2019 26th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW)最新文献

筛选
英文 中文
Measuring Peer Mentoring Effectiveness in Computing Courses: A Case Study in Data Analytics for Cybersecurity 测量计算机课程中同伴指导的有效性:网络安全数据分析的案例研究
A. Faridee, V. Janeja
{"title":"Measuring Peer Mentoring Effectiveness in Computing Courses: A Case Study in Data Analytics for Cybersecurity","authors":"A. Faridee, V. Janeja","doi":"10.1109/HiPCW.2019.00024","DOIUrl":"https://doi.org/10.1109/HiPCW.2019.00024","url":null,"abstract":"Computing courses often suffer from lack of diversity. In this paper we evaluate an intervention method of peer mentoring to help increase interest in data analytics in cybersecurity. We present a text mining approach to analyze student assignments while they undergo a peer mentoring exercise. In our prior work, we have shown that the peer mentoring approach is effective at improving the students' interest in cybersecurity careers and contributes to an overall better knowledge gain throughout the semester. This was also reflected by an improvement in grades with two years of anonymous survey results. Across the years we also observed that peer mentoring is particularly effective in diverse groups. In this paper, we perform text mining of the written assignments for analyzing the group behavior of the control and experiment sections of a class while also documenting the effectiveness of intervention methods such as peer mentoring. We employ a few text mining techniques, namely Text Frequency Analysis, Lexical Diversity, Readability Analysis, Word Cloud Visualization, Hyperlink usage and Objectivity Analysis on the text assignments submitted by the students and show that students who receive peer mentoring are able to express more complex ideas with fewer words and thereby receive higher grades by the end of the semester. Based on these results, we also discuss how our methodology would be applicable in increasing reachability and diversity in other specialized computing courses such as Big Data and distributed systems.","PeriodicalId":223719,"journal":{"name":"2019 26th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128762533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Invited Talk 3: Reskilling to Match the Needs of Exascale Architectures 特邀演讲3:重新培训以满足百亿亿级架构的需求
Sharma Sharma
{"title":"Invited Talk 3: Reskilling to Match the Needs of Exascale Architectures","authors":"Sharma Sharma","doi":"10.1109/hipcw.2019.00019","DOIUrl":"https://doi.org/10.1109/hipcw.2019.00019","url":null,"abstract":"This talk will introduce the audience to tools and methodology adopted by Nvidia to train researchers in form of hands-on session using real world case studies. Case studies from India and around the world will be presented along with details about how one can apply and participate in this training.","PeriodicalId":223719,"journal":{"name":"2019 26th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131013201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly Detection in Surveillance Videos 监控视频中的异常检测
Sukalyan Bhakat, Ganesh Ramakrishnan
{"title":"Anomaly Detection in Surveillance Videos","authors":"Sukalyan Bhakat, Ganesh Ramakrishnan","doi":"10.1109/HiPCW.2019.00031","DOIUrl":"https://doi.org/10.1109/HiPCW.2019.00031","url":null,"abstract":"Every public or private area today is preferred to be under surveillance to ensure high levels of security. Since the surveillance happens round the clock, data gathered as a result is huge and requires a lot of manual work to go through every second of the recorded videos. This paper presents a system which can detect anomalous behaviors and alarm the user on the type of anomalous behavior. Since there are a myriad of anomalies, the classification of anomalies had to be narrowed down. There are certain anomalies which are generally seen and have a huge impact on public safety, such as explosions, road accidents, assault, shooting, etc. To narrow down the variations, this system can detect explosion, road accidents, shooting, and fighting and even output the frame of their occurrence. The model has been trained with videos belonging to these classes. The dataset used is UCF Crime dataset. Learning patterns from videos requires the learning of both spatial and temporal features. Convolutional Neural Networks (CNN) extract spatial features and Long Short-Term Memory (LSTM) networks learn the sequences. The classification, using an CNN-LSTM model achieves an accuracy of 85%.","PeriodicalId":223719,"journal":{"name":"2019 26th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122309747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Message from the Workshops Co-chairs 讲习班联合主席致辞
Peter Mueller, M. Denko
{"title":"Message from the Workshops Co-chairs","authors":"Peter Mueller, M. Denko","doi":"10.1109/WiMob.2008.126","DOIUrl":"https://doi.org/10.1109/WiMob.2008.126","url":null,"abstract":"The Fourth IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2008) has introduced workshops in its 2008 edition featuring a wider range of topics on current and emerging research areas. The purpose of these workshops is to provide a more focused presentation and discussion forum on ongoing research, practical experience and completed research results among researchers from both industry and academia.","PeriodicalId":223719,"journal":{"name":"2019 26th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116428398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信