Conceptual metaphors play a vital role in our ability to think in abstract terms like knowledge. Metaphors structure and give meaning to the concept of knowledge. They hide and highlight certain characteristics. The choice of metaphor when reasoning about knowledge is therefore of vital importance for knowledge management (KM). This paper explores the possibility of introducing new knowledge metaphors to the field of KM. Based on a ‘wish list’ of characteristics of knowledge they want to highlight, the authors choose to explore the Knowledge as a Journey metaphor as a new metaphor for knowledge. This results in new insights regarding knowledge sharing, acquisition, retention, and innovation.
Reading and writing is modelled in CSP using actions containing the symbols ? and !. These reading actions and writing actions are synchronous, and there is a one-to-one relationship between occurrences of pairs of these actions. In the CPA conference 2017, we introduced the extended half-synchronous al- phabetised parallel operator X ⇕ Y , which disconnects the writing to and reading from a channel in time; the reading processes are divided into sets which are set-wise asynchronous, but intra-set-wise synchronous, giving full flexibility to the reads. In this paper, we allow multiple writers to write to the same channel set-wise asynchronously, but intra-set-wise synchronously and we study the impact on our (Extended) Vertex Removing Synchronised Product. The advantages we accomplish are that the extension of X ⇕ Y gives more flexibility by indexing the writing actions and the reading actions, leading to a straightforward majority vote design. Furthermore, the extension of X ⇕ Y preserves the advantages of the X ⇕ Y operator.
In Amsterdam and Beirut, Abdallah has ethnographically researched interactional dynamics between disadvantaged young people, regarding experiences of success, in settings of education, work, sports, and music. He analyzed how focus, mood, and bodily deployment produced shared symbols, emotional contagions, and situated solidarities and moralities.He came to characterize constructive interactions as a main context for young people to experience three components of success: boosts, elevation, and grounding. Combinations of these experiences have important restorative effects for young people who suffer from an abundance of adversity and discouragement. Tensions arise for young people between, on the one hand, their loyalties toward old settings of belonging with their short-term, at times destructive, tendencies and, on the other hand, their success in new settings which demanded of them new types of discipline and commitments. Continued success depends partly on young people’s abilities, but more so on the availability of constructive interaction rituals helping them manage such tensions, without necessarily committing to one loyalty over the other. Next to young people’ s dynamics and processes, Abdallah has focused on the input of NGO professionals and volunteers in such constructive interactions to learn how their involvement can help young people in their struggles for success.The analysis employs concepts of sociological studies of emotions, such as interaction rituals, emotion management, and embodied dispositions to clarify how emotion, experience and energy act as driving forces in young people’s activities and development.
MULTIFILE
The project aim is to improve collusion resistance of real-world content delivery systems. The research will address the following topics: • Dynamic tracing. Improve the Laarhoven et al. dynamic tracing constructions [1,2] [A11,A19]. Modify the tally based decoder [A1,A3] to make use of dynamic side information. • Defense against multi-channel attacks. Colluders can easily spread the usage of their content access keys over multiple channels, thus making tracing more difficult. These attack scenarios have hardly been studied. Our aim is to reach the same level of understanding as in the single-channel case, i.e. to know the location of the saddlepoint and to derive good accusation scores. Preferably we want to tackle multi-channel dynamic tracing. • Watermarking layer. The watermarking layer (how to embed secret information into content) and the coding layer (what symbols to embed) are mostly treated independently. By using soft decoding techniques and exploiting the “nuts and bolts” of the embedding technique as an extra engineering degree of freedom, one should be able to improve collusion resistance. • Machine Learning. Finding a score function against unknown attacks is difficult. For non-binary decisions there exists no optimal procedure like Neyman-Pearson scoring. We want to investigate if machine learning can yield a reliable way to classify users as attacker or innocent. • Attacker cost/benefit analysis. For the various use cases (static versus dynamic, single-channel versus multi-channel) we will devise economic models and use these to determine the range of operational parameters where the attackers have a financial benefit. For the first three topics we have a fairly accurate idea how they can be achieved, based on work done in the CREST project, which was headed by the main applicant. Neural Networks (NNs) have enjoyed great success in recognizing patterns, particularly Convolutional NNs in image recognition. Recurrent NNs ("LSTM networks") are successfully applied in translation tasks. We plan to combine these two approaches, inspired by traditional score functions, to study whether they can lead to improved tracing. An often-overlooked reality is that large-scale piracy runs as a for-profit business. Thus countermeasures need not be perfect, as long as they increase the attack cost enough to make piracy unattractive. In the field of collusion resistance, this cost analysis has never been performed yet; even a simple model will be valuable to understand which countermeasures are effective.