991 resultados para Clean Technologies


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Legal academics are not only teachers but also creators of knowledge. The role of an academic includes a responsibility to share this knowledge through engagement not just of their students, but also of the wider community. In addition, there is increasing emphasis on legal academics having to account for the so-called ‘impact’ of research. In selecting both the topic of their research and the mode of publication of their knowledge, legal academics act as gatekeepers. There is an increasing critique of the existing paradigm of research publication and its emphasis on the metrics of impact. This critique recognises the limitations of the commercial publication paradigm in the present context of open access and the vast array of citizen-mediated platforms for dissemination of legal knowledge and innovation. Susskind (Tomorrow’s Lawyers 2013) for example identifies expert crowd-sourced legal information as breaking down barriers to access to justice. Tracking their experience with publication of a paper on social media in legal education from the ALTA conference in 2012, the authors share an auto-ethnographic account of their insights into the potential for both impact and engagement of a diverse audience in their research. This highlights the ways in which various media can be used strategically to redefine the role of the gatekeeper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Android platform uses a permission system model to allow users and developers to regulate access to private information and system resources required by applications. Permissions have been proved to be useful for inferring behaviors and characteristics of an application. In this paper, a novel method to extract contrasting permission patterns for clean and malicious applications is proposed. Contrary to existing work, both required and used permissions were considered when discovering the patterns. We evaluated our methodology on a clean and a malware dataset, each comprising of 1227 applications. Our empirical results suggest that our permission patterns can capture key differences between clean and malicious applications, which can assist in characterizing these two types of applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This alternative event for the 2013 iConference is a combination of lightning talks, a demonstration of an assessment technology for knowledge construction in complex domains, and a hands-on exercise in using the tools discussed. The unifying logic for this presentation is that meaningful learning often involves solving challenging and complex problems that allow for multiple solution approaches and a variety of acceptable solutions. While it is important to prepare students to solve such problems, it is difficult to determine the extent to which various interventions and programs are contributing to the development of appropriate problem-solving strategies and attitudes. Simply testing domain knowledge or the ability to solve simple, single-solution problems may not provide support for improving individual student ability or relevant programs and activities. A reliable and robust methodology for assessing the relevant knowledge constructions of students engaged in solving challenging problems is needed, and that is our focus.