12,937 research outputs found
CODEWEAVE: exploring fine-grained mobility of code
This paper is concerned with an abstract exploration of code mobility constructs designed for use in settings where the level of granularity associated with the mobile units exhibits significant variability. Units of mobility that are both finer and coarser grained than the unit of execution are examined. To accomplish this, we take the extreme view that every line of code and every variable declaration are potentially mobile, i.e., it may be duplicated or moved from one program context to another on the same host or across the network. We also assume that complex code assemblies may move with equal ease. The result is CODEWEAVE, a model that shows how to develop new forms of code mobility, assign them precise meaning, and facilitate formal verification of programs employing them. The design of CODEWEAVE relies greatly on Mobile UNITY, a notation and proof logic for mobile computing. Mobile UNITY offers a computational milieu for examining a wide range of constructs and semantic alternatives in a clean abstract setting, i.e., unconstrained by compilation and performance considerations traditionally associated with programming language design. Ultimately, the notation offered by CODEWEAVE is given exact semantic definition by means of a direct mapping to the underlying Mobile UNITY model. The abstract and formal treatment of code mobility offered by CODEWEAVE establishes a technical foundation for examining competing proposals and for subsequent integration of some of the mobility constructs both at the language level and within middleware for mobility
Putting it Right? The Labour Party's Big Shift on Immigration Since 2010
This is the peer reviewed version of the following article: Putting it right? The labour party's big shift on immigration since 2010, which has been published in final form at 10.1111/1467-923X.12091. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving
Multifaceted Faculty Network Design and Management: Practice and Experience Report
We report on our experience on multidimensional aspects of our faculty's
network design and management, including some unique aspects such as
campus-wide VLANs and ghosting, security and monitoring, switching and routing,
and others. We outline a historical perspective on certain research, design,
and development decisions and discuss the network topology, its scalability,
and management in detail; the services our network provides, and its evolution.
We overview the security aspects of the management as well as data management
and automation and the use of the data by other members of the IT group in the
faculty.Comment: 19 pages, 11 figures, TOC and index; a short version presented at
C3S2E'11; v6: more proofreading, index, TOC, reference
Olympic rings of steel: Constructing security for 2012 and beyond
Academic and political commentators have commonly sought to understand the Olympics as a cultural dynamic, a "spectacle" that motivates certain actors to project their relative interests in localized spaces and as well on a global scale (Hiller 2006; Boyle and Haggerty 2009b ). Mega-events, as this argument goes, are monumental cultural events (Roche 2000) that rely on the audacity of spectacle to dramatize and condition the cultural, political, legal and economic landscape. Extending these insights into surveillance studies, Boyle and Haggerty (2009b: 259-260) position spectacle and the disciplinary mechanisms of anxieties associated with mega-events to explain the risk management practices of security planners. The dynamic social implications of the spectacle condition dramatic regimes of securitization and surveillance such that sovereign power emanates from the production and consumption of spectacle. In similar fashion Vida Bajc (2007: 1648) writes that security meta-rituals "demonstrate[s] that the process of transformation of [the] public space [of mega-events] from one of routine of daily life into a sterile area [that] has a ritual form [that] .... separates insiders from outsiders and brings about a new socio-political reality." Put another way, the "security-meta ritual" legitimates security and surveillance practices by normalizing the social hierarchies it imposes. Bajc focuses on the over-determination of dividing practices in mega-event security, but the signifying practices associated with capital are absent (perhaps due to her empirical focus on presidential addresses). Klauser (2008: 181) links commercialization and mechanisms of surveillance, but only by foregrounding the significance of "neutralized space" created by granting absolute commercial rights to event sponsors. Neoliberalprivatization and its articulation with security and surveillance, however, cannot be reduced to control over sponsorship rights and consumptive practices in particular urban "zones," nor can it be limited by the methodological temporality of the event itself
Inside the Image and the Word: the Re/membering of Indigenous Identities
By appropriating the power of writing of the phonetic Latin alphabet and recent visual technology, new generations of indigenous people from the Americas have been able to articulate and reinforce their own sense of identity from within their cultural constructs. In so doing, they have been shaping new narratives of indigenous adaptation and survival based on native ontologies and epistemologies that critically decolonize the homogenizing forces of national and global rhetoric. I argue that the texts under examination put forward ways to conceive and to know individual and communal identity that cannot be understood outside specific, ancient notions of territoriality and re/membering
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in todayâs real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view
libcppa - Designing an Actor Semantic for C++11
Parallel hardware makes concurrency mandatory for efficient program
execution. However, writing concurrent software is both challenging and
error-prone. C++11 provides standard facilities for multiprogramming, such as
atomic operations with acquire/release semantics and RAII mutex locking, but
these primitives remain too low-level. Using them both correctly and
efficiently still requires expert knowledge and hand-crafting. The actor model
replaces implicit communication by sharing with an explicit message passing
mechanism. It applies to concurrency as well as distribution, and a lightweight
actor model implementation that schedules all actors in a properly
pre-dimensioned thread pool can outperform equivalent thread-based
applications. However, the actor model did not enter the domain of native
programming languages yet besides vendor-specific island solutions. With the
open source library libcppa, we want to combine the ability to build reliable
and distributed systems provided by the actor model with the performance and
resource-efficiency of C++11.Comment: 10 page
Proof-of-Concept Application - Annual Report Year 1
In this document the Cat-COVITE Application for use in the CATNETS Project is introduced and motivated. Furthermore an introduction to the catallactic middleware and Web Services Agreement (WS-Agreement) concepts is given as a basis for the future work. Requirements for the application of Cat-COVITE with in catallactic systems are analysed. Finally the integration of the Cat-COVITE application and the catallactic middleware is described. --Grid Computing
Advanced manned space flight simulation and training: An investigation of simulation host computer system concepts
The findings of a preliminary investigation by Southwest Research Institute (SwRI) in simulation host computer concepts is presented. It is designed to aid NASA in evaluating simulation technologies for use in spaceflight training. The focus of the investigation is on the next generation of space simulation systems that will be utilized in training personnel for Space Station Freedom operations. SwRI concludes that NASA should pursue a distributed simulation host computer system architecture for the Space Station Training Facility (SSTF) rather than a centralized mainframe based arrangement. A distributed system offers many advantages and is seen by SwRI as the only architecture that will allow NASA to achieve established functional goals and operational objectives over the life of the Space Station Freedom program. Several distributed, parallel computing systems are available today that offer real-time capabilities for time critical, man-in-the-loop simulation. These systems are flexible in terms of connectivity and configurability, and are easily scaled to meet increasing demands for more computing power
Bursting the bubble : the pseudo- development strategies of microstates
Developing microstates are bountiful on the world political map today. Yet the concept of smallness, apart from being relativistic, conjures up a sense of deviation, indicative of a subtle discrimination which implicitly takes large to be normal and preferable. Based on an extensive yet selective literature review, this article suggests that the orthodox development paradigm, in both its liberal and radical traditions, has borne little relevance to small developing states, either in theory or in practice. On looking more closely at the survival strategies of developing micro-economies, it is proposed that a different conceptualization of âdevelopmentâ is warranted; one which, for all its negative connotations, is both plausible and consistent with the peculiar practices of microstates.peer-reviewe
- âŚ