996 resultados para Hard part


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes a design game that we called 'Meaning in Movement'. The purpose was to explore notions of professional dental practice with dental practioners in terms of gestures, actions and movements. The game represents a first step towards involving gestures, actions and movements in a design dialog with practioners for the purpose of designing future interactive systems which are more appropriate to the type of skilful actions and richly structured environments of dentists and dental assistants.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents aspects of a longitudinal study in the design and practice of Internet meetings between farmer their advisors and researchers in rural Australia. It reports on the use of Microsoft NetMeeting (NM) by a group of agricultural researchers from Australia's CSIRO (Commonwealth Scientific and Industrial Research Organisation) for regular meetings, over nine years, with farmers and the commercial advisers. It describes lessons drawn from this experience about the conditions under which telecollaborative tools, such as NM and video conferencing, are likely to be both useful and used.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper outlines results from the long-term deployment of a system for mobile group socialization which utilizes a variety of mundane technologies to support cross-media notifications and messaging. We focus here on the results as they pertain to usage of mundane technologies, particularly the use of such technologies within the context of a cross-media system. We introduce “Rhub”, our prototype, which was designed to support coordination, communication and sharing amongst informal social groups. We also describe and discuss the usage of the “console,” a text-based syntax to enable consistent use across text messaging, instant messaging, email and the web. The prototype has been in active use for over 18 months by over 170 participants, who have used it on an everyday basis for their own socializing requirements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper uses data from a large national project on student-working to examine problems and challenges for school students working in part-time jobs. While literature has identified some potential problems and challenges, and some potential difficulties can be extrapolated from the nature of a young teenage workforce and the nature of the workplaces, these were largely absent in the two companies researched because the companies already had policies in place that addressed the potential problems. Some suggestions are made about how problems and challenges could be avoided in a wider range of adolescent workplaces.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study explores full-time workers' understanding of and assumptions about part-time work against six job quality components identified in recent literature. Forty interviews were conducted with employees in a public sector agency in Australia, a study context where part-time work is ostensibly 'good quality' and is typically long term, voluntary, involving secure contracts (i.e. permanent rather than casual) and having predictable hours distributed evenly over the week and year. Despite strong collective bargaining arrangements as well as substantial legal and industrial obligations, the findings revealed some serious concerns for part-time job quality. These concerns included reduced responsibilities and lesser access to high status roles and projects, a lack of access to promotion opportunities, increased work intensity and poor workplace support. The highly gendered, part-time labour market also means that it is women who disproportionately experience this disadvantage. To foster equity, greater attention needs to focus on monitoring and enhancing job quality, regardless of hours worked.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.