909 resultados para computer-mediated communications
Resumo:
Multiscale hybrid simulations that bridge the nine-order-of-magnitude spatial gap between the macroscopic plasma nanotools and microscopic surface processes on nanostructured solids are described. Two specific examples of carbon nanotip-like and semiconductor quantum dot nanopatterns are considered. These simulations are instrumental in developing physical principles of nanoscale assembly processes on solid surfaces exposed to low-temperature plasmas.
Resumo:
The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites. While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.
Resumo:
This research showed that online counselling has the potential to increase the help-seeking of secondary school students - especially those who suffer from high levels of psychological distress. An investigation of why school counsellors are currently reluctant to provide an online counselling service identified a number of barriers to implementing such a potentially vital service. Response to focus groups and surveys completed by students and school counsellors indicated that more distressed students prefer to use online counselling and they would use it for sensitive topics. School counsellors remain concerned about effectiveness, ethical, legal and privacy issues as well as potential misuse of the service. Recommendations for implementation are made.
Resumo:
The Internet Engineering Task Force (IETF) is currently developing the next version of the Transport Layer Security (TLS) protocol, version 1.3. The transparency of this standardization process allows comprehensive cryptographic analysis of the protocols prior to adoption, whereas previous TLS versions have been scrutinized in the cryptographic literature only after standardization. This is even more important as there are two related, yet slightly different, candidates in discussion for TLS 1.3, called draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based. We give a cryptographic analysis of the primary ephemeral Diffie–Hellman-based handshake protocol, which authenticates parties and establishes encryption keys, of both TLS 1.3 candidates. We show that both candidate handshakes achieve the main goal of providing secure authenticated key exchange according to an augmented multi-stage version of the Bellare–Rogaway model. Such a multi-stage approach is convenient for analyzing the design of the candidates, as they establish multiple session keys during the exchange. An important step in our analysis is to consider compositional security guarantees. We show that, since our multi-stage key exchange security notion is composable with arbitrary symmetric-key protocols, the use of session keys in the record layer protocol is safe. Moreover, since we can view the abbreviated TLS resumption procedure also as a symmetric-key protocol, our compositional analysis allows us to directly conclude security of the combined handshake with session resumption. We include a discussion on several design characteristics of the TLS 1.3 drafts based on the observations in our analysis.
Resumo:
The objective of the study was to explore the dimensions of group identity in the guilds of World of Warcraft. Previous research shows that social interaction has an important role in playing games for many players. Social identities are an important aspect of self-concept and since group related cues are more salient than personal clues in computer-mediated communication, the social gaming experience was approached through group identity. In the study a new scale will be developed to measure the group identity in games. Secondary goal is to study how different guild attributes affect the group identity and third goal is to explore the connection between group identity and gaming experience and amount of play. Subjects were 1203 guild members and 106 players not in a guild. The data was gathered by an Internet survey which measured group identity with nine scales, gaming experience with three scales and guild attributes with four scales. Also various background data was gathered. The construct of group identity was analyzed with explorative factor analysis. The typical experiences of group identity was analyzed with cluster analysis and effects of guild attributes with multivariate analysis of covariance. As a result of the study a new scale was developed which measured group identity on six dimensions: self-stereotyping, public and private evaluation, importance, interconnection of self and others and awareness of content. Group identity was experienced strongest in elder middle-sized guilds that had formal rules and that emphasized social interaction. The players with strong group identity had more positive gaming experience and played World of Warcraft more per week than the players who were not in a guild or identified to guild weakly. This result encourages game developers to produce environments that enhance group identity as it seems to increase the enjoyment in games. As a whole this study proposes that group identity in guilds is constructed from the same elements as in traditional groups. If this is truly the case, guild membership may have similar positive effects on individual’s mental well-being as traditional positively evaluated group memberships have.
