413 resultados para crowd


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Crowd gathering for burial of the time capsule at Biscayne Bay Campus. The Annual FIU Student Leadership Summit is held each February on the Biscayne Bay Campus. The Summit is a one-day conference for current student leaders. The Summit offers our students the opportunity to learn from the vast expertise of our faculty and administrators, to share their leadership experiences with each other and to establish a network of support and cooperation within the university. On Feb. 2, 2013, we celebrated the 10th anniversary of holding the Student Leadership Summit. In honor of this occasion, we buried a time capsule containing materials from the day as well as messages from participants to the participants of 2023 when the time capsule is to be opened.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Crowd gathering for the burial of the time capsule at Biscayne Bay Campus. The Annual FIU Student Leadership Summit is held each February on the Biscayne Bay Campus. The Summit is a one-day conference for current student leaders. The Summit offers our students the opportunity to learn from the vast expertise of our faculty and administrators, to share their leadership experiences with each other and to establish a network of support and cooperation within the university. On Feb. 2, 2013, we celebrated the 10th anniversary of holding the Student Leadership Summit. In honor of this occasion, we buried a time capsule containing materials from the day as well as messages from participants to the participants of 2023 when the time capsule is to be opened.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Crowd watching the burial of the time capsule burial at Biscayne Bay Campus. The Annual FIU Student Leadership Summit is held each February on the Biscayne Bay Campus. The Summit is a one-day conference for current student leaders. The Summit offers our students the opportunity to learn from the vast expertise of our faculty and administrators, to share their leadership experiences with each other and to establish a network of support and cooperation within the university. On Feb. 2, 2013, we celebrated the 10th anniversary of holding the Student Leadership Summit. In honor of this occasion, we buried a time capsule containing materials from the day as well as messages from participants to the participants of 2023 when the time capsule is to be opened.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Postprint

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using the wisdom of crowds---combining many individual forecasts to obtain an aggregate estimate---can be an effective technique for improving forecast accuracy. When individual forecasts are drawn from independent and identical information sources, a simple average provides the optimal crowd forecast. However, correlated forecast errors greatly limit the ability of the wisdom of crowds to recover the truth. In practice, this dependence often emerges because information is shared: forecasters may to a large extent draw on the same data when formulating their responses.

To address this problem, I propose an elicitation procedure in which each respondent is asked to provide both their own best forecast and a guess of the average forecast that will be given by all other respondents. I study optimal responses in a stylized information setting and develop an aggregation method, called pivoting, which separates individual forecasts into shared and private information and then recombines these results in the optimal manner. I develop a tailored pivoting procedure for each of three information models, and introduce a simple and robust variant that outperforms the simple average across a variety of settings.

