scispace - formally typeset
Search or ask a question
Institution

University of Colorado Colorado Springs

EducationColorado Springs, Colorado, United States
About: University of Colorado Colorado Springs is a education organization based out in Colorado Springs, Colorado, United States. It is known for research contribution in the topics: Population & Poison control. The organization has 6664 authors who have published 10872 publications receiving 323416 citations. The organization is also known as: UCCS & University of Colorado at Colorado Springs.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors report an initial attempt to operationalize perceived teacher confirmation in behavioral terms and explore relationships among perceived teacher confirmations, cognitive learning, and affective learning.
Abstract: This article reports an initial attempt to operationalize perceived teacher confirmation in behavioral terms and to explore relationships among perceived teacher confirmation, cognitive learning, and affective learning. Results for 2 samples (N = 446; N = 303) indicate that the final 16-item version of the Teacher Confirmation scale (TCS) is valid and reliable. Confirmatory factor analysis revealed that teacher confirmation is best represented by a 3-factor solution: (a) teachers’ response to students’ questions-comments, (b) demonstrated interest in students and in their learning, and (c) teaching style. Results also indicate that teacher confirmation plays a significant role in college students’ cognitive and affective learning. For Sample 1, confirmation uniquely explained 18% of the variance in cognitive learning and 30% of the variance in affective learning, after controlling for demographic variables and relevance of assignments. For Sample 2, confirmation uniquely explained 17.6% of the variance in cognitive learning and 31% of the variance in affective learning, after controlling for the same variables. Structural equation modeling revealed strong, significant paths between confirmation and affective learning and between affective and cognitive learning. The study revealed a large, significant, indirect effect of teacher confirmation on cognitive learning, suggesting that affective learning serves as a mediating variable between teacher confirmation and cognitive learning. A multiple groups comparison demonstrated that the structural model was invariant for the 2 samples.

168 citations

Patent
15 Sep 1992
TL;DR: In this paper, a fixed ground facility and a single satellite navigation receiver on board the aircraft were used to provide a 3D position guidance of the aircraft throughout a precision approach and landing procedure.
Abstract: A GPS precision approach and landing system for aircraft employs a fixed ground facility and a single satellite navigation receiver on board the aircraft. The fixed ground facility includes a reference receiver that measures differential corrections to the satellite code and carrier measurements and a pseudolite that is employed to transmit these corrections to a broadband GPS receiver on board the aircraft and to provide an additional code and carrier measurement to assist in the navigation solution. The pseudolite signal is broadcast at a frequency offset from the L1 GPS frequency in order to prevent interference with the satellite navigation system. The broadband GPS receiver on board the aircraft is capable of making phase coherent measurements from the GPS satellites, the pseudolite signal, and the GLONASS satellites. These phase coherent measurements are combined to form a precise differential carrier ranging (DCR) solution that is used to provide three-dimensional position guidance of the aircraft throughout a precision approach and landing procedure.

167 citations

Journal ArticleDOI
01 Jul 2012
TL;DR: The author seeks to understand how political organizations emerging in the early 2000s have harnessed technological affordances for political mobilization in order to understand the main thesis of The MoveOn Effect.
Abstract: Much has been said about the power of new communication technologies, particularly the Internet, to reshape politics – from its impact on vital democratic processes, such as political participation and deliberation, to its mobilizing function in large-scale social movements. Considerably less attention has been paid to the role of the Internet in changing the very fabric of the political organizations that can foster such outcomes. It is this organizational layer of American politics that David Karpf sets out to explore in The MoveOn Effect: The Unexpected Transformation of American Political Advocacy. In particular, the author seeks to understand how political organizations emerging in the early 2000s have harnessed technological affordances for political mobilization. The book is conceptually divided into three parts. The opening chapter introduces broad assumptions about Internet effects on politics, and briefly describes the emerging online ecology of American political organizations. The next three chapters offer detailed insights into three distinct models of Internet-mediated political organizations, or “netroots”, and their use of technology via representative case studies. The last three chapters are devoted to exploring “netroots infrastructure organizations,” or the organizations that provide netroots with infrastructure support, as well as the perceived gap between liberals and conservatives in organizational infrastructure. Concluding thoughts concerning the problematic aspects as well as the hopeful prospects of the Internet’s role in politics are presented in the end. In order to clearly position the main thesis of The MoveOn Effect, Karpf starts out by debunking two of the most prevalent myths about The MoveOn Effect: The Unexpected Transformation of American Political Advocacy