Resumo:
The aim of the study was to analyze and facilitate collaborative design in a virtual learning environment (VLE). Discussions of virtual design in design education have typically focused on technological or communication issues, not on pedagogical issues. Yet in order to facilitate collaborative design, it is also necessary to address the pedagogical issues related to the virtual design process. In this study, the progressive inquiry model of collaborative designing was used to give a structural level of facilitation to students working in the VLE. According to this model, all aspects of inquiry, such as creating the design context, constructing a design idea, evaluating the idea, and searching for new information, can be shared in a design community. The study consists of three design projects: 1) designing clothes for premature babies, 2) designing conference bags for an international conference, and 3) designing tactile books for visually impaired children. These design projects constituted a continuum of design experiments, each of which highlighted certain perspectives on collaborative designing. The design experiments were organized so that the participants worked in design teams, both face-to-face and virtually. The first design experiment focused on peer collaboration among textile teacher students in the VLE. The second design experiment took into consideration end-users needs by using a participatory design approach. The third design experiment intensified computer-supported collaboration between students and domain experts. The virtual learning environments, in these design experiments, were designed to support knowledge-building pedagogy and progressive inquiry learning. These environments enabled a detailed recording of all computer-mediated interactions and data related to virtual designing. The data analysis was based on qualitative content analysis of design statements in the VLE. This study indicated four crucial issues concerning collaborative design in the VLE in craft and design education. Firstly, using the collaborative design process in craft and design education gives rise to special challenges of building learning communities, creating appropriate design tasks for them, and providing tools for collaborative activities. Secondly, the progressive inquiry model of collaborative designing can be used as a scaffold support for design thinking and for reflection on the design process. Thirdly, participation and distributed expertise can be facilitated by considering the key stakeholders who are related to the design task or design context, and getting them to participate in virtual designing. Fourthly, in the collaborative design process, it is important that team members create and improve visual and technical ideas together, not just agree or disagree about proposed ideas. Therefore, viewing the VLE as a medium for collaborative construction of the design objects appears crucial in order to understand and facilitate the complex processes in collaborative designing.
Resumo:
Tutkielma käsittelee topiikin vaihdon merkitsemistä asynkronisessa verkkokeskustelussa. Aineistona on neljäkymmentäkolme keskusteluketjua pelit.fi-verkkosivustolta. Työ kuuluu sähköisen viestinnän tutkimuksen (computer-mediated communication, CMC) alaan. Työssä sovelletaan keskustelunanalyysin metodia kirjoitetun verkkoaineiston analyysiin ja pohditaan aiemman tutkimuksen pohjalta ongelmia, joita verkkokeskusteluaineisto analyysimetodin käytölle tuo. Lisäksi tutkielmassa käsitellään asynkronisen verkkokeskustelua tilana ja paikkana George Lakoffin metaforateoria pohjalta. Työn keskeinen tulos on niin kutsuttu topikalisoijamuotti. Tällä tarkoitetaan kielellistä kehystä metadiskursiiviselle jaksolle, jolla verkkokeskustelijat kehystävät viestissään tapahtuvaa topiikin vaihtumista. Topikalisoija on siis metadiskursiivinen lukuohje muille keskustelijoille. Työssä esitellään topikalisoijamuottiin kuuluvia osia ja kuvaus kunkin osan rakenteesta. Topikalisoijamuottiin kuuluu yksi pakollinen osa, joka viittaa keskustelussa joko eteen- tai taaksepäin. Pakollisen osan lisäksi topikalisoijaan voi kuulua kahdesta kolmeen valinnaista osaa, joilla kirjoittaja voi tarjota muille lukijoille syyn, miksi hän vaihtaa topiikkia tai miten viesti liittyy muuhun käynnissä olevaan keskusteluun. Työssä analysoidaan lisäksi topikalisoijamuotin lähi-ilmiöitä eli muita metadiskursiivisia jaksoja, joilla kirjoittaja voi kehystää topiikkia vaihtavaa puhetoimintoaan. Tutkielmassa analysoidaan myös verkkokeskustelun tila- ja paikkametaforia. Osoittautuu, että abstraktit ilmiöt kuten verkkosivusto, keskusteluketju ja topiikki käsitteistetään jossain määrin väylä- ja säiliömetaforien kautta rajatuiksi tiloiksi, joihin käyttäjät, viestit ja puheenaiheet sijoittuvat.
