Motivation. How important were each of the following possible reasons in your decision to go to university? Not important Somewhat important Important Very important motiv1 To prepare for a specific job or career ☐ ☐ ☐ ☐ motiv2 To satisfy my intellectual curiosity ☐ ☐ ☐ ☐ motiv3 To earn more money than if I didn’t go ☐ ☐ ☐ ☐ motiv4 To get a broad education ☐ ☐ ☐ ☐ motiv5 I am more likely to get a job with a degree ☐ ☐ ☐ ☐ motiv6 The satisfaction of doing challenging academic work ☐ ☐ ☐ ☐ motiv7 To apply what I will learn to make a positive difference in society or my community ☐ ☐ ☐ ☐ motiv8 I didn’t have anything better to do ☐ ☐ ☐ ☐ motiv9 To get a more fulfilling job than I probably would if I didn’t go ☐ ☐ ☐ ☐ motiv10 To meet my family’s expectations ☐ ☐ ☐ ☐ motiv11 Learning new things is exciting ☐ ☐ ☐ ☐ motiv12 Most of my friends are going ☐ ☐ ☐ ☐ motiv13 To meet new people ☐ ☐ ☐ ☐ motiv14 The chance to participate in varsity athletics ☐ ☐ ☐ ☐ motiv15 To explore whether university is right for me ☐ ☐ ☐ ☐ motiv16 Other reason (please specify below): ☐ ☐ ☐ ☐ motivtxt motivtop Which one was the most important to you? Applications How many universities besides <university name> did you apply to? app1 in Canada: app2 in other countries: app3 Did you apply to a college or CEGEP? Yes ☐ No ☐ app4 Is <university name> your first choice? Yes ☐ No ☐ [If app4 = “No” branch to apptxt, otherwise branch to the Selection section.] Apptxt What was your first choice university? Selection How important were each of the following in your decision to choose <university name>? Not important Somewhat important Important Very important sel1 I wanted to live close to home ☐ ☐ ☐ ☐ sel2 I wanted to live away from home ☐ ☐ ☐ ☐ sel3 It offered a place in residence ☐ ☐ ☐ ☐ sel4 Cost of university residence ☐ ☐ ☐ ☐ sel5 Cost of tuition and fees ☐ ☐ ☐ ☐ sel6 It has the program I want to take ☐ ☐ ☐ ☐ sel7 The program I want has a co-op, practicum or other work experience ☐ ☐ ☐ ☐ sel8 The program I want offers study/work experience abroad ☐ ☐ ☐ ☐ sel9 The academic reputation of the university ☐ ☐ ☐ ☐ sel10 It has a good reputation for campus life ☐ ☐ ☐ ☐ sel11 It offered a scholarship ☐ ☐ ☐ ☐ sel12 It offered other financial assistance ☐ ☐ ☐ ☐ sel13 The size of the university suits me ☐ ☐ ☐ ☐ sel14 The city/town it’s in ☐ ☐ ☐ ☐ sel15 Availability of public transportation ☐ ☐ ☐ ☐ sel16 It’s where my friends are going ☐ ☐ ☐ ☐ sel17 It’s where my family wanted me to go ☐ ☐ ☐ ☐ sel18 The chance to p...
Motivation. □ Used positive reinforcements with students; motivated and encouraged students to achieve. □ At times used positive reinforcement with students; inconsistent in encouragement of students. □ Little or no use of positive reinforcement or encouragement to succeed.
