858 resultados para Seminars, workshops
Resumo:
El presente trabajo pretende explicar el alcance y las limitaciones que los mecanismos de control fronterizo han sorteado en la frontera terrestre entre Colombia y Ecuador, los cuales se han visto en tela de juicio por el problema del terrorismo y la permeabilidad de la linea divisoria.
Resumo:
Lectures and workshops recorded as part of the MA Communication Design 2012-2013
Resumo:
La bacteriemia asociada a catéter afecta a pacientes en las unidades de cuidado intensivo con una alta morbilidad, mortalidad y aumento de los costos al sistema de salud. Los recién nacidos son la población de más alto riesgo por el mayor uso de catéteres centrales. Objetivo: Caracterizar factores de riesgo para bacteriemia asociada a catéter en la Unidad de Cuidado Intensivo Neonatal de la Fundación Cardioinfantil entre 2005 - 2010 Materiales y método: Estudio descriptivo de corte transversal, incluyó todos los recién nacidos con diagnostico de bacteriemia asociada a catéter. Se analizó la información utilizando frecuencias y medidas de tendencia central. Resultados: Se encontraron 50 pacientes con diagnostico de bacteriemia asociada a catéter. 50% de género masculino, 52% con edad gestacional al nacimiento menor a 36 semanas y 24% con peso menor a 1500 gramos al momento de la inserción del catéter. La edad fue de 24.2 días al momento de la inserción del catéter. En el 66% de los pacientes el sitio de inserción fue el miembro superior, siendo el Sthaphylococcus Epidermidis el germen con el 50% de las bacteriemias. Conclusión: La bacteriemia asociada a catéter afecta paciente prematuros, de bajo peso sin diferencias en genero. La manipulación de dichos dispositivos, el sitio de inserción, el uso previo de antibióticos, la duración del catéter y el uso de nutrición parenteral son factores que están asociados al mayor riesgo de infección. Siendo el Staphylococcus Epidermidis el germen mas frecuente.
Resumo:
These materials, which include a powerpoint, list of references and group activities were developed by Alison Dickens and Jill Doubleday (Modern Languages, University of Southampton) and have been used to deliver workshops for academics working with international students at the University and externally. We would like to acknowledge the contribution to the workshop of Dave Burnapp who developed some of the activities used in the workshop.
Resumo:
El proyecto de investigación del plan estratégico TIC tuvo un fin exacto el cual buscaba nuevos aportes e ideas por parte de los investigadores para garantizar el posicionamiento de la universidad en los diferentes medios tecnológicos existentes. Por un lado se realizaron diferentes proyectos en pro del posicionamiento en redes sociales y diferentes proyectos para incentivar a toda la comunidad Rosarista a vincularse con el Plan TIC; de esta forma se crearon diferentes propuestas en las que se incluía un ambiente interno y externo; es decir el interno se refiere a todas las personas que hacen parte de la comunidad Rosarista y el externo se refiere al entorno que esto rodea. El plan TIC siempre fue enfocado en el beneficio tanto de la universidad como de las personas que hacen parte de la misma; así mismo incentivar a los estudiantes, profesores y personal de la universidad a utilizar todos los beneficios que el plan incluye garantizando un éxito para el plan. Otro valor agregado del Plan TIC es la utilización de los recursos que la universidad brinda para un mejor manejo de portales para todas las facultades; vincular todas las facultades es el éxito del plan puesto que se crearon propuestas como seminarios y clases para que todas las facultades hicieran uso de las herramientas que se brindan, ya que, las facultades son las encargadas de crear la cultura a cada estudiante y a cada profesor dependiendo del programa al que pertenezcan para que estos recursos se optimicen al máximo.
Resumo:
Introducción: La hemorragia digestiva (HVDA) es la principal causa de descompensación en pacientes con cirrosis. Caracterizar el estado ácido-base de estos pacientes sería útil para reflejar la severidad del sangrado e identificar pacientes con alto riesgo de complicación. Objetivo: Describir el estado ácido-base de los pacientes que consultaron a urgencias con cirrosis descompensada por HVDA y posteriormente fueron manejados en la unidad de cuidado intensivo (UCI) o fallecieron. Métodos: Se realizó el análisis del estado ácido-base a 10 pacientes con estas características, utilizando tres métodos distintos. Resultados: El perfil ácido-base encontrado fue: acidosis metabólica por iones no medidos, acidosis láctica, alcalosis por hipoalbuminemia y anión gap elevado en la mayoría de pacientes. Conclusiones: La teoría de Henderson-Hasselbach no fue suficiente para identificar pacientes con alto riesgo, debería implementarse concomitantemente el análisis anión gap, base déficit y el método físico–químico, para entender los fenómenos acido base de estos pacientes.