Resumo:
At the the heart of this study can be seen the dual concern of how the nation is represented as a categorical entity and how this is put to use in everyday social interactions.This can be seen as a reaction to the general approach to categorisation and identity functions that tend to be reified and essentialized within the social sciences. The empirical focus of this study is the Isle of Man, a crown dependency situated geographically central within the British Isles while remaining political outside the United Kingdom. The choice of this site was chosen explicitly as ‘notions of nation’ expressed on the island can be seen as being contested and ephemerally unstable. To get at these ‘notions of nation’ is was necessary to choose specific theoretical tools that were able to capture the wider cultural and representational domain while being capable of addressing the nuanced and functional aspects of interaction. As such, the main theoretical perspective used within this study was that of critical discursive psychology which incorporates the specific theoretical tools interpretative repertoires, ideological dilemmas and subject positions. To supplement these tools, a discursive approach to place was taken in tandem to address the form and function of place attached to nationhood. Two methods of data collection were utilized, that of computer mediated communication and acquaintance interviews. From the data a number of interpretative repertoires were proposed, namely being, essential rights, economic worth, heritage claims, conflict orientation, people-as-nation and place-as-nation. Attached to such interpretative repertoires were the ideological dilemmas region vs. country, people vs. place and individualism vs. collectivism. The subject positions found are much more difficult to condense, but the most significant ones were gender, age and parentage. The final focus of the study, that of place, was shown to be more than just an unreflected on ‘container’ of people but was significant in terms of the rhetorical construction of such places for how people saw themselves and the discursive function of the particular interaction. As such, certain forms of place construction included size, community, temporal, economic, safety, political and recognition. A number of conclusions were drawn from the above which included, that when looking at nation categories we should take into account the specific meanings that people attach to such concepts and to be aware of the particular uses they are put to in interaction. Also, that it is impossible to separate concepts neatly, but it is necessary to be aware of the intersection where concepts cross, and clash, when looking at nationhood.
Resumo:
Electronic, magnetic, and structural properties of graphene flakes depend sensitively upon the type of edge atoms. We present a simple software tool for determining the type of edge atoms in a honeycomb lattice. The algorithm is based on nearest neighbor counting. Whether an edge atom is of armchair or zigzag type is decided by the unique pattern of its nearest neighbors. Particular attention is paid to the practical aspects of using the tool, as additional features such as extracting out the edges from the lattice could help in analyzing images from transmission microscopy or other experimental probes. Ultimately, the tool in combination with density-functional theory or tight-binding method can also be helpful in correlating the properties of graphene flakes with the different armchair-to-zigzag ratios. Program summary Program title: edgecount Catalogue identifier: AEIA_v1_0 Program summary URL: http://cpc.cs.qub.ac.uk/summaries/AEIA_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 66685 No. of bytes in distributed program, including test data, etc.: 485 381 Distribution format: tar.gz Programming language: FORTRAN 90/95 Computer: Most UNIX-based platforms Operating system: Linux, Mac OS Classification: 16.1, 7.8 Nature of problem: Detection and classification of edge atoms in a finite patch of honeycomb lattice. Solution method: Build nearest neighbor (NN) list; assign types to edge atoms on the basis of their NN pattern. Running time: Typically similar to second(s) for all examples. (C) 2010 Elsevier B.V. All rights reserved.
Resumo:
The SUSY Les Houches Accord (SLHA) 2 extended the first SLHA to include various generalisations of the Minimal Supersymmetric Standard Model (MSSM) as well as its simplest next-to-minimal version. Here, we propose further extensions to it, to include the most general and well-established see-saw descriptions (types I/II/III, inverse, and linear) in both an effective and a simple gauged extension of the MSSM framework. In addition, we generalise the PDG numbering scheme to reflect the properties of the particles. (c) 2012 Elsevier B.V. All rights reserved.
