On social media, information spreads primarily through explicit relationships, such as follow connections, among users. However, information diffusion isn't limited to explicit relationships alone. Users may come ...
ISBN:
(纸本)9783031785474;9783031785481
On social media, information spreads primarily through explicit relationships, such as follow connections, among users. However, information diffusion isn't limited to explicit relationships alone. Users may come across posts from others via external websites or searches and subsequently repost them. The characteristics of such information diffusion, which bypass explicit social relationships, have not been thoroughly examined to date. In this paper, we examine the characteristics of nontrivial information diffusion facilitated by implicit-links among social media users. We define information diffusion that occurs without explicit social relationships as dissemination through implicit links. Utilizing three Twitter datasets, we investigate how users engage in information diffusion through implicit-links. Our findings suggest that users situated farther from the source are more inclined to involve in information diffusion via implicit-links, contrasting with those in closer proximity. This implies that implicit-links originate from sources beyond direct social connections among users. Additionally, we observe that while implicit-links have a weaker influence on diffusion size compared to explicit-links, they tend to distribute information across diverse communities distinct from the source user.
The international Bebras challenge (BC) aims to raise the students' interest in computerscience (CS) and contribute to their problem-solving and computational thinking (CT) skills development. Through solving sho...
详细信息
ISBN:
(纸本)9783031734731;9783031734748
The international Bebras challenge (BC) aims to raise the students' interest in computerscience (CS) and contribute to their problem-solving and computational thinking (CT) skills development. Through solving short conceptual tasks that are close to real-life context, students obtain the essential literacy needed to be successful in the modern world. Although the initiative has been running for about 20 years, teachers' motivation to engage with students in this challenge remains underexplored. This study employs self-determination theory as a theoretical framework and the work tasks motivation scale for teachers as an instrument. Data collected from 334 teachers across Estonia, Hungary, and Lithuania were analyzed. The results showed teachers' motivation most significantly stemmed from intrinsic motivation and identified regulation. There were no significant differences in all types of motivation between male and female teachers or teachers with different years of teaching experience. However, teachers who were more experienced in engaging in the BC demonstrated higher levels of almost all types of motivation. Mature teachers were more externally motivated than their younger colleagues. Teachers who used the Bebras tasks in their lessons had a higher level of intrinsic motivation and identified regulation than those who did not use these tasks. Teachers teaching various subjects showed different levels of identified regulation. The study provides implications for teachers, school administration, and the BC organization.
We present a non-interactive and public verifier scheme that allows one to assert the asset of a financial organization instantly and incrementally in zero knowledge with high throughput. It is enabled by the recent b...
ISBN:
(纸本)9783031692307;9783031692314
We present a non-interactive and public verifier scheme that allows one to assert the asset of a financial organization instantly and incrementally in zero knowledge with high throughput. It is enabled by the recent breakthrough in lookup argument, where the prover cost can be independent of the lookup table size after a pre-processing step. We extend the cq protocol [21] and develop an aggregated non-membership proof for zero knowledge sets. Based on it, we design a non-intrusive protocol that works for pseudo-anonymous cryptocurrencies such as BTC. It has O(nlog(n)) prover complexity and O(1) proof size, where n is the platform throughput (instead of anonymity set size). We implement and evaluate the protocol. Running on a 56-core server, it supports 1024 transactions per second.
In this work we consider Belenios-CaI, a protocol offering a cast-as-intended mechanism and building upon Belenios, a voting system used in about 7000 elections to date. We modify the design of BeleniosCai from the us...
ISBN:
(纸本)9783031722431;9783031722448
In this work we consider Belenios-CaI, a protocol offering a cast-as-intended mechanism and building upon Belenios, a voting system used in about 7000 elections to date. We modify the design of BeleniosCai from the user perspective without changing its core cryptographic mechanism. The goal is to increase its usability by letting the voter simply check whether two symbols are equal or different. We conducted a user-study among 165 participants in a research center to evaluate the usability of our implementation of Belenios-CaI. Since the cast-as-intended mechanism assumes that voters make some random choices, we also evaluate whether the choices made by voters are sufficiently "random" to provide verifiability and whether it could affect their privacy. The study shows that, for our population, Belenios-CaI is considered as usable with the random choices of the voters seeming sufficient for verifiability and privacy.
This paper introduces Searching for Us, a tangible pervasive narrative experience that explores collaborative storytelling dynamics through marionette-like avatars, developed through a Research through Design approach...
ISBN:
(纸本)9783031784521;9783031784538
This paper introduces Searching for Us, a tangible pervasive narrative experience that explores collaborative storytelling dynamics through marionette-like avatars, developed through a Research through Design approach. Pairs of users navigate an urban environment, embodying the characters of Hachi, a stray dog, and Buro, his human companion. The system seamlessly integrates real-time environmental data, geolocation, and user interactions to dynamically adapt the narrative. The technical framework of this experience combines physical props, gesture-recognizing avatars, and a responsive computational system, working together to interpret user actions and environmental contexts, translating them into meaningful narrative elements. The narrative structure balances linear progression with user agency, allowing a personalized yet coherent storytelling experience that responds to the immediate physical context. Searching for Us emphasizes embodied presence, co-performance, and shared narrative responsibility by blending physical interaction with digital storytelling. This work contributes to the field of interactive storytelling by demonstrating how tangible interfaces and mixed-reality environments can create compelling narrative experiences.