Resumo:
Impulsando es un programa de formación en luthería enfocado hacia la construcción y reparación de guitarras acústicas. La estructura programática consta de seis módulos de formación que incluyen fundamentos teóricos y aplicación práctica. El proyecto propone hacer cuatro talleres con una duración de setenta y dos horas, para grupos de doce participantes, donde los soldados discapacitados podrán desarrollar competencias técnicas y humanas que mejoren sus condiciones sociales.
Resumo:
Wednesday 23rd April 2014 Speaker(s): Willi Hasselbring Organiser: Leslie Carr Time: 23/04/2014 14:00-15:00 Location: B32/3077 File size: 802Mb Abstract The internal behavior of large-scale software systems cannot be determined on the basis of static (e.g., source code) analysis alone. Kieker provides complementary dynamic analysis capabilities, i.e., monitoring/profiling and analyzing a software system's runtime behavior. Application Performance Monitoring is concerned with continuously observing a software system's performance-specific runtime behavior, including analyses like assessing service level compliance or detecting and diagnosing performance problems. Architecture Discovery is concerned with extracting architectural information from an existing software system, including both structural and behavioral aspects like identifying architectural entities (e.g., components and classes) and their interactions (e.g., local or remote procedure calls). In addition to the Architecture Discovery of Java systems, Kieker supports Architecture Discovery for other platforms, including legacy systems, for instance, inplemented in C#, C++, Visual Basic 6, COBOL or Perl. Thanks to Kieker's extensible architecture it is easy to implement and use custom extensions and plugins. Kieker was designed for continuous monitoring in production systems inducing only a very low overhead, which has been evaluated in extensive benchmark experiments. Please, refer to http://kieker-monitoring.net/ for more information.
Resumo:
Tuesday 22nd April 2014 Speaker(s): Sue Sentance Organiser: Leslie Carr Time: 22/04/2014 15:00-16:00 Location: B32/3077 File size: 698 Mb Abstract Until recently, "computing" education in English schools mainly focused on developing general Digital Literacy and Microsoft Office skills. As of this September, a new curriculum comes into effect that provides a strong emphasis on computation and programming. This change has generated some controversy in the news media (4-year-olds being forced to learn coding! boss of the government’s coding education initiative cannot code shock horror!!!!) and also some concern in the teaching profession (how can we possibly teach programming when none of the teachers know how to program)? Dr Sue Sentance will explain the work of Computing At School, a part of the BCS Academy, in galvanising universities to help teachers learn programming and other computing skills. Come along and find out about the new English Computing Revolution - How will your children and your schools be affected? - How will our University intake change? How will our degrees have to change? - What is happening to the national perception of Computer Science?
Resumo:
Wednesday 9th April 2014 Speaker(s): Guus Schreiber Time: 09/04/2014 11:00-11:50 Location: B32/3077 File size: 546Mb Abstract In this talk I will discuss linked data for museums, archives and libraries. This area is known for its knowledge-rich and heterogeneous data landscape. The objects in this field range from old manuscripts to recent TV programs. Challenges in this field include common metadata schema's, inter-linking of the omnipresent vocabularies, cross-collection search strategies, user-generated annotations and object-centric versus event-centric views of data. This work can be seen as part of the rapidly evolving field of digital humanities. Speaker Biography Guus Schreiber Guus is a professor of Intelligent Information Systems at the Department of Computer Science at VU University Amsterdam. Guus’ research interests are mainly in knowledge and ontology engineering with a special interest for applications in the field of cultural heritage. He was one of the key developers of the CommonKADS methodology. Guus acts as chair of W3C groups for Semantic Web standards such as RDF, OWL, SKOS and REFa. His research group is involved in a wide range of national and international research projects. He is now project coordinator of the EU Integrated project No Tube concerned with integration of Web and TV data with the help of semantics and was previously Scientific Director of the EU Network of Excellence “Knowledge Web”.