Resumo:
Accurate supersymmetric spectra are required to confront data from direct and indirect searches of supersymmetry. SuSeFLAV is a numerical tool capable of computing supersymmetric spectra precisely for various supersymmetric breaking scenarios applicable even in the presence of flavor violation. The program solves MSSM RGEs with complete 3 x 3 flavor mixing at 2-loop level and one loop finite threshold corrections to all MSSM parameters by incorporating radiative electroweak symmetry breaking conditions. The program also incorporates the Type-I seesaw mechanism with three massive right handed neutrinos at user defined mass scales and mixing. It also computes branching ratios of flavor violating processes such as l(j) -> l(i)gamma, l(j) -> 3 l(i), b -> s gamma and supersymmetric contributions to flavor conserving quantities such as (g(mu) - 2). A large choice of executables suitable for various operations of the program are provided. Program summary Program title: SuSeFLAV Catalogue identifier: AEOD_v1_0 Program summary URL: http://cpc.cs.qub.ac.uk/summaries/AEOD_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: GNU General Public License No. of lines in distributed program, including test data, etc.: 76552 No. of bytes in distributed program, including test data, etc.: 582787 Distribution format: tar.gz Programming language: Fortran 95. Computer: Personal Computer, Work-Station. Operating system: Linux, Unix. Classification: 11.6. Nature of problem: Determination of masses and mixing of supersymmetric particles within the context of MSSM with conserved R-parity with and without the presence of Type-I seesaw. Inter-generational mixing is considered while calculating the mass spectrum. Supersymmetry breaking parameters are taken as inputs at a high scale specified by the mechanism of supersymmetry breaking. RG equations including full inter-generational mixing are then used to evolve these parameters up to the electroweak breaking scale. The low energy supersymmetric spectrum is calculated at the scale where successful radiative electroweak symmetry breaking occurs. At weak scale standard model fermion masses, gauge couplings are determined including the supersymmetric radiative corrections. Once the spectrum is computed, the program proceeds to various lepton flavor violating observables (e.g., BR(mu -> e gamma), BR(tau -> mu gamma) etc.) at the weak scale. Solution method: Two loop RGEs with full 3 x 3 flavor mixing for all supersymmetry breaking parameters are used to compute the low energy supersymmetric mass spectrum. An adaptive step size Runge-Kutta method is used to solve the RGEs numerically between the high scale and the electroweak breaking scale. Iterative procedure is employed to get the consistent radiative electroweak symmetry breaking condition. The masses of the supersymmetric particles are computed at 1-loop order. The third generation SM particles and the gauge couplings are evaluated at the 1-loop order including supersymmetric corrections. A further iteration of the full program is employed such that the SM masses and couplings are consistent with the supersymmetric particle spectrum. Additional comments: Several executables are presented for the user. Running time: 0.2 s on a Intel(R) Core(TM) i5 CPU 650 with 3.20 GHz. (c) 2012 Elsevier B.V. All rights reserved.
Resumo:
In this paper we present a massively parallel open source solver for Richards equation, named the RichardsFOAM solver. This solver has been developed in the framework of the open source generalist computational fluid dynamics tool box OpenFOAM (R) and is capable to deal with large scale problems in both space and time. The source code for RichardsFOAM may be downloaded from the CPC program library website. It exhibits good parallel performances (up to similar to 90% parallel efficiency with 1024 processors both in strong and weak scaling), and the conditions required for obtaining such performances are analysed and discussed. These performances enable the mechanistic modelling of water fluxes at the scale of experimental watersheds (up to few square kilometres of surface area), and on time scales of decades to a century. Such a solver can be useful in various applications, such as environmental engineering for long term transport of pollutants in soils, water engineering for assessing the impact of land settlement on water resources, or in the study of weathering processes on the watersheds. (C) 2014 Elsevier B.V. All rights reserved.
Resumo:
Technological developments over the last thirty years increasingly shaped the means by which we recruit, select and appraise employees. Today, technology supports more flexible and geographically dispersed working modes: From teleworkers, to virtual workers, to e-interns (also known as virtual interns). The current article describes how developments in e-HRM and changes in employment forms contribute to the development and increasing popularity of e-internships (better known as virtual internships) amongst small and medium-sized enterprises. In this paper, we reflect on the rise of e-internships across different countries and relate this to e-HRM and technological advances. We explore the opportunities and challenges. These include developing effective global talent and knowledge management practices, managing diversity as well as intellectual and social capital. We furthermore link the employment of e-internship practices to strategic organizational goals and learning. In the final section, we also critically reflect on the high investment required for e-internships to succeed. The discussion on e-internships is set in the literature on e-HRM, virtual teams and knowledge management, which is furthermore supported by interviews conducted with e-interns or internship managers. Keywords: e-internships, virtual internships, computer-mediated communication
Resumo:
Although French is a Romance language descendant ffrom the Latin, there is of course some influence of other languages on it. English is perhaps the most important source of loan-words for the present French language. Our article is focused on new forms of written communication, mainly computer-mediated communication (CMC). The main aim of this article is to analyze the loan-words, especially the anglicisms that are used by chatters in various French chats. After examining the motivations of loan, the article studies the frequency of anglicisms in three chats and observes their grammatical adaptation in the context of CMC. A huge richness of anglicisms is illustrated by concrete examples taken from our corpus.