104 resultados para Cheating


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Overlay networks have been used for adding and enhancing functionality to the end-users without requiring modifications in the Internet core mechanisms. Overlay networks have been used for a variety of popular applications including routing, file sharing, content distribution, and server deployment. Previous work has focused on devising practical neighbor selection heuristics under the assumption that users conform to a specific wiring protocol. This is not a valid assumption in highly decentralized systems like overlay networks. Overlay users may act selfishly and deviate from the default wiring protocols by utilizing knowledge they have about the network when selecting neighbors to improve the performance they receive from the overlay. This thesis goes against the conventional thinking that overlay users conform to a specific protocol. The contributions of this thesis are threefold. It provides a systematic evaluation of the design space of selfish neighbor selection strategies in real overlays, evaluates the performance of overlay networks that consist of users that select their neighbors selfishly, and examines the implications of selfish neighbor and server selection to overlay protocol design and service provisioning respectively. This thesis develops a game-theoretic framework that provides a unified approach to modeling Selfish Neighbor Selection (SNS) wiring procedures on behalf of selfish users. The model is general, and takes into consideration costs reflecting network latency and user preference profiles, the inherent directionality in overlay maintenance protocols, and connectivity constraints imposed on the system designer. Within this framework the notion of user’s "best response" wiring strategy is formalized as a k-median problem on asymmetric distance and is used to obtain overlay structures in which no node can re-wire to improve the performance it receives from the overlay. Evaluation results presented in this thesis indicate that selfish users can reap substantial performance benefits when connecting to overlay networks composed of non-selfish users. In addition, in overlays that are dominated by selfish users, the resulting stable wirings are optimized to such great extent that even non-selfish newcomers can extract near-optimal performance through naïve wiring strategies. To capitalize on the performance advantages of optimal neighbor selection strategies and the emergent global wirings that result, this thesis presents EGOIST: an SNS-inspired overlay network creation and maintenance routing system. Through an extensive measurement study on the deployed prototype, results presented in this thesis show that EGOIST’s neighbor selection primitives outperform existing heuristics on a variety of performance metrics, including delay, available bandwidth, and node utilization. Moreover, these results demonstrate that EGOIST is competitive with an optimal but unscalable full-mesh approach, remains highly effective under significant churn, is robust to cheating, and incurs minimal overheads. This thesis also studies selfish neighbor selection strategies for swarming applications. The main focus is on n-way broadcast applications where each of n overlay user wants to push its own distinct file to all other destinations as well as download their respective data files. Results presented in this thesis demonstrate that the performance of our swarming protocol for n-way broadcast on top of overlays of selfish users is far superior than the performance on top of existing overlays. In the context of service provisioning, this thesis examines the use of distributed approaches that enable a provider to determine the number and location of servers for optimal delivery of content or services to its selfish end-users. To leverage recent advances in virtualization technologies, this thesis develops and evaluates a distributed protocol to migrate servers based on end-users demand and only on local topological knowledge. Results under a range of network topologies and workloads suggest that the performance of the distributed deployment is comparable to that of the optimal but unscalable centralized deployment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The students academic performance is a key aspect for all agents involved in a higher education quality program. However, there is no unanimity on how to measure it. Some professionals choose assessing only cognitive aspects while others lean towards assessing the acquisition of certain skills. The need to train increasingly adapted professionals in order to respond to the companies’ demands and being able to compete internationally in a global labour market requires a kind of training that goes beyond memorizing. Critical and logical thinking are amongst written language skills demanded in the field of Social Sciences. The objective of this study is to empirically demonstrate the impact of voluntary assignments on the academic performance of students. Our hypothesis is that students who complete high quality voluntary assignments are those more motivated and, therefore, those with higher grades. An experiment with students from the "Financial Accounting II" during the academic year of 2012/13 at the Business and Economics School of the UCM was carried out. A series of voluntary assessments involving the preparation of accounting essays were proposed in order to develop skills and competencies as a complement to the lessons included in the curriculum of the subject. At the end of the course, the carrying-out or not of the essay together with its critical, reflective quality and style, were compared. Our findings show a relationship between the voluntarily presented papers of quality and the final grade obtained throughout the course. These results show that the students intrinsic motivation is a key element in their academic performance. On the other hand, the teachers role focuses on being a motivating element through the learning process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this study was to explore the experiences of 5 stakeholder groups—students, parents, community organization representatives, guidance counsellors, and secondary school principals—in dealing with a mandatory secondary school graduation requirement in Ontario. The requirement is that students must complete 40 hours of eligible community involvement activities during their high school years in order to graduate. Ten stakeholders were interviewed regarding the nature of the community involvement program, what makes it work, and suggestions for improvement. The study found that although this program has the potential to provide a meaningful experience for students, and students are seen to gain from their experience in multiple ways, it depends substantially on the commitment of students, educators, and community organizations to make it worthwhile. Stakeholders recommended changes to the current program, which included making it a more structured process that would increase the consistency ofhow this program is implemented, finding ways to curb cheating and to reduce the administrative burden on schools, having more support from the Ontario provincial government and Ontario Ministry of Education and Training in the promotion and communication of this program, and developing partnerships between community organizations and schools to enrich the application of this program. This study concludes with a recommendation that the Ontario Ministry of Education and Training consider introducing Service-Learning, a curriculum-based experiential service and learning process, as an enhancement to the current community involvement program.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research examined psychopathy as an evolutionary adaptation that involves cheating and deception. I theorized that this strategy should be associated with certain abilities. This research examined the association between psychopathic traits and the ability to detect cheaters, altruism, deception, and psychopathic traits. Results indicated that psychopathic traits were not significantly associated with the ability to detect cheaters or altruism. Results indicated that high Factor 1 psychopathy scores, and low Factor 2 psychopathy scores, were indicative of higher ratings of deception when viewing deceptive videos. Conversely, when viewing truthful videos, Factor 1 was a significant predictor of higher ratings of deception. Finally, our results indicated that total psychopathy scores were associated the ability to identify psychopathic traits in others. Taken together the results provide mixed support for the evolutionary perspective of psychopathy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Le mémoire original s'accompagnait en annexe du livre-objet Le poids de l'oiseau sur la vitre.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Il y a des problemes qui semblent impossible a resoudre sans l'utilisation d'un tiers parti honnete. Comment est-ce que deux millionnaires peuvent savoir qui est le plus riche sans dire a l'autre la valeur de ses biens ? Que peut-on faire pour prevenir les collisions de satellites quand les trajectoires sont secretes ? Comment est-ce que les chercheurs peuvent apprendre les liens entre des medicaments et des maladies sans compromettre les droits prives du patient ? Comment est-ce qu'une organisation peut ecmpecher le gouvernement d'abuser de l'information dont il dispose en sachant que l'organisation doit n'avoir aucun acces a cette information ? Le Calcul multiparti, une branche de la cryptographie, etudie comment creer des protocoles pour realiser de telles taches sans l'utilisation d'un tiers parti honnete. Les protocoles doivent etre prives, corrects, efficaces et robustes. Un protocole est prive si un adversaire n'apprend rien de plus que ce que lui donnerait un tiers parti honnete. Un protocole est correct si un joueur honnete recoit ce que lui donnerait un tiers parti honnete. Un protocole devrait bien sur etre efficace. Etre robuste correspond au fait qu'un protocole marche meme si un petit ensemble des joueurs triche. On demontre que sous l'hypothese d'un canal de diusion simultane on peut echanger la robustesse pour la validite et le fait d'etre prive contre certains ensembles d'adversaires. Le calcul multiparti a quatre outils de base : le transfert inconscient, la mise en gage, le partage de secret et le brouillage de circuit. Les protocoles du calcul multiparti peuvent etre construits avec uniquements ces outils. On peut aussi construire les protocoles a partir d'hypoth eses calculatoires. Les protocoles construits a partir de ces outils sont souples et peuvent resister aux changements technologiques et a des ameliorations algorithmiques. Nous nous demandons si l'efficacite necessite des hypotheses de calcul. Nous demontrons que ce n'est pas le cas en construisant des protocoles efficaces a partir de ces outils de base. Cette these est constitue de quatre articles rediges en collaboration avec d'autres chercheurs. Ceci constitue la partie mature de ma recherche et sont mes contributions principales au cours de cette periode de temps. Dans le premier ouvrage presente dans cette these, nous etudions la capacite de mise en gage des canaux bruites. Nous demontrons tout d'abord une limite inferieure stricte qui implique que contrairement au transfert inconscient, il n'existe aucun protocole de taux constant pour les mises en gage de bit. Nous demontrons ensuite que, en limitant la facon dont les engagements peuvent etre ouverts, nous pouvons faire mieux et meme un taux constant dans certains cas. Ceci est fait en exploitant la notion de cover-free families . Dans le second article, nous demontrons que pour certains problemes, il existe un echange entre robustesse, la validite et le prive. Il s'effectue en utilisant le partage de secret veriable, une preuve a divulgation nulle, le concept de fantomes et une technique que nous appelons les balles et les bacs. Dans notre troisieme contribution, nous demontrons qu'un grand nombre de protocoles dans la litterature basee sur des hypotheses de calcul peuvent etre instancies a partir d'une primitive appelee Transfert Inconscient Veriable, via le concept de Transfert Inconscient Generalise. Le protocole utilise le partage de secret comme outils de base. Dans la derniere publication, nous counstruisons un protocole efficace avec un nombre constant de rondes pour le calcul a deux parties. L'efficacite du protocole derive du fait qu'on remplace le coeur d'un protocole standard par une primitive qui fonctionne plus ou moins bien mais qui est tres peu couteux. On protege le protocole contre les defauts en utilisant le concept de privacy amplication .

