897 resultados para indigenous knowledge systems
Resumo:
Scoping behavioral variations to dynamic extents is useful to support non-functional concerns that otherwise result in cross-cutting code. Unfortunately, such forms of scoping are difficult to obtain with traditional reflection or aspects. We propose delegation proxies, a dynamic proxy model that supports behavioral intercession through the interception of various interpretation operations. Delegation proxies permit different behavioral variations to be easily composed together. We show how delegation proxies enable behavioral variations that can propagate to dynamic extents. We demonstrate our approach with examples of behavioral variations scoped to dynamic extents that help simplify code related to safety, reliability, and monitoring.
Resumo:
Blind deconvolution is the problem of recovering a sharp image and a blur kernel from a noisy blurry image. Recently, there has been a significant effort on understanding the basic mechanisms to solve blind deconvolution. While this effort resulted in the deployment of effective algorithms, the theoretical findings generated contrasting views on why these approaches worked. On the one hand, one could observe experimentally that alternating energy minimization algorithms converge to the desired solution. On the other hand, it has been shown that such alternating minimization algorithms should fail to converge and one should instead use a so-called Variational Bayes approach. To clarify this conundrum, recent work showed that a good image and blur prior is instead what makes a blind deconvolution algorithm work. Unfortunately, this analysis did not apply to algorithms based on total variation regularization. In this manuscript, we provide both analysis and experiments to get a clearer picture of blind deconvolution. Our analysis reveals the very reason why an algorithm based on total variation works. We also introduce an implementation of this algorithm and show that, in spite of its extreme simplicity, it is very robust and achieves a performance comparable to the top performing algorithms.
Resumo:
Gradient-domain path tracing has recently been introduced as an efficient realistic image synthesis algorithm. This paper introduces a bidirectional gradient-domain sampler that outperforms traditional bidirectional path tracing often by a factor of two to five in terms of squared error at equal render time. It also improves over unidirectional gradient-domain path tracing in challenging visibility conditions, similarly as conventional bidirectional path tracing improves over its unidirectional counterpart. Our algorithm leverages a novel multiple importance sampling technique and an efficient implementation of a high-quality shift mapping suitable for bidirectional path tracing. We demonstrate the versatility of our approach in several challenging light transport scenarios.
Resumo:
The article proposes granular computing as a theoretical, formal and methodological basis for the newly emerging research field of human–data interaction (HDI). We argue that the ability to represent and reason with information granules is a prerequisite for data legibility. As such, it allows for extending the research agenda of HDI to encompass the topic of collective intelligence amplification, which is seen as an opportunity of today’s increasingly pervasive computing environments. As an example of collective intelligence amplification in HDI, we introduce a collaborative urban planning use case in a cognitive city environment and show how an iterative process of user input and human-oriented automated data processing can support collective decision making. As a basis for automated human-oriented data processing, we use the spatial granular calculus of granular geometry.
Resumo:
Abstract Mobile Edge Computing enables the deployment of services, applications, content storage and processing in close proximity to mobile end users. This highly distributed computing environment can be used to provide ultra-low latency, precise positional awareness and agile applications, which could significantly improve user experience. In order to achieve this, it is necessary to consider next-generation paradigms such as Information-Centric Networking and Cloud Computing, integrated with the upcoming 5th Generation networking access. A cohesive end-to-end architecture is proposed, fully exploiting Information-Centric Networking together with the Mobile Follow-Me Cloud approach, for enhancing the migration of content-caches located at the edge of cloudified mobile networks. The chosen content-relocation algorithm attains content-availability improvements of up to 500 when a mobile user performs a request and compared against other existing solutions. The performed evaluation considers a realistic core-network, with functional and non-functional measurements, including the deployment of the entire system, computation and allocation/migration of resources. The achieved results reveal that the proposed architecture is beneficial not only from the users’ perspective but also from the providers point-of-view, which may be able to optimize their resources and reach significant bandwidth savings.
