Nowadays, many scholars would like to use evidence derived from elicitation and introspection in their research. Both elicitation and introspection are common methods of data collection. The essay discusses the useful...Nowadays, many scholars would like to use evidence derived from elicitation and introspection in their research. Both elicitation and introspection are common methods of data collection. The essay discusses the usefulness and pitfall of elicitation and introspection. It finds out that both elicitation and introspection have their own advantages and disadvantages.展开更多
The present paper discusses introspective methods in applied linguistics. Introspective methods are ways of eliciting self-reflections from respondent. Two special techniques of introspective methods, namely, Think-al...The present paper discusses introspective methods in applied linguistics. Introspective methods are ways of eliciting self-reflections from respondent. Two special techniques of introspective methods, namely, Think-aloud and Retrospective in?terview are presented. Furthermore, an evaluation of these methods is also provided.展开更多
Cloud computing plays an important role in today’s Internet environment,which meets the requirements of scalability,security and reliability by using virtualization technologies.Container technology is one of the two...Cloud computing plays an important role in today’s Internet environment,which meets the requirements of scalability,security and reliability by using virtualization technologies.Container technology is one of the two mainstream virtualization solutions.Its lightweight,high deployment efficiency make container technology widely used in large-scale cloud computing.While container technology has created huge benefits for cloud service providers and tenants,it cannot meet the requirements of security monitoring and management from a tenant perspective.Currently,tenants can only run their security monitors in the target container,but it is not secure because the attacker is able to detect and compromise the security monitor.In this paper,a secure external monitoring approach is proposed to monitor target containers in another management container.The management container is transparent for target containers,but it can obtain the executing information of target containers,providing a secure monitoring environment.Security monitors running inside management containers are secure for the cloud host,since the management containers are not privileged.We implement the transparent external management containers by performing the one-way isolation of processes and files.For process one-way isolation,we leverage Linux namespace technology to let management container become the parent of target containers.By mounting the file system of target container to that of the management container,file system one-way isolation is achieved.Compared with the existing host-based monitoring approach,our approach is more secure and suitable in the cloud environment.展开更多
The authors thank the discusser for his interest and careful review of the paper and his valuable comments. They also welcome this discussion,because it gives the authors the opportunity to clarify several points whic...The authors thank the discusser for his interest and careful review of the paper and his valuable comments. They also welcome this discussion,because it gives the authors the opportunity to clarify several points which were not explained in sufficient detail in the paper,due展开更多
The authors thank the discusser for the additional information,which is provided related to the historical interventions of the church through the centuries. This information was known to the authors,however they deci...The authors thank the discusser for the additional information,which is provided related to the historical interventions of the church through the centuries. This information was known to the authors,however they decided not to include it in the paper because of lack of space.Additional details regarding the retrofit展开更多
The thesis of the paper,which is the object of this Discussion,is that the considerable damage suffered by the Basilica,after the earthquake of L’Aquila in 2009,was the exclusive result of the intervention of seismic...The thesis of the paper,which is the object of this Discussion,is that the considerable damage suffered by the Basilica,after the earthquake of L’Aquila in 2009,was the exclusive result of the intervention of seismic improvement of the naves,made in 2000;such展开更多
The present study investigates the testees' test-taking process for banked cloze, focusing on the following two aspects: the information sources and strategies. Employing simultaneous introspection and immediate r...The present study investigates the testees' test-taking process for banked cloze, focusing on the following two aspects: the information sources and strategies. Employing simultaneous introspection and immediate retrospection, the study is conducted among 18 non-English major students. After examining their test-taking processes, a framework for analyzing testees' test-taking processes for banked cloze test is put forward. And then the researcher applies this framework to analyze the testees' protocols. Results show that regarding information sources, clause-level information accounts for the largest proportion, followed by text-level information, sentence-level information and extra-textual information, and in terms of strategies, the testees show a clear preference for bottom-up processing strategies, followed by top-down processing strategies and test-wise processing strategies. The verbal protocols have further revealed that the proficient readers seem to have a context-based reading model and they prefer to grasp the gist of the text, whereas the less proficient readers often employ word-based approaches and they are apt to identify parts of the text.展开更多
文摘Nowadays, many scholars would like to use evidence derived from elicitation and introspection in their research. Both elicitation and introspection are common methods of data collection. The essay discusses the usefulness and pitfall of elicitation and introspection. It finds out that both elicitation and introspection have their own advantages and disadvantages.
文摘The present paper discusses introspective methods in applied linguistics. Introspective methods are ways of eliciting self-reflections from respondent. Two special techniques of introspective methods, namely, Think-aloud and Retrospective in?terview are presented. Furthermore, an evaluation of these methods is also provided.
基金This paper is supported by National Natural Science Foundation of China(http://www.nsfc.gov.cn/)under Grant No.61872111,and Sichuan Science and Technology Program(http://kjt.sc.gov.cn/)under Grant No.2019YFSY0049 which are both received by L.Ye.
文摘Cloud computing plays an important role in today’s Internet environment,which meets the requirements of scalability,security and reliability by using virtualization technologies.Container technology is one of the two mainstream virtualization solutions.Its lightweight,high deployment efficiency make container technology widely used in large-scale cloud computing.While container technology has created huge benefits for cloud service providers and tenants,it cannot meet the requirements of security monitoring and management from a tenant perspective.Currently,tenants can only run their security monitors in the target container,but it is not secure because the attacker is able to detect and compromise the security monitor.In this paper,a secure external monitoring approach is proposed to monitor target containers in another management container.The management container is transparent for target containers,but it can obtain the executing information of target containers,providing a secure monitoring environment.Security monitors running inside management containers are secure for the cloud host,since the management containers are not privileged.We implement the transparent external management containers by performing the one-way isolation of processes and files.For process one-way isolation,we leverage Linux namespace technology to let management container become the parent of target containers.By mounting the file system of target container to that of the management container,file system one-way isolation is achieved.Compared with the existing host-based monitoring approach,our approach is more secure and suitable in the cloud environment.
文摘The authors thank the discusser for his interest and careful review of the paper and his valuable comments. They also welcome this discussion,because it gives the authors the opportunity to clarify several points which were not explained in sufficient detail in the paper,due
文摘The authors thank the discusser for the additional information,which is provided related to the historical interventions of the church through the centuries. This information was known to the authors,however they decided not to include it in the paper because of lack of space.Additional details regarding the retrofit
文摘The thesis of the paper,which is the object of this Discussion,is that the considerable damage suffered by the Basilica,after the earthquake of L’Aquila in 2009,was the exclusive result of the intervention of seismic improvement of the naves,made in 2000;such
基金a small part of the research project,"A Chronological Study on the CET Washback"(07BYY030)National Philosophy and Social Science Foundation of China
文摘The present study investigates the testees' test-taking process for banked cloze, focusing on the following two aspects: the information sources and strategies. Employing simultaneous introspection and immediate retrospection, the study is conducted among 18 non-English major students. After examining their test-taking processes, a framework for analyzing testees' test-taking processes for banked cloze test is put forward. And then the researcher applies this framework to analyze the testees' protocols. Results show that regarding information sources, clause-level information accounts for the largest proportion, followed by text-level information, sentence-level information and extra-textual information, and in terms of strategies, the testees show a clear preference for bottom-up processing strategies, followed by top-down processing strategies and test-wise processing strategies. The verbal protocols have further revealed that the proficient readers seem to have a context-based reading model and they prefer to grasp the gist of the text, whereas the less proficient readers often employ word-based approaches and they are apt to identify parts of the text.