Motivation. The one-way authentication schemes, and the high computational and communicational costs can raise concern in two-way smart energy communications. Moreover, in the SEN communication, the integrity of messages is equally important as other security properties, since message integrity provides assurance that the messages are not been altered/forged in transit (or from the origin), as suggested by the National Institute Standards Technology (NIST) [27]. A loss of integrity may cause destruction of information and may lead to incorrect decision in smart energy network. However, the most of recently proposed schemes (e.g., [17], [19], [20], [21]), are vulnerable where an attacker can violate message Utility Server #1 Optical Network Utility Server #N with wireless (ZigBee, WiMAX, WiFi, etc.) or wired technologies, and distributed over many cities, or villages. Moreover, the physical security of the NAN gateway can xG xG NAN gateway NAN gateway be protected as it is located inside substation and locked from outsider access as recommended by [14] [30]. Note #1 ZigBee ZigBee HHAANN##11 Neighbourhood Area ZigBee Network (NAN) #1 HHAANN##NN Neighbourhood Area Network (NAN) #N #N ZigBee HHAANN##NN that the main focus of our scheme is to establish a secure and efficient communication between the two ends (i.e., smart meter and NAN). We assumed that the NAN gateway is securely connected with the utility server (US). Smart Meter HHAANN##11
Motivation. 1.1 Kipchumba Foundation is a non-profit, non-political, non-partisan education- based organization that enhances appreciation of wider theoretical, philosophical and civilizational perspectives.
Motivation. Byzantine agreement (BA) and secure multi-party computation (MPC) are two fundamental and widely explored problems in distributed computing and cryptography. The general problem of MPC allows a set of n parties to correctly carry out an arbitrary computation, without revealing anything about their inputs that could not be inferred from the computed output [45, 46]. Such guarantees must hold even when a subset of the parties are corrupted and actively deviate from the protocol specification. BA can be seen as an instance of MPC, in which the function to evaluate guarantees agreement on a common output [42, 44] and privacy is not a requirement. Protocols for BA are often used as building blocks within larger constructions, including crucially in MPC protocols, and have received renewed attention in the context of blockchain protocols (starting with [38]). There are two prominent communication models in the literature when it comes to the design of such primitives. In the synchronous model, parties have synchronized clocks and messages are assumed to be delivered within some (publicly known) delay ∆. Protocols in this setting achieve very strong security guarantees: under standard setup assumptions, BA [22, 30] and MPC [4, 5, 7, 15, 18, 19, 21, 25, 26, 28, 43] are achievable even when up to t < n/2 parties are corrupted. However, the security of synchronous protocols is often completely compromised as soon as the synchrony assumptions are violated (for example, if even one message is delayed by more than ∆ due to unpredictable network delays). This is particularly undesirable in real- world applications, where even the most stable networks, such as the Internet, occasionally experience congestion or failures. In the asynchronous model, no timing assumptions are needed, and messages can be arbitrarily delayed. Protocols designed in this model are robust even in unpredictable real-world networks, but the security guarantees that can be achieved are ⋆ This work was partially carried out while the author was at ETH Zürich. significantly weaker. For example, protocols in this realm can only tolerate up to t < n/3 corruptions [8, 14, 24]. As a consequence, when deploying protocols in real-world scenarios, one has to decide be- tween employing synchronous protocols —risking catastrophic failures in the case of unforeseen network delays —or settling for the weaker security guarantees of asynchronous protocols.
Motivation. Conversations are a natural form for humans to seek information, and there are decades of study on formal dialogues and interactions of users with reference librarians. The natural next step is to design automated systems that are ‘virtual librarians’, eliciting information needs, correcting misconceptions, and providing the right amount of information at the right time across all possible domains. Multi-turn conversations should also become more natural in the digital environment today due to the increasing variety of devices that are accessible anytime/anywhere (perhaps without screen or keyboard), the maturity of speech interfaces, and recent developments in general representation learning. Today’s digital assistants are only capable of very basic “conversations”, which usually means a single user question (“What’s the weather like today?” or “When does my flight leave tomorrow?”), followed by a single system answer. In contrast, this research direction will lead to multi-turn, multi-user, multi-task and multi-domain conversational information seeking systems.
Motivation. E. The teacher establishes and encourages a positive learning environment. For example: • Creates a classroom climate that promotes openness to student responses, mutual respect, support, and inquiry. • Provides opportunities for students to interact effectively in groups and to recognize their value to the group. • Encourages students to develop a sense of responsibility, self-discipline and self-worth. • Models tolerance and encourages positive attitudes toward human diversity including economic, ethnic, cultural, and gender diversity. • Shows students the relevance of the subject to life-long learning.
