982 resultados para special collections


Relevância:

20.00% 20.00%

Publicador:

Resumo:

With this special issue, we draw attention to the growing and diverse field of HCI researchers exploring the interstices of food, technology and everyday practices. This special issue builds on the CHI workshop of the same name (Comber et al., 2012a), where we brought together the community of researchers that take food as a point from which to understand people and design technology. The workshop aimed to ‘to attend to the practical and theoretical difficulties in designing for human–food interactions in everyday life’ identifying four thematic areas of food practices – health and wellbeing; sustainability; food experiences; and alternative food cultures. These practical and theoretical difficulties are evident in the papers that we present here, though the distinction between our four themes, premised by complexities of food practices, is a little less evident. Thus, in the papers that follow we explore how the social, technological, cultural and methodological intertwine in the field of human–food interaction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This special issue of the Journal of Learning Design, led by Jill Franz and Lindy Osborne, from the School of Design in the Creative Industries Faculty at the Queensland University of Technology, is grounded in Design Education. Its papers are drawn from differing fields of design: digital media, architecture, and environmental design. Each makes use of technologies in differing ways but all share the singular purpose of achieving enhanced learning outcomes from students.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis presents novel techniques for addressing the problems of continuous change and inconsistencies in large process model collections. The developed techniques treat process models as a collection of fragments and facilitate version control, standardization and automated process model discovery using fragment-based concepts. Experimental results show that the presented techniques are beneficial in consolidating large process model collections, specifically when there is a high degree of redundancy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ninety-seven percent of children who have special health care needs are cared for by their mothers. These mothers cite that their informal care work can be intrinsically rewarding, however, the role is not without substantial difficulties and consequences. We investigated differences in the health and well-being of mothers whose young children do and do not have special health care needs. Quantitative data are drawn from Growing Up in Australia: The Longitudinal Study of Australian Children. This study employs a matched-case control methodology to compare the experiences of a group of 292 mothers whose children are identified as having long term special health care needs to those mothers whose children are typically developing at two time points; Wave 1 (2004) and Wave 3 (2008). The findings support previous research that mothers of children with special health care needs have poorer general health and mental health than mothers whose children do not have special needs. Mothers of children with special health care needs also perceived life as more difficult. Longitudinally, this study also shows that maternal well-being remains relatively stable during the years when children are transitioning to formal schooling. Implications for policy makers, practitioners and early childhood professionals are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This special issue of the International Journal of Technology Policy and Law considers recent developments in the reconfiguration of communication regulation to account for the impact of media convergence. It is readily apparent that media worldwide are going through a series of transformations, associated with the rise of the internet, user-created content and social media. The papers in the collection draw upon legal and policy developments in Australia, the European union and South Korea, and consider such issues as public participation in media policy and regulation, civic media governance for online platforms, the future copyright laws, the roles and responsibilities of internet intermediaries, and regulatory frameworks for internet protocol television (IPTV).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

More children are now being diagnosed with chromosome abnormalities. Some chromosome disorder syndromes are relatively well known; while others are so rare that there is only limited evidence about their likely impact on learning and development. For educators, a basic level of knowledge about chromosome abnormalities is important for understanding the literature and communicating with families and professionals. This paper describes chromosomes, and the numerical and structural anomalies that can occur, usually spontaneously during early cell division. Distinctive features of various chromosome syndromes are summarised before a discussion of the rare chromosome disorders that are labelled, not with a syndrome name, but simply by a description of the chromosome number, size and shape. Because of the potential within-group variability that characterises syndromes, and the scarcity of literature about the rare chromosome disorders, expectations for learning and development of individual students need to be based on the range of possible outcomes that may be achievable.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Automated process discovery techniques aim at extracting process models from information system logs. Existing techniques in this space are effective when applied to relatively small or regular logs, but generate spaghetti-like and sometimes inaccurate models when confronted to logs with high variability. In previous work, trace clustering has been applied in an attempt to reduce the size and complexity of automatically discovered process models. The idea is to split the log into clusters and to discover one model per cluster. This leads to a collection of process models – each one representing a variant of the business process – as opposed to an all-encompassing model. Still, models produced in this way may exhibit unacceptably high complexity and low fitness. In this setting, this paper presents a two-way divide-and-conquer process discovery technique, wherein the discovered process models are split on the one hand by variants and on the other hand hierarchically using subprocess extraction. Splitting is performed in a controlled manner in order to achieve user-defined complexity or fitness thresholds. Experiments on real-life logs show that the technique produces collections of models substantially smaller than those extracted by applying existing trace clustering techniques, while allowing the user to control the fitness of the resulting models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In his sweeping survey of the Australian study of international relations, Martin Indyk1 claimed that ‘a common set of assumptions tends to underpin the work of almost all Australian scholars in the discipline’. If that assertion could have been plausibly extended to the whole region one generation ago, it certainly cannot now. The International Relations scholarship emanating from the Oceanic region regales in a diversity of theoretical, methodological and ethical assumptions. This diversity certainly emerged before the first Oceanic Conference on International Studies (OCIS) was convened in Canberra in 2004, however, subsequent conferences in Melbourne (2006) and Brisbane (2008) have galvanised and enriched that diversity. The state of the discipline in the region is as strong and healthy now as it has ever been, as is its integration into the global discipline, something we believe is reflected in the contributions collected in this Special Issue of Global Change, Peace and Security....

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a method, based on polychotomous discrete choice methods, to impute a continuous measure of income when only a bracketed measure of income is available and for only a subset of the obsevations. The method is shown to perform well with CP5 data. © 1991.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This special issue of the Journal of Field Robotics focuses on low altitude flight of UAVs with a particular emphasis on fully implemented systems that were tested in relevant environments or deployed in regular operations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Locally and globally, guiding children’s social and emotional development is no longer optional for educators. Research undertaken over the last 20 years provides compelling evidence that early and ongoing development of socio-emotional skills contributes to an individual’s overall health, wellbeing and competence throughout life. Moreover, competence in this domain is now recognised as fundamental to school readiness, school adjustment and academic achievement. As a consequence, social and emotional learning (SEL) is an important theme in current educational policy, curriculum frameworks and classroom practice. This chapter focuses on a particular group of vulnerable learners – children with special needs – and highlights key strategies for educators to use in their everyday classroom practices to strengthen SEL in children from early years through to the end of primary school.