7,185 Hits in 13.8 sec

The 2nd Workshop on Hacking and Making at Time-Bounded Events [article]

Ei Pa Pa Pe-Than, Alexander Nolte
2019 arXiv   pre-print
Such time-bounded hackathon-style events have become increasingly popular across different domains in recent years.  ...  In hackathons, small teams work together over a specified period of time to complete a project of interest.  ...  This work was supported in part by Washington Research Foundation Fund for Innovation in Data-Intensive Discovery and by the Moore/Sloan Data Science Environments Project at the University of Washington  ... 
arXiv:1901.02710v1 fatcat:mhc5thamyjg7lj6ntusunaakzi

Traps, events, emulation, and enforcement

Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, Sean W. Smith
2008 Proceedings of the 1st ACM workshop on Virtual machine security - VMSec '08  
We question current trends that attempt to leverage virtualization techniques to achieve security goals.  ...  These two roles (security reference monitor and resource emulator) are currently conflated within the context of virtual machines and VMMs.  ...  Acknowledgments We are grateful to many fellow researchers and our reviewers for providing feedback and suggestions.  ... 
doi:10.1145/1456482.1456491 dblp:conf/ccs/BratusLRS08 fatcat:dtq3yexedbcnxptzi74kjldyii

Challenges in Forecasting Malicious Events from Incomplete Data [article]

Nazgol Tavabi, Andrés Abeliuk, Negar Mokhberian, Jeremy Abramson, Kristina Lerman
2020 arXiv   pre-print
This could be caused by the fact that the resulting time series also depends on the filtering process in addition to all the different factors that the original time series depended on.  ...  Researchers have attempted to combine external data -- ranging from vulnerability disclosures to discussions on Twitter and the darkweb -- with machine learning algorithms to learn indicators of impending  ...  Acknowledgements This work was supported by the Office of the Director of National Intelligence (ODNI) and the Intelligence Advanced Research Projects Activity (IARPA) via the Air Force Research Laboratory  ... 
arXiv:2004.04597v1 fatcat:k3bakwcd6fdu7kp2kzx3jjn3ue

Uncertainty Analysis for the Keyword System of Web Events

Junyu Xuan, Xiangfeng Luo, Guangquan Zhang, Jie Lu, Zheng Xu
2016 IEEE Transactions on Systems, Man & Cybernetics. Systems  
At the same time, there are different levels of semantic uncertainty underlying the amount of webpages for a web event, such as recapitulative information and detailed information.  ...  In this paper, we propose a framework to identify the different underlying levels of semantic uncertainty in terms of web events, and then utilize these for webpage recommendations.  ...  In Section II, we do Step 1 in Fig. 2 which is to mine and analyze the flat KALN. The following two sections are designed for Step 2 in Fig. 2 .  ... 
doi:10.1109/tsmc.2015.2470645 fatcat:aagjyntyjrb4tdbzdia5c2obnu

User interfaces and discrete event simulation models

Jasna Kuljis
1994 Simulation Practice and Theory  
Angell for his incomparable guidance and reassuring support, and for giving me a chance to pursue this research in the belief that I will get there in the end.  ...  To my parents and sisters who always believed in me and always supported me in any way they could. To Alistair Gardiner for helping me to capture graphics from a screen.  ...  The trend in current computer applications is toward asynchronous, multi-threaded dialogue (event-based dialogue) where many tasks (threads) are available to the end-user at one time, and the sequencing  ... 
doi:10.1016/0928-4869(94)90011-6 fatcat:w5rz6nynwfcl3g6tzpw2l4oqc4

Sequences in popular cinema generate inconsistent event segmentation

James E. Cutting
2019 Attention, Perception & Psychophysics  
The results also show that viewer judgments of event boundaries diminish in the presence of music and of shorter and less modulated shot durations.  ...  Each film was inspected for narrative shift patterns-that is, changes in location, character, or time-across shots.  ...  According to event segmentation theory , the event perceiver observes the ongoing activity and tacitly makes predictions about what will happen next.  ... 
doi:10.3758/s13414-019-01757-w pmid:31093924 pmcid:PMC6675763 fatcat:vr4vqza3zzgqdjh22lzqbrpc3i

Can We Predict a Riot? Disruptive Event Detection Using Twitter

Nasser Alsaedi, Pete Burnap, Omer Rana
2017 ACM Transactions on Internet Technology  
In these highly interactive systems the general public are able to post real-time reactions to "real world" events -thereby acting as social sensors of terrestrial activity.  ...  In recent years, there has been increased interest in real-world event detection using publicly accessible data made available through Internet technology such as Twitter, Facebook and YouTube.  ...  In section 5 we present and analyze several features, namely temporal, spatial and textual features. Section 6 presents our  ... 
doi:10.1145/2996183 fatcat:3kp7gzu47fcjpmkxb6iz4ton6a

