6,481 research outputs found

    Gateway Cities und ihr Hinterland: Wirtschaftliche Entwicklung peripherer, ressourcenreicher Standorte in Abhängigkeit von urbanen Knoten in globalen Netzwerken

    Get PDF
    In den acht Beiträgen der kumulativen Habilitation wird untersucht, wie Weltstädte als "Gateways" periphere Standorte in globale Wertschöpfungsketten des Öl- und Gassektors einbinden. Dabei unterscheidet der Verfasser fünf Verknüpfungsformen. Gateway Cities sind Verkehrsknoten. Sie bündeln die industrielle Verarbeitung von Rohstoffen aus dem Hinterland. Unternehmerische Kontrolle und unternehmensbezogene Dienstleistungen ballen sich dort. Außerdem verbinden sie im Wissensbereich die lokale und globale Ebene. Darüber hinaus wird analysiert, wie Gateway Cities die Entwicklung der Orte, die sie global verflechten, beeinflussen

    UMSL Bulletin 2023-2024

    Get PDF
    The 2023-2024 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1088/thumbnail.jp

    UMSL Bulletin 2022-2023

    Get PDF
    The 2022-2023 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1087/thumbnail.jp

    Identification of the most vulnerable populations in the psychosocial sphere: a cross-sectional study conducted in Catalonia during the strict lockdown imposed against the COVID-19 pandemic.

    Full text link
    Design and objectives A cross-sectional study to evaluate the impact of COVID-19 on the psychosocial sphere in both the general population and healthcare workers (HCWs). Methods The study was conducted in Catalonia (Spain) during the first wave of the COVID-19 pandemic when strict lockdown was in force. The study population included all people aged over 16 years who consented to participate in the study and completed the survey, in this case a 74-question questionnaire shared via social media using snowball sampling. A total of 56 656 completed survey questionnaires were obtained between 3 and 19 April 2020. The primary and secondary outcome measures included descriptive statistics for the non-psychological questions and the psychological impact of the pandemic, such as depression, anxiety, stress and post-traumatic stress disorder question scores. Results A n early and markedly negative impact on family finances, fear of working with COVID-19 patients and ethical issues related to COVID-19 care among HCWs was observed. A total of seven target groups at higher risk of impaired mental health and which may therefore benefit from an intervention were identified, namely women, subjects aged less than 42 years, people with a care burden, socioeconomically deprived groups, people with unskilled or unqualified jobs, patients with COVID-19 and HCWs working with patients with COVID-19. Conclusions Active implementation of specific strategies to increase resilience and to prepare an adequate organisational response should be encouraged for the seven groups identified as high risk and susceptible to benefit from an intervention

    The lifecycle of affirmative action policies and its effect on effort and sabotage behavior

    Get PDF
    A main goal of affirmative action (AA) policies is to enable disadvantaged groups to compete with their privileged counterparts. Existing theoretical and empirical research documents that incorporating AA can result in both more egalitarian outcomes and higher exerted efforts. However, the direct behavioral effects of the introduction and removal of such policies are still under-researched. It is also unclear how specific AA policy instruments, for instance, head- start for a disadvantaged group or handicap for the privileged group, affect behavior. We examine these questions in a laboratory experiment in which individuals participate in a real- effort tournament and can sabotage each other. We find that AA does not necessarily result in higher effort. High performers that already experienced an existing AA-free tournament reduce their effort levels after the introduction of the AA policy. There is less sabotage under AA when the tournament started directly with the AA regime. The removal of AA policies, however, significantly intensifies sabotage. Finally, there are no overall systematic differences between handicap and head-start in terms of effort provision or sabotaging behavior