AWAIRE is one of two extant methods for conducting risk-limiting audits of instant-runoff voting (IRV) elections. In principle AWAIRE can audit IRV contests with any number of candidates, but the original implementati...
ISBN:
(纸本)9783031722431;9783031722448
AWAIRE is one of two extant methods for conducting risk-limiting audits of instant-runoff voting (IRV) elections. In principle AWAIRE can audit IRV contests with any number of candidates, but the original implementation incurred memory and computation costs that grew superexponentially with the number of candidates. This paper improves the algorithmic implementation of AWAIRE in three ways that make it practical to audit IRV contests with 55 candidates, compared to the previous 6 candidates. First, rather than trying from the start to rule out all candidate elimination orders that produce a different winner, the algorithm starts by considering only the final round, testing statistically whether each candidate could have won that round. For those candidates who cannot be ruled out at that stage, it expands to consider earlier and earlier rounds until either it provides strong evidence that the reported winner really won or a full hand count is conducted, revealing who really won. Second, it tests a richer collection of conditions, some of which can rule out many elimination orders at once. Third, it exploits relationships among those conditions, allowing it to abandon testing those that are unlikely to help. We provide real-world examples with up to 36 candidates and synthetic examples with up to 55 candidates, showing how audit sample size depends on the margins and on the tuning parameters. An open-source Python implementation is publicly available.
The fast-paced developments in GenAI technology have begun to change school realities. The aim of this study is to identify what competences teachers of technical subjects are relying on when managing AI use in the cl...
ISBN:
(纸本)9783031734731;9783031734748
The fast-paced developments in GenAI technology have begun to change school realities. The aim of this study is to identify what competences teachers of technical subjects are relying on when managing AI use in the classroom and to what degree these competences are covered in the DigComp framework. This study used a qualitative research approach utilizing semi-structured interviews. Nine educators from two vocational upper secondary schools in Austria were interviewed and a thematic analysis of the interviews was conducted to identify competences which were then mapped to DigComp2.2. Results show that several of the AI-related competences identified, such as information literacy and privacy can smoothly be mapped to DigComp2.2. However, other competences such as prompting, and the reflected goal-oriented use of GenAI tools appear not to fit in well and hence point to the necessity of adapting DigComp2.2. Furthermore, the importance of interpersonal skills and a well-founded subject knowledge were highlighted as crucial. This research is targeted at curriculum designers, educators, educational researchers, and administrators. It will also speak to teachers who wish to better deal with and prosper from the emergence of GenAI in schools. Future work will address key factors in developing educators' and students' AI literacy.
Elderly people are among the most vulnerable groups in terms of their exposition to cyber threats in our increasingly digital society. While a large variety of IT services is available that could support especially th...
ISBN:
(纸本)9783031784491;9783031784507
Elderly people are among the most vulnerable groups in terms of their exposition to cyber threats in our increasingly digital society. While a large variety of IT services is available that could support especially their lives (e.g. related to health or mobility issues), out of a lack of self-efficacy they often tend to evade these services-including even those that aim at improving IT security-related competences. We present an infotainment approach to reach these people with relevant information and an encouraging message through crossmedia storytelling. First feedback from a user study including live readings as well as offline and online media provides strong hints that information integrated in a narrative primarily received for entertainment can percolate mental reservation against digital services and improve self-efficacy.
We present a study analyzing the voting behavior of contributors, or vested users, in Decentralized Autonomous Organizations (DAOs). We evaluate their involvement in decision-making processes, discovering that in at l...
ISBN:
(纸本)9783031786785;9783031786792
We present a study analyzing the voting behavior of contributors, or vested users, in Decentralized Autonomous Organizations (DAOs). We evaluate their involvement in decision-making processes, discovering that in at least 7.54% of all DAOs, contributors, on average, held the necessary majority to control governance decisions. Furthermore, contributors have singularly decided at least one proposal in 20.41% of DAOs. Notably, contributors tend to be centrally positioned within the DAO governance ecosystem, suggesting the presence of inner power circles. Additionally, we observed a tendency for shifts in governance token ownership shortly before governance polls take place in 1202 (14.81%) of 8116 evaluated proposals. Our findings highlight the central role of contributors across a spectrum of DAOs, including Decentralized Finance protocols. Our research also offers important empirical insights pertinent to ongoing regulatory activities aimed at increasing transparency to DAO governance frameworks.
This paper introduces an innovative method for identifying fuzzy and overlapping communities in graphs using Formal Concept Analysis (FCA). While several initial works have explored the application of FCA to non-overl...
ISBN:
(纸本)9783031785474;9783031785481
This paper introduces an innovative method for identifying fuzzy and overlapping communities in graphs using Formal Concept Analysis (FCA). While several initial works have explored the application of FCA to non-overlapping community detection, this paper aims to extend one of these approaches to the detection of overlapping communities. We conduct experiments on various benchmark graphs, including both synthetic and real networks. The performance of the proposed method is evaluated using well-known metrics and compared with other algorithms in the literature.
暂无评论