long distance, and such mobile silencing has been extensively studied in the past decade. However, major questions remain as to what is the exact nature of the mobile silencing signals, how the components of the RNA-directed DNA methylation pathway are involved, and why systemic spread of silencing has only been observed for transgenes but not endogenous genes. In this review, we provide an overview of the current knowledge on mobile gene silencing in plants and present a model where systemic silencing involves long nuclear RNA transcripts that serve as a template to amplify primary siRNA signals.