Resumo:
In the present paper we investigate the life cycles of formalized theories that appear in decision making instruments and science. In few words mixed theories are build in the following steps: Initially a small collection of facts is the kernel of the theory. To express these facts we make a special formalized language. When the collection grows we add some inference rules and thus some axioms to compress the knowledge. The next step is to generalize these rules to all expressions in the formalized language. For these rules we introduce some conclusion procedure. In such a way we make small theories for restricted fields of the knowledge. The most important procedure is the mixing of these partial knowledge systems. In that step we glue the theories together and eliminate the contradictions. The last operation is the most complicated one and some simplifying procedures are proposed.
Resumo:
In 1996, the authors of the Canadian Royal Commission on Aboriginal Peoples concluded Canadian educational policy had been based on the false assumption of the superiority of European worldviews. The report authors recommended the transformation of curriculum and schools to recognize that European knowledge was not universal. Aboriginal researcher Battiste believes the current system of Canadian education causes Aboriginal children to face cognitive imperialism and cognitive assimilation and that this current practice of cultural racism in Canada makes educational institutions a hostile environment for Aboriginal learners. In order to counter this cultural racism, Battiste calls for the decolonization of education. In 2005, the president of Northwest Community College (NWCC), publicly committed to decolonizing the college in order to address the continuing disparity in educational attainment between Aboriginal and non-Aboriginal learners. Upon the president’s departure in 2010, the employees of NWCC were left to define for themselves the meaning of decolonization. This qualitative study was designed to build a NWCC definition of colonization and decolonization by collecting researcher observations, nine weeks of participant blog postings, and pre and post blog Word survey responses drawn from a purposeful sample of six Aboriginal and six non-Aboriginal NWCC employees selected from staff, instructor and administrator employee groups. The findings revealed NWCC employees held multiple definitions of colonization and decolonization which did not vary between employee groups, or based on participant gender; however, differences were found based on whether the participants were Aboriginal or non-Aboriginal. Both Aboriginal and non-Aboriginal participants thought decolonization was a worthy goal for the college. Aboriginal participants felt hopeful that decolonization would happen in the future and thought decolonization had to do with moving forward to a time when they would be valued, respected, empowered, unashamed, safe, and viewed as equal to non-Aboriginals. Non-Aboriginal participants were unsure if decolonization was possible because it would require going back in time to restore the Aboriginal way of life. When non-Aboriginal participants felt their thoughts were not being valued or they were being associated with colonialism, they felt angry and guarded and were uncomfortable with Aboriginal participants expressing anger towards Colonizers.
Resumo:
In the mega-diverse country Peru, a resource intensive development model collides with the interest of conserving biodiversity. Peruvian biodiversity experts have developed different lines of argumentation as to how to integrate conservation into the sustainable development of their country. Applying grounded theory, I define five groups of conservation narratives based on the analysis of 72 qualitative interviews with experts working in areas of biodiversity conservation. I have labeled them: biodiversity protectionists, biodiversity traditionalists, biodiversity localists, biodiversity pragmatists, and biodiversity capitalists. These groups are each discussed in connection with what they have to say about biodiversity in relation to human life, valuation and knowledge systems, participation and leadership, substitutability of natural capital, and its predominant political strategy. In a second step, a comparative analysis of the dominant and diverging political perspectives is made. I argue that by deconstructing underlying premises and ideologies, common ground and possible opportunities for collaboration can be identified. Moreover, although the presented results can serve as a discussion scaffold to organize conservation debates in Peru, this example demonstrates how the terms biodiversity and sustainability are operationalized in conservation narratives.