False memories for dissonance inducing events

Dario N. Rodriguez, Deryn Strange
2014 Memory  
Five of these interviewees then participated as co-researchers in a Youth Design and Research Collective (YDRC) to analyze interview findings through the collaborative design of an open source social network  ...  Considering my work with the YDRC I argue that involving youth in designing information ecologies fosters critical capacities for participating in acts of research and knowledge production.  ...  According to Latour (1999) , there is a "dialectic of gain and loss" (p. 70) in the production of data; at each information-producing step of the research process some context is exchanged for greater  ... 
doi:10.1080/09658211.2014.881501 pmid:25625288 fatcat:4vsg65cndzhsdlfdt7qbb7q2ti

A proposed Framework for Studying the Impact of Cybersecurity on Accounting Information to Increase Trust in The Financial Reports in the Context of Industry 4.0: An Event, Impact and Response Approach

Mona Mohammed Daoud, Asmaa AbdElmonem Serag
2022 المجلة العملیة التجارة والتمویل  
These breaches have implications for business enterprises as they may result in lower performance and market value, increased operational risks, lost information and significant employee time spent ensuring  ...  This framework aims to examine how cybersecurity impacts cybersecurity events or threats, and how these events impact organisations and responses by various parties to different events.  ...  Cybersecurity incidents and breaches can occur at any time.  ... 
doi:10.21608/caf.2022.251730 fatcat:byig3xlfmrablfz3uacp7mbkmy

Hacking, Making, and Prototyping for Social Change [chapter]

Ingrid Mulder, Péter Kun
2018 The Hackable City  
In this chapter, we explore how designerly approaches, such as hacking, making, and prototyping, can empower emerging city-makers to trigger a broader change and transformation process.  ...  A patchable plug-in platform might enable emerging city-makers to create value for the city and for society.  ...  In the current work, we view this increasing complexity in citymaking as a collaborative design challenge and explore how designerly approaches and co-creative activities, such as hacking, making, and  ... 
doi:10.1007/978-981-13-2694-3_12 fatcat:3p2t3wri3vcp7iunkf3ih3wuvq

7. Co-production and Co-creation [chapter]

2020 Service Encounters in Tourism, Events and Hospitality  
., Kamazawa, S. and Hori, T. (2014  ...  Next steps in research should be to broaden the scope of the research and allow more systematic comparisons between countries, approaches and types of students, to learn more about the institutional determinants  ...  At the same time, more empirical research is required on effective pathways to outcomes.  ... 
doi:10.21832/9781845417284-012 fatcat:umiq4ybtgbabrb3v72gwhdgerm

Exploring the Next Wave of Blockchain and Distributed Ledger Technology: The Overlooked Potential of Scenario Analysis

Horst Treiblmaier
2021 Future Internet  
At present, it is not clear how current trends will evolve, with technical evolution, legislation, and public policy being three contingency factors that make ongoing disruptive transformations particularly  ...  The properties of distributed ledgers allow the creation of immutable data structures that facilitate shared access in real time and enable a plethora of innovative applications.  ...  Funding: This research received no external funding. Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable.  ... 
doi:10.3390/fi13070183 fatcat:2bdtjmj7avhe5p2kh2am3cj4ze

Social Media, Financial Algorithms and the Hack Crash

Tero Karppi, Kate Crawford
2015 Theory, Culture and Society. Explorations in Critical Social Science  
Kate Crawford is a Visiting Professor at MIT's Center for Civic Media, a Principal Researcher at Microsoft Research, and a Senior Fellow at NYU's Information Law Institute.  ...  But it is also an exemplar of the current tendency to try to model and understand the desires of people and meaning of events in the world by mining social media data.  ... 
doi:10.1177/0263276415583139 fatcat:ygva2iokivajzobhi5kmkykvle

Seismic hazard in low slip rate crustal faults, estimating the characteristic event and the most hazardous zone: study case San Ramón Fault, in southern Andes

Nicolás P. Estay, Gonzalo Yáñez, Sebastien Carretier, Elias Lira, José Maringue
2016 Natural Hazards and Earth System Sciences  
In order to characterize the fault behavior and its effects, we propose three different already-developed time-integration methodologies to define the most likely scenarios of rupture, and then to quantify  ...  , and in many cases, also of geological evidences.  ...  Roquer, and all of the emerging Geosciences group at PUC.  ... 
doi:10.5194/nhess-16-2511-2016 fatcat:mt24zewievf6rgoxttgftrpid4

Methods for Studying the Information Systems Future [chapter]

Paul Gray, Anat Hovav
2011 IFIP Advances in Information and Communication Technology  
This paper presents and explains three proven research methods for studying the IS future and describes the role of Futures Research methods as a tool for academic research.  ...  Keywords: Modeling the future, environmental scanning, Delphi, scenarios, role of futures in academic research.  ...  ., Glenn and Gordon 2009) is the next step of sophistication beyond Delphi. Delphi assumes events and trends are mutually independent and all other things are equal (i.e., ceteris paribus).  ... 
doi:10.1007/978-3-642-21364-9_21 fatcat:ew6rt7glpbcjjagifhaxuvguly
« Previous Showing results 1 — 15 out of 7,185 results