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La malhonnêteté académique au cours d’épreuves présente des enjeux importants quant à l’intégrité des évaluations. La présence des TIC étant de plus en plus importante en cours de passation dans les épreuves, il est important avec ce mode de récolte de données d’assurer un niveau de sécurité égal ou même supérieur à celui présent lorsqu’un mode de récolte de données traditionnel, le papier-crayon, est utilisé. Il existe plusieurs recherches sur l’utilisation des TIC dans l’évaluation, mais peu d’entre elles traitent des modalités de sécurité lors de l’utilisation des TIC. Dans ce mémoire, treize organisations québécoises ont été rencontrées: six qui utilisaient les TIC dans la passation, cinq qui utilisaient le papier-crayon dans la passation mais qui désiraient utiliser les TIC et deux qui utilisaient le papier-crayon et qui ne désiraient pas utiliser les TIC. Les organisations sont des établissements d’enseignement (primaire, secondaire, collégial, universitaire), des entreprises privées, des organismes gouvernementaux ou municipaux et des ordres professionnels. Des entrevues semi-structurées et une analyse qualitative par présence ou absence de différentes caractéristiques ont permis de documenter les modalités de sécurité liées à la récolte de données en vue de l’évaluation en utilisant les TIC. Ces modalités ont été comparées à celles utilisées lors de l’utilisation du papier-crayon dans la récolte de données en vue de l’évaluation afin de voir comment elles varient lors de l’utilisation des TIC. Les résultats révèlent que l’utilisation des TIC dans la passation complexifie et ajoute des étapes à la préparation des épreuves pour assurer un niveau de sécurité adéquat. Cependant elle permet également de nouvelles fonctions en ce qui concerne le type de questions, l’intégration de multimédia, l’utilisation de questions adaptatives et la génération aléatoire de l’épreuve qui permettent de contrer certaines formes de malhonnêteté académiques déjà présentes avec l’utilisation du papier-crayon dans la passation et pour lesquelles il était difficile d’agir. Toutefois, l’utilisation des TIC dans la passation peut aussi amener de nouvelles possibilités de malhonnêteté académique. Mais si ces dernières sont bien prises en considération, l’utilisation des TIC permet un niveau de sécurité des épreuves supérieur à celui où les données sont récoltées au traditionnel papier-crayon en vue de l’évaluation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The School of Geography's policy and requirements in dealing with matters related to academic integrity and plagiarism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A multiple-choice quiz to test a student's understanding of academic integrity and plagiarism. A range of quiz formats including Blackboard, IMS-QTI, plain text and Respondus is available for users to download.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Explanatory notes on why academic integrity is important for students in their professional and personal development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Understanding what is meant by plagiarism. How to ensure that you are not accused of plagiarism or cheating. How to properly reference material you copy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This short YouTube video was produced by the University of Bergen to help their students understand the perils of plagiarism, the benefits of academic integrity and the steps they need to take to avoid plagiarism. It's in Norwegian but has subtitles - and is really funny and well-produced. A great way to introduce your students to these ideas.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Los comportamientos desviados de los estudiantes a lo largo de su formación académica son más frecuentes de lo que se cree. Sin embargo, detrás del simple hecho de infringir una norma establecida por alguna Institución Educativa, hay una serie de construcciones sociales que se gestan alrededor de esta situación, y sobre esto es importante ahondar. En efecto, el enfoque del presente estudio es encontrar la postura y tolerancia que tienen los estudiantes de dos Facultades diferentes frente al fraude académico y tratar de encontrar las posibles causas a esa tolerancia ante las acciones desviadas. Además, se hará un énfasis especial en la Facultad de Administración, dado la importancia y relevancia que tienen los egresados de este programa académico en el desarrollo económico de un país.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Al final de un experimento controlado, donde se contrataron asistentes de investigación para la codificación de noticias de los periódicos en línea durante un mes, el experimentador-empleador los invitó a lanzar un dado y reportar el resultado con el fin de pagar en efectivo una cantidad proporcional y lineal en el número reportado, de 1 a 6. Otro grupo (control) de estudiantes similares, fue invitado a realizar la misma tarea, pero sin tener relación laboral previa con el experimentador-empleador. Nuestro grupo de tratamiento mostró niveles promedio más altos de honestidad, ya que la distribución de los números reportados por estos fue menos sesgada a la derecha. Es decir, el grupo de relaciones de trabajo fue más propenso a reportar números que están más cerca de la distribución uniforme (honesta) que el grupo de control, y que otros estudios con este tipo de experimento. Se conjetura que la relación laboral del grupo de tratamiento indujo mayores niveles de honestidad entre los participantes. Una de las posibles razones es que la relación de trabajo creada para el grupo de estudiantes de tratamiento incluía una serie de choques que implicaba la posibilidad de desempleo involuntario, generando incentivos para que los estudiantes interpretaran la honestidad como un rasgo que podría ser valorado en el mercado de trabajo. Este artículo contribuye a la creciente literatura sobre la comprensión de los motivos de la honestidad y el engaño.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For fifty years, computer chess has pursued an original goal of Artificial Intelligence, to produce a chess-engine to compete at the highest level. The goal has arguably been achieved, but that success has made it harder to answer questions about the relative playing strengths of man and machine. The proposal here is to approach such questions in a counter-intuitive way, handicapping or stopping-down chess engines so that they play less well. The intrinsic lack of man-machine games may be side-stepped by analysing existing games to place computer engines as accurately as possible on the FIDE ELO scale of human play. Move-sequences may also be assessed for likelihood if computer-assisted cheating is suspected.