Resumo:
Esta ponencia se basa en el proyecto CENTRO DE CONOCIMIENTO PARA GRUPOS INDÍGENAS CENTROAMERICANOS (GEIC), coordinado por la Escuela de Bibliotecología, Documentación e Información (EBDI) de la Universidad Nacional de Costa Rica, (UNA), su objetivo es “proponer la construcción de espacios de información para la población indígena, a partir del proyecto CENTRO DE CONOCIMIENTO PARA GRUPOS INDÍGENAS CENTROAMERICANOS y con esta ponencia se pretende presentar las lecciones aprendidas durante 2003-2007, años de recolección y análisis de datos, de establecimiento de relaciones, de coordinar actividades y ejecutar acciones tendientes a garantizar el cumplimiento al derecho de acceso a la información de las poblaciones indígenas costarricenses.El objetivo de GEIC fue crear un Centro de Conocimiento sobre/de Grupos Étnicos Indígenas Centroamericanos que sirviera de eje central para la consolidación del desarrollo de procesos tendientes a fortalecer la temática y el desarrollo de los grupos étnicos indígenas centroamericanos.El proyecto inició en el 2003, pero al no contar con personal permanente, se interrumpe su proceso hasta enero de 2004, con el desarrollo de la primera etapa, que comprende implementar cinco objetivos en Costa Rica. En posteriores etapas se espera integrar a los demás países centroamericanos.La población indígena costarricense corresponde a 63,876 personas, representando el 1.6% de la población nacional; existen ocho grupos socioculturales indígenas distintos, Cabécares, Bribris, Ngäbe, Térrabas, Borucas, Huetares, Malekus y Chorotegas, habitan en 24 territorios y hablan en 6 idiomas indígenas. A ellos se deben sumar poblaciones indígenas migratorias como los Miskitos de Nicaragua y Ngäbes de Panamá que trabajan en la producción agrícola en distintas zonas del país. El Proyecto GEIC, buscó la ejecución de la propuesta de creación de una unidad de información especializada en asuntos indígenas, en Shiroles Talamanca, para esto se realizó una investigación diagnóstica en la zona, determinando los recursos disponibles: tecnológicos, humanos, económicos y educacionales. En la actualidad se está gestionando y buscando financiamiento en instituciones locales, nacionales, e internacionales para cubrir los costos, aspecto que resulta un poco difícil por la falta de valoración de la importancia de la información en las comunidades indígenas.Otra actividad paralela a ésta es la construcción de un portal disponible en la dirección: http://www.una.ac.cr/bibliotecología/proyectogeic, y que fue avalado por las comunidades indígenas, con la participación de los y las protagonistas. En esa oportunidad se les explicó cada sección del mismo y se les solicitó sus observaciones y comentarios al respecto para involucrarlos(as) y se sintieran apropiados(as) de la misma.
Resumo:
In database applications, access control security layers are mostly developed from tools provided by vendors of database management systems and deployed in the same servers containing the data to be protected. This solution conveys several drawbacks. Among them we emphasize: 1) if policies are complex, their enforcement can lead to performance decay of database servers; 2) when modifications in the established policies implies modifications in the business logic (usually deployed at the client-side), there is no other possibility than modify the business logic in advance and, finally, 3) malicious users can issue CRUD expressions systematically against the DBMS expecting to identify any security gap. In order to overcome these drawbacks, in this paper we propose an access control stack characterized by: most of the mechanisms are deployed at the client-side; whenever security policies evolve, the security mechanisms are automatically updated at runtime and, finally, client-side applications do not handle CRUD expressions directly. We also present an implementation of the proposed stack to prove its feasibility. This paper presents a new approach to enforce access control in database applications, this way expecting to contribute positively to the state of the art in the field.
Resumo:
To store, update and retrieve data from database management systems (DBMS), software architects use tools, like call-level interfaces (CLI), which provide standard functionalities to interact with DBMS. However, the emerging of NoSQL paradigm, and particularly new NoSQL DBMS providers, lead to situations where some of the standard functionalities provided by CLI are not supported, very often due to their distance from the relational model or due to design constraints. As such, when a system architect needs to evolve, namely from a relational DBMS to a NoSQL DBMS, he must overcome the difficulties conveyed by the features not provided by NoSQL DBMS. Choosing the wrong NoSQL DBMS risks major issues with components requesting non-supported features. This paper focuses on how to deploy features that are not so commonly supported by NoSQL DBMS (like Stored Procedures, Transactions, Save Points and interactions with local memory structures) by implementing them in standard CLI.
Resumo:
A picture tells a thousand words. We all know that. Then why are our development tools showing mainly text with so much obstinacy? Even when visualizations do make it into our tools, they typically do not make it past the periphery. Something is deeply wrong. We argue that visualizations must become pervasive in software development, and to accommodate this goal, the integrated development environments must change significantly.