In three experiments, I investigate the method and the accuracy of the crowd forecasts. In the first study, I vary the shared and private information in a controlled environment, while the latter two studies examine forecasts in real-world contexts. Overall, the data suggest that a simple minimal pivoting procedure provides an effective aggregation technique that can significantly outperform the crowd average.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tucídides es una de nuestras mejores fuentes de información para conocer la práctica argumentativa de la deliberación democrática. En este trabajo se analiza uno de los vicios que, según el historiador, haría su aparición en la escena política ateniense a la muerte de Pericles: la instrumentalización del miedo para obtener la victoria momentánea en la asamblea. El temor prudente, que fuera una arma periclea para conducir la deliberación racional en aras del bien común, habría desaparecido siendo sustituido por el amedrentamiento del rival, la calumnia, el obstruccionismo y la parálisis de la confrontación dialéctica. Instauradas en la ciudad la desconfianza y la sospecha de ocultación, los golpistas del 411 hallaron el terreno abonado para callar las voces contrarias y, gracias al silencio, instaurar el terror.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Les manifestations de crise, en Côte d'Ivoire, ont été extrêmement violentes. Au cours des quinze dernières années, plus de 400 personnes sont mortes, tuées dans des affrontements avec les forces de sécurités ou des contre-manifestants. Malgré la gravité du problème, peu d’études scientifiques y sont consacrées et les rares analyses et enquêtes existantes portent, de façon unilatérale, sur l’identité et la responsabilité pénale des auteurs et commanditaires putatifs de cette violence. La présente étude s’élève contre le moralisme inhérent à ces approches pour aborder la question sous l’angle de l’interaction : cette thèse a pour objectif de comprendre les processus et logiques qui sous-tendent l’usage de la violence au cours des manifestations. Le cadre théorique utilisé dans cette étude qualitative est l’interactionnisme symbolique. Le matériel d’analyse est composé d’entrevues et de divers documents. Trente-trois (33) entrevues semi-dirigées ont été réalisées avec des policiers et des manifestants, cooptés selon la technique de la boule de neige, entre le 3 janvier et le 15 mai 2013, à Abidjan. Les rapports d’enquête, de l’ONG Human Rights Watch, sur les manifestations de crise, les manuels de formation de la police et divers autres matériaux périphériques ont également été consultés. Les données ont été analysées suivant les principes et techniques de la théorisation ancrée (Paillée, 1994). Trois principaux résultats ont été obtenus. Premièrement, le système ivoirien de maintien de l'ordre est conçu selon le modèle d’une « police du prince ». Les forces de sécurité dans leur ensemble y occupent une fonction subalterne d’exécutant. Elles sont placées sous autorité politique avec pour mandat la défense inconditionnelle des institutions. Le style standard de gestion des foules, qui en découle, est légaliste et répressif, correspondant au style d’escalade de la force (McPhail, Schweingruber, & Carthy, 1998). Cette « police du prince » dispose toutefois de marges de manœuvre sur le terrain, qui lui permettent de moduler son style en fonction de la conception qu’elle se fait de l’attitude des manifestants : paternaliste avec les foules dites calmes, elle devient répressive ou déviante avec les foules qu’elle définit comme étant hostiles. Deuxièmement, à rebours d’une conception victimaire de la foule, la violence est une transaction situationnelle dynamique entre forces de sécurité et manifestants. La violence suit un processus ascendant dont les séquences et les règles d’enchainement sont décrites. Ainsi, le premier niveau auquel s’arrête la majorité des manifestations est celui d’une force non létale bilatérale dans lequel les deux acteurs, protestataires et policiers, ont recours à des armes non incapacitantes, où les cailloux des premiers répondent au gaz lacrymogène des seconds. Le deuxième niveau correspond à la létalité unilatérale : la police ouvre le feu lorsque les manifestants se rapprochent de trop près. Le troisième et dernier niveau est atteint lorsque les manifestants utilisent à leur tour des armes à feu, la létalité est alors bilatérale. Troisièmement, enfin, le concept de « l’indignité républicaine » rend compte de la logique de la violence dans les manifestations. La violence se déclenche et s’intensifie lorsqu’une des parties, manifestants ou policiers, interprète l’acte posé par l’adversaire comme étant en rupture avec le rôle attendu du statut qu’il revendique dans la manifestation. Cet acte jugé indigne a pour conséquence de le priver de la déférence rattachée à son statut et de justifier à son encontre l’usage de la force. Ces actes d’indignités, du point de vue des policiers, sont symbolisés par la figure du manifestant hostile. Pour les manifestants, l’indignité des forces de sécurité se reconnait par des actes qui les assimilent à une milice privée. Le degré d’indignité perçu de l’acte explique le niveau d’allocation de la violence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The generation of heterogeneous big data sources with ever increasing volumes, velocities and veracities over the he last few years has inspired the data science and research community to address the challenge of extracting knowledge form big data. Such a wealth of generated data across the board can be intelligently exploited to advance our knowledge about our environment, public health, critical infrastructure and security. In recent years we have developed generic approaches to process such big data at multiple levels for advancing decision-support. It specifically concerns data processing with semantic harmonisation, low level fusion, analytics, knowledge modelling with high level fusion and reasoning. Such approaches will be introduced and presented in context of the TRIDEC project results on critical oil and gas industry drilling operations and also the ongoing large eVacuate project on critical crowd behaviour detection in confined spaces.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-08

Relevância:

10.00% 10.00%

Publicador:

Resumo:

I wanted to explore whether traditional Forum Theatre approaches can be enhanced by the use of integrated voting software to empower young people. My research is based on two of a series of widening participation interactive TiE programmes focused on the decisions young people make on educational progression. I worked as a director alongside students studying Drama and Performance at The University of Worcester and the programmes have toured widely to schools across Worcestershire and Herefordshire. ‘It’s Up to You!’ (2013 – 2014) was aimed at years 8 and 9 choosing their GCSE options and ‘Move on Up!’ (2014 - 2015) looked at the hopes and fears of year 6 pupils about to go up to secondary school. Finding a voice in Boal’s framework as a ‘specactor’ does not always appeal to a pupil who does not want to stand out from the crowd or is not familiar with a classroom where drama conventions are practised or understood. The anonymity of the voting software with results of decisions made appearing instantly on screen is certainly appealing to some pupils: ‘I also loved the keypads they gave us so that we could answer the questions without having to put our hand up and wait..’ This paper aims to interrogate the idea that empowering needs to not simply be about giving voice to a few confident group members but allowing the silent majority to be able to experiment with decision making in an educational and social context.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sixty artists explore the nocturnal. Curated by Tom Hammick. The evening hour too gives us the irresponsibility which darkness and lamplight bestow. We are no longer quite ourselves. – Virginia Woolf, Street Haunting: A London Adventure, 1930 Towards Night is an exhibition exploring the nocturnal through paintings, prints and drawings by over sixty artists. Drawing on the nineteenth century European Romantic tradition, the show surveys contemporary and historical connections to wonderment and dystopia at dusk, twilight, night and dawn. Towards Night juxtaposes key paintings and prints by Constable, Friedrich, Munch, Nolde, Palmer and Turner, some of the best known visionaries of the Romantic tradition with contemporary artists who work with the transformative aspects of nightfall to convey emotional responses of awe, anxiety and solitude, love and loss, revelry, insomnia, and journey’s end. The exhibition opens with direct and positive responses to the natural world; Marc Chagall’s exotic dreamlike evening in The Poet Reclining (1915) sits close to eighteenth century Indian miniatures depicting brightly painted figures offset against darkening monsoon clouds, and William Crozier’s Balcony at Night, Antibes (2007), of a plant, blue and iridescent against the cool night sky. As the exhibition progresses, the dystopias become darker and more disturbing, and the connections between artists and works intensify: Emma Stibbon’s Rome Aqueduct (2011) takes on a heightened sense of pathos alongside Caspar David Friedrich’s Winter Landscape (1811); Peter Doig’s cinematic Echo Lake (1998) conjures up an increased sense of contemporary angst; and Prunella Clough’s False Flower (1993), a magical tree defying brutalism by growing out of concrete, becomes more miraculous near Night Shift (2015) Nick Carrick’s tomblike high rise. Tom Hammick’s Violetta Alone (2015) and Michael Craig Martin’s Ash Tray (2015), reinforce hedonistic aspects of night-time revelry alongside Four AM, Betsy Dadd’s young woman drinking in the early hours of the morning and L.S. Lowry’s drunken people in a pub in The Crowd (1922). In the final room, a cluster of works explores dreams and insomnia, from Louise Bourgeois’ Spirals (2010) to Munch’s lovers embracing in The Kiss (1902). Tom Hammick, curator of the show said “This exhibition has grown way beyond its original conception, to become a magnificent survey of painting and printmaking from over two hundred years based around the central tenet of night. The exhibition is a kind of painterly response to the way figurative artists use their artistic heroes as starting points for their own work, both compositionally and emotionally.” Artists featured in Towards Night: Christiane Baumgarter, Michael Craig-Martin, Julian Opie, Will Gill, Merlin James, Howard Hodgkin, WillIam Scott, Patrick Caulfield, George Shaw, Stephen Chambers, Basil Beattie, Betsy Dadd, Christopher Le Brun, L.S Lowry, Andrew Cranston, David Willetts, James Fisher, Emma Stibbon, Vija Celmins, William Blake, William Crozier, Tom Hammick, Georgia Keeling, Helen Turner, Humphrey Ocean, Julian Bell, Craigie Aitchison, Mark Wright, Ken Kiff, Matthew Burrows, Andrzej Jackowski, Sarah Raphael, Nick Bodimeade, Nick Carrick, Mary Newcomb, Hurvin Anderson, Peter Doig, Phoebe Unwin, Danny Markey, Sara Lee, Simon Burton, Susie Hamilton, Marc Chagall, Alfred Wallis, Emil Nolde, J.M.W. Turner, Prunella Clough, Samuel Palmer, Louise Bourgeois, Caspar David Friedrich, Alex Katz, Ewan Gibbs, Susie Hamilton, Andrzej Jackowski, Amanda Vesey, Edward Stott, Gertrude Hermes, Rose Wylie, Sidney Nolan, John Constable, J.M.W. Turner, Emil Nolde, Hiroshige, Edvard Munch, Samuel Palmer, Eileen Cooper, Charles Neame-Spencer, Samantha Cary.