17,070 research outputs found

    Choosing more mathematics : happiness through work?

    Get PDF
    This paper examines how A-level students construct relationships between work and happiness in their accounts of choosing mathematics and further mathematics A-level. I develop a theoretical framework that positions work and happiness as opposed, managed and working on the self and use this to examine students' dual engagement with individual practices of the self and institutional practices of school mathematics. Interviews with students acknowledge four imperatives that they use as discursive resources to position themselves as successful/unsuccessful students: you have to work, you have to not work, you have to be happy, you have to work at being happy. Tensions in these positions lead students to rework their identities or drop further mathematics. I then identify the practices of mathematics teaching that students use to explain un/happiness in work, and show how dependable mathematics and working together are constructed as 'happy objects' for students, who develop strategies for claiming control over these shapers of happiness. © 2010 British Society for Research into Learning Mathematics

    Recording accurate process documentation in the presence of failures

    No full text
    Scientific and business communities present unprecedented requirements on provenance, where the provenance of some data item is the process that led to that data item. Previous work has conceived a computer-based representation of past executions for determining provenance, termed process documentation, and has developed a protocol, PReP, to record process documentation in service oriented architectures. However, PReP assumes a failure free environment. The presence of failures may lead to inaccurate process documentation, which does not reflect reality and hence cannot be trustful and utilized. This paper outlines our solution, F-PReP, a protocol for recording accurate process documentation in the presence of failures

    The Hair Dilemma: Conform to Mainstream Expectations or Emphasize Racial Identity

    Get PDF
    Throughout American history, skin color, eye color, and hair texture have had the power to shape the quality of Black people\u27s lives, and that trend continues today for Black women in the workplace

    Identifying Native Applications with High Assurance

    Get PDF
    The work described in this paper investigates the problem of identifying and deterring stealthy malicious processes on a host. We point out the lack of strong application iden- tication in main stream operating systems. We solve the application identication problem by proposing a novel iden- tication model in which user-level applications are required to present identication proofs at run time to be authenti- cated by the kernel using an embedded secret key. The se- cret key of an application is registered with a trusted kernel using a key registrar and is used to uniquely authenticate and authorize the application. We present a protocol for secure authentication of applications. Additionally, we de- velop a system call monitoring architecture that uses our model to verify the identity of applications when making critical system calls. Our system call monitoring can be integrated with existing policy specication frameworks to enforce application-level access rights. We implement and evaluate a prototype of our monitoring architecture in Linux as device drivers with nearly no modication of the ker- nel. The results from our extensive performance evaluation shows that our prototype incurs low overhead, indicating the feasibility of our model

    BlockChain: A distributed solution to automotive security and privacy

    Full text link
    Interconnected smart vehicles offer a range of sophisticated services that benefit the vehicle owners, transport authorities, car manufacturers and other service providers. This potentially exposes smart vehicles to a range of security and privacy threats such as location tracking or remote hijacking of the vehicle. In this article, we argue that BlockChain (BC), a disruptive technology that has found many applications from cryptocurrencies to smart contracts, is a potential solution to these challenges. We propose a BC-based architecture to protect the privacy of the users and to increase the security of the vehicular ecosystem. Wireless remote software updates and other emerging services such as dynamic vehicle insurance fees, are used to illustrate the efficacy of the proposed security architecture. We also qualitatively argue the resilience of the architecture against common security attacks

    Governing Migration: Immigrant Groups' Strategies in Three Italian Cities - Rome, Naples and Bari

    Get PDF
    Ethnic networks constitute an important component of immigrants’ integration in their host societies. This has been a particularly important strategy in Italy, where institutional assistance for immigrants is often paltry and problematic. This paper examines three ethnic communities in Italy that have been particularly successful in using their ethnic social capital for integrating into Italian society at the city level: the Mauritians in Bari, Filipinos in Rome and Chinese in Naples. Sending countries’ policies and programs, as well as the socio-historical context of ethnic relations within the countries has also influenced the patterns of these networks. The psychological or motivational element behind these groups’ migration project is also critical to their integration, and is often manifested on a group level. Keywords: Migration, Immigrant, Ethnic group
    • …
    corecore