17,070 research outputs found
Choosing more mathematics : happiness through work?
This paper examines how A-level students construct relationships between work and happiness in their accounts of choosing mathematics and further mathematics A-level. I develop a theoretical framework that positions work and happiness as opposed, managed and working on the self and use this to examine students' dual engagement with individual practices of the self and institutional practices of school mathematics. Interviews with students acknowledge four imperatives that they use as discursive resources to position themselves as successful/unsuccessful students: you have to work, you have to not work, you have to be happy, you have to work at being happy. Tensions in these positions lead students to rework their identities or drop further mathematics. I then identify the practices of mathematics teaching that students use to explain un/happiness in work, and show how dependable mathematics and working together are constructed as 'happy objects' for students, who develop strategies for claiming control over these shapers of happiness. © 2010 British Society for Research into Learning Mathematics
Recording accurate process documentation in the presence of failures
Scientific and business communities present unprecedented requirements on provenance, where the provenance of some data item is the process that led to that data item. Previous work has conceived a computer-based representation of past executions for determining provenance, termed process documentation, and has developed a protocol, PReP, to record process documentation in service oriented architectures. However, PReP assumes a failure free environment. The presence of failures may lead to inaccurate process documentation, which does not reflect reality and hence cannot be trustful and utilized. This paper outlines our solution, F-PReP, a protocol for recording accurate process documentation in the presence of failures
The Hair Dilemma: Conform to Mainstream Expectations or Emphasize Racial Identity
Throughout American history, skin color, eye color, and hair texture have had the power to shape the quality of Black people\u27s lives, and that trend continues today for Black women in the workplace
Identifying Native Applications with High Assurance
The work described in this paper investigates the problem
of identifying and deterring stealthy malicious processes on
a host. We point out the lack of strong application iden-
tication in main stream operating systems. We solve the
application identication problem by proposing a novel iden-
tication model in which user-level applications are required
to present identication proofs at run time to be authenti-
cated by the kernel using an embedded secret key. The se-
cret key of an application is registered with a trusted kernel
using a key registrar and is used to uniquely authenticate
and authorize the application. We present a protocol for
secure authentication of applications. Additionally, we de-
velop a system call monitoring architecture that uses our
model to verify the identity of applications when making
critical system calls. Our system call monitoring can be
integrated with existing policy specication frameworks to
enforce application-level access rights. We implement and
evaluate a prototype of our monitoring architecture in Linux
as device drivers with nearly no modication of the ker-
nel. The results from our extensive performance evaluation
shows that our prototype incurs low overhead, indicating the
feasibility of our model
BlockChain: A distributed solution to automotive security and privacy
Interconnected smart vehicles offer a range of sophisticated services that
benefit the vehicle owners, transport authorities, car manufacturers and other
service providers. This potentially exposes smart vehicles to a range of
security and privacy threats such as location tracking or remote hijacking of
the vehicle. In this article, we argue that BlockChain (BC), a disruptive
technology that has found many applications from cryptocurrencies to smart
contracts, is a potential solution to these challenges. We propose a BC-based
architecture to protect the privacy of the users and to increase the security
of the vehicular ecosystem. Wireless remote software updates and other emerging
services such as dynamic vehicle insurance fees, are used to illustrate the
efficacy of the proposed security architecture. We also qualitatively argue the
resilience of the architecture against common security attacks
Governing Migration: Immigrant Groups' Strategies in Three Italian Cities - Rome, Naples and Bari
Ethnic networks constitute an important component of immigrants’ integration in their host societies. This has been a particularly important strategy in Italy, where institutional assistance for immigrants is often paltry and problematic. This paper examines three ethnic communities in Italy that have been particularly successful in using their ethnic social capital for integrating into Italian society at the city level: the Mauritians in Bari, Filipinos in Rome and Chinese in Naples. Sending countries’ policies and programs, as well as the socio-historical context of ethnic relations within the countries has also influenced the patterns of these networks. The psychological or motivational element behind these groups’ migration project is also critical to their integration, and is often manifested on a group level. Keywords: Migration, Immigrant, Ethnic group
- …