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Richard Aldington’s city poems in the latter part of his 1915 collection Images are concerned with the masses who inhabit the modern city. Aldington is at pains to stress his distinction from those he perceives as an increasingly homogenized crowd. This paper examines the literary, linguistic and rhetorical strategies by which Aldington ‘others’ the masses, and sets them in the context of contemporary studies of the crowd, focusing on the work of Gustave Le Bon and C. F. G. Masterman. Aldington’s poetry is a product of the environment he sees as unsatisfactory, but he searches for solutions in a range of literary traditions which write the city.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose three research problems to explore the relations between trust and security in the setting of distributed computation. In the first problem, we study trust-based adversary detection in distributed consensus computation. The adversaries we consider behave arbitrarily disobeying the consensus protocol. We propose a trust-based consensus algorithm with local and global trust evaluations. The algorithm can be abstracted using a two-layer structure with the top layer running a trust-based consensus algorithm and the bottom layer as a subroutine executing a global trust update scheme. We utilize a set of pre-trusted nodes, headers, to propagate local trust opinions throughout the network. This two-layer framework is flexible in that it can be easily extensible to contain more complicated decision rules, and global trust schemes. The first problem assumes that normal nodes are homogeneous, i.e. it is guaranteed that a normal node always behaves as it is programmed. In the second and third problems however, we assume that nodes are heterogeneous, i.e, given a task, the probability that a node generates a correct answer varies from node to node. The adversaries considered in these two problems are workers from the open crowd who are either investing little efforts in the tasks assigned to them or intentionally give wrong answers to questions. In the second part of the thesis, we consider a typical crowdsourcing task that aggregates input from multiple workers as a problem in information fusion. To cope with the issue of noisy and sometimes malicious input from workers, trust is used to model workers' expertise. In a multi-domain knowledge learning task, however, using scalar-valued trust to model a worker's performance is not sufficient to reflect the worker's trustworthiness in each of the domains. To address this issue, we propose a probabilistic model to jointly infer multi-dimensional trust of workers, multi-domain properties of questions, and true labels of questions. Our model is very flexible and extensible to incorporate metadata associated with questions. To show that, we further propose two extended models, one of which handles input tasks with real-valued features and the other handles tasks with text features by incorporating topic models. Our models can effectively recover trust vectors of workers, which can be very useful in task assignment adaptive to workers' trust in the future. These results can be applied for fusion of information from multiple data sources like sensors, human input, machine learning results, or a hybrid of them. In the second subproblem, we address crowdsourcing with adversaries under logical constraints. We observe that questions are often not independent in real life applications. Instead, there are logical relations between them. Similarly, workers that provide answers are not independent of each other either. Answers given by workers with similar attributes tend to be correlated. Therefore, we propose a novel unified graphical model consisting of two layers. The top layer encodes domain knowledge which allows users to express logical relations using first-order logic rules and the bottom layer encodes a traditional crowdsourcing graphical model. Our model can be seen as a generalized probabilistic soft logic framework that encodes both logical relations and probabilistic dependencies. To solve the collective inference problem efficiently, we have devised a scalable joint inference algorithm based on the alternating direction method of multipliers. The third part of the thesis considers the problem of optimal assignment under budget constraints when workers are unreliable and sometimes malicious. In a real crowdsourcing market, each answer obtained from a worker incurs cost. The cost is associated with both the level of trustworthiness of workers and the