    Apprenticeship funding rules : August 2023 to July 2024 : Version 1 : May 2023

    Get PDF

    Towards A Practical High-Assurance Systems Programming Language

    Full text link
    Writing correct and performant low-level systems code is a notoriously demanding job, even for experienced developers. To make the matter worse, formally reasoning about their correctness properties introduces yet another level of complexity to the task. It requires considerable expertise in both systems programming and formal verification. The development can be extremely costly due to the sheer complexity of the systems and the nuances in them, if not assisted with appropriate tools that provide abstraction and automation. Cogent is designed to alleviate the burden on developers when writing and verifying systems code. It is a high-level functional language with a certifying compiler, which automatically proves the correctness of the compiled code and also provides a purely functional abstraction of the low-level program to the developer. Equational reasoning techniques can then be used to prove functional correctness properties of the program on top of this abstract semantics, which is notably less laborious than directly verifying the C code. To make Cogent a more approachable and effective tool for developing real-world systems, we further strengthen the framework by extending the core language and its ecosystem. Specifically, we enrich the language to allow users to control the memory representation of algebraic data types, while retaining the automatic proof with a data layout refinement calculus. We repurpose existing tools in a novel way and develop an intuitive foreign function interface, which provides users a seamless experience when using Cogent in conjunction with native C. We augment the Cogent ecosystem with a property-based testing framework, which helps developers better understand the impact formal verification has on their programs and enables a progressive approach to producing high-assurance systems. Finally we explore refinement type systems, which we plan to incorporate into Cogent for more expressiveness and better integration of systems programmers with the verification process

    Accustomed to Obedience?

    Get PDF
    Many histories of Ancient Greece center their stories on Athens, but what would that history look like if they didn’t? There is another way to tell this story, one that situates Greek history in terms of the relationships between smaller Greek cities and in contact with the wider Mediterranean. In this book, author Joshua P. Nudell offers a new history of the period from the Persian wars to wars that followed the death of Alexander the Great, from the perspective of Ionia. While recent scholarship has increasingly treated Greece through the lenses of regional, polis, and local interaction, there has not yet been a dedicated study of Classical Ionia. This book fills this clear gap in the literature while offering Ionia as a prism through which to better understand Classical Greece. This book offers a clear and accessible narrative of the period between the Persian Wars and the wars of the early Hellenistic period, two nominal liberations of the region. The volume complements existing histories of Classical Greece. Close inspection reveals that the Ionians were active partners in the imperial endeavor, even as imperial competition constrained local decision-making and exacerbated local and regional tensions. At the same time, the book offers interventions on critical issues related to Ionia such as the Athenian conquest of Samos, rhetoric about the freedom of the Greeks, the relationship between Ionian temple construction and economic activity, the status of the Panionion, Ionian poleis and their relationship with local communities beyond the circle of the dodecapolis, and the importance of historical memory to our understanding of ancient Greece. The result is a picture of an Aegean world that is more complex and less beholden narratives that give primacy to the imperial actors at the expense of local developments

    A Lightweight Type System with Uniqueness and Typestates for the Java Cryptography API

    Get PDF
    Java cryptographic APIs facilitate building secure applications, but not all developers have strong cryptographic knowledge to use these APIs correctly. Several studies have shown that misuses of those cryptographic APIs may cause significant security vulnerabilities, compromising the integrity of applications and exposing sensitive data. Hence, it is an important problem to design methodologies and techniques, which can guide developers in building secure applications with minimum effort, and that are accessible to non-experts in cryptography. In this thesis, we present a methodology that reasons about the correct usage of Java cryptographic APIs with types, specifically targeting to cryptographic applications. Our type system combines aliasing control and the abstraction of object states into typestates, allowing users to express a set of user-defined disciplines on the use of cryptographic APIs and invariants on variable usage. More specifically, we employ the typestate automaton to depict typestates within our type system, and we control aliases by applying the principle of uniqueness to sensitive data. We mainly focus on the usage of initialization vectors. An initialization vector is a binary vector used as the input to initialize the state for the encryption of a plaintext block sequence. Randomization and uniqueness are crucial to an initialization vector. Failing to maintain a unique initialization vector for encryption can compromise confidentiality. Encrypting the same plaintext with the same initialization vector always yields the same ciphertext, thereby simplifying the attacker's task of guessing the cipher pattern. To address this problem practically, we implement our approach as a pluggable type system on top of the EISOP Checker Framework. To minimize the cryptographic expertise required by application developers looking to incorporate secure computing concepts into their software, our approach allows cryptographic experts to plug in the protocols into the system. In this setting, developers merely need to provide minimal annotations on sensitive data—requiring little cryptographic knowledge. We also evaluated our work by performing experiments over one benchmark and 7 real-world Java projects from Github. We found that 6 out 7 projects have security issues. In summary, we found 12 misuses in initialization vectors
    • …
    corecore