skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Comparison of Knowledge and Information-Seeking Behavior After General COVID-19 Public Health Messages and Messages Tailored for Black and Latinx Communities: A Randomized Controlled Trial
Award ID(s):
2029880
PAR ID:
10224495
Author(s) / Creator(s):
; ; ; ; ; ; ; ; ; ; ; ;
Date Published:
Journal Name:
Annals of Internal Medicine
Volume:
174
Issue:
4
ISSN:
0003-4819
Page Range / eLocation ID:
484 to 492
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. This paper presents a lightweight process to guide error report authoring. We take the perspective that error reports are really classifiers of program information. They should therefore be subjected to the same measures as other classifiers (e.g., precision and recall). We formalize this perspective as a process for assessing error reports, describe our application of this process to an actual programming language, and present a preliminary study on the utility of the resulting error reports. 
    more » « less
  2. https://www.teachengineering.org/activities/view/umo-2942-mindful-messages-communication-solutions-activity Students explore how the brain enables communication through spoken and written language and how communication is essential for solving problems. Working in groups, students define a problem related to communication, design a solution using a micro:bit, build a prototype, and then test their designs. Possible communication challenges they might tackle are hearing loss, language barriers, or noisy environments. Students follow specific criteria and constraints as they design and build their prototype. After testing their designs and prototypes, students improve their designs as needed. To wrap up, students exchange prototypes with other groups and test each other’s solutions. This engineering curriculum aligns to Next Generation Science Standards (NGSS). 
    more » « less
  3. Security analyses for consensus protocols in blockchain research have primarily focused on the synchronous model, where point-to-point communication delays are upper bounded by a known finite constant. These models are unrealistic in noisy settings, where messages may be lost (i.e. incur infinite delay). In this work, we study the impact of message losses on the security of the proof-of-work longest-chain protocol. We introduce a new communication model to capture the impact of message loss called the 0-∞ model, and derive a region of tolerable adversarial power under which the consensus protocol is secure. The guarantees are derived as a simple bound for the probability that a transaction violates desired security properties. Specifically, we show that this violation probability decays almost exponentially in the security parameter. Our approach involves constructing combinatorial objects from blocktrees, and identifying random variables associated with them that are amenable to analysis. This approach improves existing bounds and extends the known regime for tolerable adversarial threshold in settings where messages may be lost. 
    more » « less