difficulty of tasks. Typically, access to expert-level (more trustworthy) workers is more expensive than to average crowd and completion of a challenging task is more costly than a click-away question. In this problem, we address the problem of optimal assignment of heterogeneous tasks to workers of varying trust levels with budget constraints. Specifically, we design a trust-aware task allocation algorithm that takes as inputs the estimated trust of workers and pre-set budget, and outputs the optimal assignment of tasks to workers. We derive the bound of total error probability that relates to budget, trustworthiness of crowds, and costs of obtaining labels from crowds naturally. Higher budget, more trustworthy crowds, and less costly jobs result in a lower theoretical bound. Our allocation scheme does not depend on the specific design of the trust evaluation component. Therefore, it can be combined with generic trust evaluation algorithms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Les manifestations de crise, en Côte d'Ivoire, ont été extrêmement violentes. Au cours des quinze dernières années, plus de 400 personnes sont mortes, tuées dans des affrontements avec les forces de sécurités ou des contre-manifestants. Malgré la gravité du problème, peu d’études scientifiques y sont consacrées et les rares analyses et enquêtes existantes portent, de façon unilatérale, sur l’identité et la responsabilité pénale des auteurs et commanditaires putatifs de cette violence. La présente étude s’élève contre le moralisme inhérent à ces approches pour aborder la question sous l’angle de l’interaction : cette thèse a pour objectif de comprendre les processus et logiques qui sous-tendent l’usage de la violence au cours des manifestations. Le cadre théorique utilisé dans cette étude qualitative est l’interactionnisme symbolique. Le matériel d’analyse est composé d’entrevues et de divers documents. Trente-trois (33) entrevues semi-dirigées ont été réalisées avec des policiers et des manifestants, cooptés selon la technique de la boule de neige, entre le 3 janvier et le 15 mai 2013, à Abidjan. Les rapports d’enquête, de l’ONG Human Rights Watch, sur les manifestations de crise, les manuels de formation de la police et divers autres matériaux périphériques ont également été consultés. Les données ont été analysées suivant les principes et techniques de la théorisation ancrée (Paillée, 1994). Trois principaux résultats ont été obtenus. Premièrement, le système ivoirien de maintien de l'ordre est conçu selon le modèle d’une « police du prince ». Les forces de sécurité dans leur ensemble y occupent une fonction subalterne d’exécutant. Elles sont placées sous autorité politique avec pour mandat la défense inconditionnelle des institutions. Le style standard de gestion des foules, qui en découle, est légaliste et répressif, correspondant au style d’escalade de la force (McPhail, Schweingruber, & Carthy, 1998). Cette « police du prince » dispose toutefois de marges de manœuvre sur le terrain, qui lui permettent de moduler son style en fonction de la conception qu’elle se fait de l’attitude des manifestants : paternaliste avec les foules dites calmes, elle devient répressive ou déviante avec les foules qu’elle définit comme étant hostiles. Deuxièmement, à rebours d’une conception victimaire de la foule, la violence est une transaction situationnelle dynamique entre forces de sécurité et manifestants. La violence suit un processus ascendant dont les séquences et les règles d’enchainement sont décrites. Ainsi, le premier niveau auquel s’arrête la majorité des manifestations est celui d’une force non létale bilatérale dans lequel les deux acteurs, protestataires et policiers, ont recours à des armes non incapacitantes, où les cailloux des premiers répondent au gaz lacrymogène des seconds. Le deuxième niveau correspond à la létalité unilatérale : la police ouvre le feu lorsque les manifestants se rapprochent de trop près. Le troisième et dernier niveau est atteint lorsque les manifestants utilisent à leur tour des armes à feu, la létalité est alors bilatérale. Troisièmement, enfin, le concept de « l’indignité républicaine » rend compte de la logique de la violence dans les manifestations. La violence se déclenche et s’intensifie lorsqu’une des parties, manifestants ou policiers, interprète l’acte posé par l’adversaire comme étant en rupture avec le rôle attendu du statut qu’il revendique dans la manifestation. Cet acte jugé indigne a pour conséquence de le priver de la déférence rattachée à son statut et de justifier à son encontre l’usage de la force. Ces actes d’indignités, du point de vue des policiers, sont symbolisés par la figure du manifestant hostile. Pour les manifestants, l’indignité des forces de sécurité se reconnait par des actes qui les assimilent à une milice privée. Le degré d’indignité perçu de l’acte explique le niveau d’allocation de la violence.