12,937 research outputs found

    CODEWEAVE: exploring fine-grained mobility of code

    Get PDF
    This paper is concerned with an abstract exploration of code mobility constructs designed for use in settings where the level of granularity associated with the mobile units exhibits significant variability. Units of mobility that are both finer and coarser grained than the unit of execution are examined. To accomplish this, we take the extreme view that every line of code and every variable declaration are potentially mobile, i.e., it may be duplicated or moved from one program context to another on the same host or across the network. We also assume that complex code assemblies may move with equal ease. The result is CODEWEAVE, a model that shows how to develop new forms of code mobility, assign them precise meaning, and facilitate formal verification of programs employing them. The design of CODEWEAVE relies greatly on Mobile UNITY, a notation and proof logic for mobile computing. Mobile UNITY offers a computational milieu for examining a wide range of constructs and semantic alternatives in a clean abstract setting, i.e., unconstrained by compilation and performance considerations traditionally associated with programming language design. Ultimately, the notation offered by CODEWEAVE is given exact semantic definition by means of a direct mapping to the underlying Mobile UNITY model. The abstract and formal treatment of code mobility offered by CODEWEAVE establishes a technical foundation for examining competing proposals and for subsequent integration of some of the mobility constructs both at the language level and within middleware for mobility

    Putting it Right? The Labour Party's Big Shift on Immigration Since 2010

    Get PDF
    This is the peer reviewed version of the following article: Putting it right? The labour party's big shift on immigration since 2010, which has been published in final form at 10.1111/1467-923X.12091. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving

    Multifaceted Faculty Network Design and Management: Practice and Experience Report

    Get PDF
    We report on our experience on multidimensional aspects of our faculty's network design and management, including some unique aspects such as campus-wide VLANs and ghosting, security and monitoring, switching and routing, and others. We outline a historical perspective on certain research, design, and development decisions and discuss the network topology, its scalability, and management in detail; the services our network provides, and its evolution. We overview the security aspects of the management as well as data management and automation and the use of the data by other members of the IT group in the faculty.Comment: 19 pages, 11 figures, TOC and index; a short version presented at C3S2E'11; v6: more proofreading, index, TOC, reference

    Olympic rings of steel: Constructing security for 2012 and beyond

    Get PDF
    Academic and political commentators have commonly sought to understand the Olympics as a cultural dynamic, a "spectacle" that motivates certain actors to project their relative interests in localized spaces and as well on a global scale (Hiller 2006; Boyle and Haggerty 2009b ). Mega-events, as this argument goes, are monumental cultural events (Roche 2000) that rely on the audacity of spectacle to dramatize and condition the cultural, political, legal and economic landscape. Extending these insights into surveillance studies, Boyle and Haggerty (2009b: 259-260) position spectacle and the disciplinary mechanisms of anxieties associated with mega-events to explain the risk management practices of security planners. The dynamic social implications of the spectacle condition dramatic regimes of securitization and surveillance such that sovereign power emanates from the production and consumption of spectacle. In similar fashion Vida Bajc (2007: 1648) writes that security meta-rituals "demonstrate[s] that the process of transformation of [the] public space [of mega-events] from one of routine of daily life into a sterile area [that] has a ritual form [that] .... separates insiders from outsiders and brings about a new socio-political reality." Put another way, the "security-meta ritual" legitimates security and surveillance practices by normalizing the social hierarchies it imposes. Bajc focuses on the over-determination of dividing practices in mega-event security, but the signifying practices associated with capital are absent (perhaps due to her empirical focus on presidential addresses). Klauser (2008: 181) links commercialization and mechanisms of surveillance, but only by foregrounding the significance of "neutralized space" created by granting absolute commercial rights to event sponsors. Neoliberalprivatization and its articulation with security and surveillance, however, cannot be reduced to control over sponsorship rights and consumptive practices in particular urban "zones," nor can it be limited by the methodological temporality of the event itself

    Inside the Image and the Word: the Re/membering of Indigenous Identities

    Get PDF
    By appropriating the power of writing of the phonetic Latin alphabet and recent visual technology, new generations of indigenous people from the Americas have been able to articulate and reinforce their own sense of identity from within their cultural constructs. In so doing, they have been shaping new narratives of indigenous adaptation and survival based on native ontologies and epistemologies that critically decolonize the homogenizing forces of national and global rhetoric. I argue that the texts under examination put forward ways to conceive and to know individual and communal identity that cannot be understood outside specific, ancient notions of territoriality and re/membering

    A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view

    libcppa - Designing an Actor Semantic for C++11

    Full text link
    Parallel hardware makes concurrency mandatory for efficient program execution. However, writing concurrent software is both challenging and error-prone. C++11 provides standard facilities for multiprogramming, such as atomic operations with acquire/release semantics and RAII mutex locking, but these primitives remain too low-level. Using them both correctly and efficiently still requires expert knowledge and hand-crafting. The actor model replaces implicit communication by sharing with an explicit message passing mechanism. It applies to concurrency as well as distribution, and a lightweight actor model implementation that schedules all actors in a properly pre-dimensioned thread pool can outperform equivalent thread-based applications. However, the actor model did not enter the domain of native programming languages yet besides vendor-specific island solutions. With the open source library libcppa, we want to combine the ability to build reliable and distributed systems provided by the actor model with the performance and resource-efficiency of C++11.Comment: 10 page

    Proof-of-Concept Application - Annual Report Year 1

    Get PDF
    In this document the Cat-COVITE Application for use in the CATNETS Project is introduced and motivated. Furthermore an introduction to the catallactic middleware and Web Services Agreement (WS-Agreement) concepts is given as a basis for the future work. Requirements for the application of Cat-COVITE with in catallactic systems are analysed. Finally the integration of the Cat-COVITE application and the catallactic middleware is described. --Grid Computing

    Advanced manned space flight simulation and training: An investigation of simulation host computer system concepts

    Get PDF
    The findings of a preliminary investigation by Southwest Research Institute (SwRI) in simulation host computer concepts is presented. It is designed to aid NASA in evaluating simulation technologies for use in spaceflight training. The focus of the investigation is on the next generation of space simulation systems that will be utilized in training personnel for Space Station Freedom operations. SwRI concludes that NASA should pursue a distributed simulation host computer system architecture for the Space Station Training Facility (SSTF) rather than a centralized mainframe based arrangement. A distributed system offers many advantages and is seen by SwRI as the only architecture that will allow NASA to achieve established functional goals and operational objectives over the life of the Space Station Freedom program. Several distributed, parallel computing systems are available today that offer real-time capabilities for time critical, man-in-the-loop simulation. These systems are flexible in terms of connectivity and configurability, and are easily scaled to meet increasing demands for more computing power

    Bursting the bubble : the pseudo- development strategies of microstates

    Get PDF
    Developing microstates are bountiful on the world political map today. Yet the concept of smallness, apart from being relativistic, conjures up a sense of deviation, indicative of a subtle discrimination which implicitly takes large to be normal and preferable. Based on an extensive yet selective literature review, this article suggests that the orthodox development paradigm, in both its liberal and radical traditions, has borne little relevance to small developing states, either in theory or in practice. On looking more closely at the survival strategies of developing micro-economies, it is proposed that a different conceptualization of ‘development’ is warranted; one which, for all its negative connotations, is both plausible and consistent with the peculiar practices of microstates.peer-reviewe
    • …
    corecore