167 citations

Journal ArticleDOI
TL;DR: This article examined the perceptions of 1,638 secondary individualized education program (IEP) meeting participants from 393 IEP meetings across three consecutive years and found significant differences between the survey answers and participant roles.
Abstract: This study examined the perceptions of 1,638 secondary individualized education program (IEP) meeting participants from 393 IEP meetings across 3 consecutive years. Results indicate significant differences between the survey answers and participant roles, when students did or did not attend their IEP meetings, and when different professional team members attended the meetings. Special education teachers talked more than all team members. Students reported the lowest scores for knowing the reasons for the meetings, knowing what to do at the meetings, and five other survey items. General educators rated themselves lowest on three of the survey questions. Student and general educator attendance at the IEP meetings produced value-added benefits for IEP team members, especially parents.

167 citations

Journal ArticleDOI
TL;DR: A distributed denial of service (DDoS) attack is a large-scale, coordinated attack on the availability of services of a victim system or network resources, launched indirectly through many compromised computers on the Internet.
Abstract: The minimal processing and best-e↵ort forwarding of any packet, malicious or not, was the prime concern when the Internet was designed. This architecture creates an unregulated network path, which can be exploited by any cyber attacker motivated by revenge, prestige, politics or money. Denial-of-service (DoS) attacks exploit this to target critical Web services [1, 2, 3, 4, 5]. This type of attack is intended to make a computer resource unavailable to its legitimate users. Denial of service attack programs have been around for many years. Old single source attacks are now countered easily by many defense mechanisms and the source of these attacks can be easily rebu↵ed or shut down with improved tracking capabilities. However, with the astounding growth of the Internet during the last decade, an increasingly large number of vulnerable systems are now available to attackers. Attackers can now employ a large number of these vulnerable hosts to launch an attack instead of using a single server, an approach which is not very e↵ective and detected easily. A distributed denial of service (DDoS) attack [1, 6] is a large-scale, coordinated attack on the availability of services of a victim system or network resources, launched indirectly through many compromised computers on the Internet. The first well-documented DDoS attack appears to have occurred in August 1999, when a DDoS tool called Trinoo was deployed in at least 227 systems, to flood a single University of Minnesota computer, which was knocked down for more than two days1. The first largescale DDoS attack took place on February 20001. On February 7, Yahoo! was the victim of a DDoS attack during which its Internet portal was inaccessible for three hours. On February 8, Amazon, Buy.com, CNN and eBay were all hit by DDoS attacks that caused them to either stop functioning completely or slowed them down significantly1. DDoS attack networks follow two types of architectures: the Agent-Handler architecture and the Internet Relay Chat (IRC)-based architecture as discussed by [7]. The Agent-Handler architecture for DDoS attacks is comprised of clients, handlers, and agents (see Figure 6). The attacker communicates with the rest of the DDoS attack system at the client systems. The handlers are often software packages located throughout the Internet that are used by the client to communicate with the agents. Instances of the agent software are placed in the compromised systems that finally carry out the attack. The owners and users of the agent systems are generally unaware of the situation. In the IRC-based DDoS attack architecture, an IRC communication channel is used to connect the client(s) to the agents. IRC

166 citations


Authors

Showing all 6706 results

NameH-indexPapersCitations
Jeff Greenberg10554243600
James F. Scott9971458515
Martin Wikelski8942025821
Neil W. Kowall8927934943
Ananth Dodabalapur8539427246
Tom Pyszczynski8224630590
Patrick S. Kamath7846631281
Connie M. Weaver7747330985
Alejandro Lucia7568023967
Michael J. McKenna7035616227
Timothy J. Craig6945818340
Sheldon Solomon6715023916
Michael H. Stone6537016355
Christopher J. Gostout6533413593
Edward T. Ryan6030311822
Network Information
Related Institutions (5)
Arizona State University
109.6K papers, 4.4M citations

93% related

University of Illinois at Urbana–Champaign
225.1K papers, 10.1M citations

90% related

Pennsylvania State University
196.8K papers, 8.3M citations

90% related

Florida State University
65.3K papers, 2.5M citations

90% related

University of Maryland, College Park
155.9K papers, 7.2M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202325
202246
2021568
2020543
2019479
2018454