Resumo:
Wednesday 26th March 2014 Speaker(s): Dr Trung Dong Huynh Organiser: Dr Tim Chown Time: 26/03/2014 11:00-11:50 Location: B32/3077 File size: 349Mb Abstract Understanding the dynamics of a crowdsourcing application and controlling the quality of the data it generates is challenging, partly due to the lack of tools to do so. Provenance is a domain-independent means to represent what happened in an application, which can help verify data and infer their quality. It can also reveal the processes that led to a data item and the interactions of contributors with it. Provenance patterns can manifest real-world phenomena such as a significant interest in a piece of content, providing an indication of its quality, or even issues such as undesirable interactions within a group of contributors. In this talk, I will present an application-independent methodology for analysing provenance graphs, constructed from provenance records, to learn about such patterns and to use them for assessing some key properties of crowdsourced data, such as their quality, in an automated manner. I will also talk about CollabMap (www.collabmap.org), an online crowdsourcing mapping application, and show how we applied the approach above to the trust classification of data generated by the crowd, achieving an accuracy over 95%.
Resumo:
Wednesday 19th March 2014 Speaker(s): Kirk Martinez, Dr Jonathon S Hare and Dr Enrico Costanza Organiser: Dr Tim Chown Time: 19/03/2014 11:00-11:50 Location: B32/3077 File size: 676 Mb Abstract The new WAIS seminar series features classic seminars, research discussions, tutorial-style presentations, and research debates. This seminar takes the form of a research discussion which will focus on the Internet of Things (IoT) research being undertaken in WAIS and other research groups in ECS. IoT is a significant emerging research area, with funding for research available from many channels including new H2020 programmes and the TSB. We have seen examples of IoT devices being built in WAIS and other ECS groups, e.g. in sensor networking, energy monitoring via Zigbee devices, and of course Erica the Rhino (a Big Thing!). The goal of the session is to briefly present such examples of existing Things in our lab with the intent of seeding discussion on open research questions, and therefore future work we could do towards new Things being deployed for experimentation in Building 32 or its environs. The session will discuss what 'things' we have, how they work, what new 'things' might we want to create and deploy, what components we might need to enable this, and how we might interact with these objects.
Resumo:
Wednesday 12th March 2014 Speaker(s): Dr Tim Chown Organiser: Time: 12/03/2014 11:00-11:50 Location: B32/3077 File size: 642 Mb Abstract The WAIS seminar series is designed to be a blend of classic seminars, research discussions, debates and tutorials. The Domain Name System (DNS) is a critical part of the Internet infrastructure. In this talk we begin by explaining the basic model of operation of the DNS, including how domain names are delegated and how a DNS resolver performs a DNS lookup. We then take a tour of DNS-related topics, including caching, poisoning, governance, the increasing misuse of the DNS in DDoS attacks, and the expansion of the DNS namespace to new top level domains and internationalised domain names. We also present the latest work in the IETF on DNS privacy. The talk will be pitched such that no detailed technical knowledge is required. We hope that attendees will gain some familiarity with how the DNS works, some key issues surrounding DNS operation, and how the DNS might touch on various areas of research within WAIS.
Resumo:
Title: Let’s SoFWIReD! Time: Wed, 21 May 2014 11:00-11:50 Location: Building 32, Room 3077 Speaker: Dr Sepi Chakaveh Abstract The information age as we know it has its roots in several enabling technologies – most of all the World Wide Web – for the provision of truly global connectivity. The emergence of a Web of Big Data in terms of the publication and analysis of Open Data provides new insights about the impact of the Web in our society. The second most important technology in this regard has been the emergence of streaming processes based on new and innovative compression methods such as MP3 so that audio and video content becomes accessible to everyone on the Web. The SoFWIReD team is developing comprehensive, interoperable platforms for data and knowledge driven processing of Open Data and will investigate aspects of collective intelligence. Insights generated in the project will form the basis for supporting companies through consulting, organisational development, and software solutions so that they can master the collective intelligence transition. The seminar will present how the project addresses the research topics of web observatory, dynamic media objects, crowd-sourced open data and Internet services. At the end of a talk a number of demos will be shown in the context of SoFWIReD’s Dynamic Media Object.
Resumo:
Speaker(s): Prof. David Evans Organiser: Dr Tim Chown Time: 22/05/2014 10:45-11:45 Location: B53/4025 Abstract Secure multi-party computation enables two (or more) participants to reliably compute a function that depends on both of their inputs, without revealing those inputs to the other party or needing to trust any other party. It could enable two people who meet at a conference to learn who they known in common without revealing any of their other contacts, or allow a pharmaceutical company to determine the correct dosage of a medication based on a patient’s genome without compromising the privacy of the patient. A general solution to this problem has been known since Yao's pioneering work in the 1980s, but only recently has it become conceivable to use this approach in practice. Over the past few years, my research group has worked towards making secure computation practical for real applications. In this talk, I'll provide a brief introduction to secure computation protocols, describe the techniques we have developed to design scalable and efficient protocols, and share some recent results on improving efficiency and how secure computing applications are developed.