Motivation. For over two decades, IR systems have influenced the way people around the world work, communicate, learn, and even how they live. Search engines have eased the way we access information. Recommender systems have changed the way we select what products and services we buy and consume. Social networks have changed how we keep in touch with family, friends, and acquaintances. Personal and conversational assistants are increasingly supporting us in our day-by-day tasks through reminders or contextual interventions such as heads-ups about traffic or weather. In essence, IR systems aim to empower individuals through access to information. However, do these systems always deliver positive outcomes to individuals, society, politics, the economy, and the environment? Information scientists with researchers from other disciplines should study the long-term and large-scale impacts of IR systems and technologies. Previous research indicates some of the areas that IR technologies impact, including: • Human cognitive processes. Psychologists have been studying and raised concerns about the effect that easy access to via search engines might be having on, e.g., how people think and what people remember. • Individuals from minority communities. Xxxxxxx Xxxxxxx showed that querying by names predominantly used by black Americans is more likely to return results associated to arrest records than when querying by names predominantly used by white Americans. How many people might have been denied employment as a result? Similarly, search results for images of doctors or engineers are typically dominated by pictures of white men. How many girls of color might have been discouraged to pursue interests in these fields? • Social Communities. Given the political climate around the world, many have raised concerns about the potential of highly personalized consumption of information and the filter bubbles that current IR systems can create, to drive increased polarization along social and political lines within and across local and regional communities. • Businesses. Search platforms have disrupted the news media ecosystem through digital ads and targeting, being able to tailor content to each of their user interests, viewpoints, and beliefs. But, what are the costs of, for instance, accessing newsworthy information without the traditional journalistic curation? • Environment. Providing the energy required to run the data centres that support large- scale search engines can be at a...
Motivation. Government institutions make planning, policy, and decision making as reg- ular activities. Information technology constributes greatly to these activi- ties, introducing in the last decade new application and paradigms such as e-Government, e-Commerce, and e-Education. Increasingly, e-government decision making needs gathering information from many sources or depart- ments. Decisions can be carried out at many government levels including national, province, district and sub-district. Each level has di erent needs in sources, types, and detail of information. For example, a district gov- ernment may need information about the length and condition of road for budget planning and maintenance, while a province may use tra c density information for economic activity evaluation. A national government level requires road classi cation types, which can be pay road, toll road, highway, etc, for tax calculation. Moreover, decision made at one level can be based on information de xxx at the other levels. Interoperability and mediation approach are needed to allow information sharing among the levels. In many applications, data have high correlation with geographic infor- mation. With the rapid development in GIS, more and more geographical database have been developed by di erent programs and applications. Un- fortunately, data sharing and acquisition still are big challenges for the de- velopment of GIS applications. There is a large amount of geographical data stored in di erent places and in di erent formats. However, data reuse by new applications and data sharing are hindered by the heterogeneity among existing system, heterogeneity data modeling concepts, data encoding tech- niques and storage structures, etc [14] This situation is even worse in large developing countries like Indonesia where large amount of spatial data are stored in various paper and digital formats. For example, to develop a deci- sion making system for land transportation the Indonesian government must consider information from departments such as the Ministry of Internal Af- fair, the Police Department, and the Ministry of Public Work. Indonesia is composed of 13,000 islands among which the population is not equally distributed. As a result economic, social, and transport activities are very diverse. The other problems of land transportation, are related to ood- ing disaster during rain session, and very high movement of people in short period time such as New Year. Internet allows e cien...
Motivation. IoT is a growing field, also under the “Industry 4.0” label. New devices and technologies are going to hit the market soon. Many funding agencies are devoting a large amount their funds to IoT-related projects. As a community, IR has the potential to address issues that other communities (like machine learning, data mining) will most likely not address: to study users and their needs, to better model specific needs exploiting sensor data, to devise novel and effective interaction modalities with information, and, overall, to apply results from specific IR subareas. The IoT situation is not much different from two previous waves that hit the IR field: the Web and mobile devices. Mobile IR was a successful story in SWIRL 2012. Papers on Location- and Context-awareness for Mobile IR are now being published in IR venues. IoT might well be the next wave after Web and Mobile. Proposal. We foresee three main research directions: