241,295 research outputs found
Signs of the Times: Nineteenth - Twentieth Century Graffiti in the Farms of the Yorkshire Wolds
This paper is concerned with graffiti found in farm buildings on the Yorkshire Wolds, dating between the late nineteenth and late twentieth centuries. It uses an archaeological approach to explore the social and performative nature of these inscriptions, to analyse their content and character, and to consider the communities responsible for their creation. We argue that this was a vital medium of expression for a particular group of farm-workers â the horselads â and was part of the way in which they negotiated their status and identity during a period of great social upheaval and agricultural change (Giles and Giles 2007). We situate the making of these marks within the horseladsâ seasonal rhythms of labour and broader patterns of inhabitation. Finally, we explore spatial and stratigraphic relationships associated with graffiti panels, to elucidate different groups within these communities, and analyse how they changed over time
A First Practical Fully Homomorphic Crypto-Processor Design: The Secret Computer is Nearly Here
Following a sequence of hardware designs for a fully homomorphic
crypto-processor - a general purpose processor that natively runs encrypted
machine code on encrypted data in registers and memory, resulting in encrypted
machine states - proposed by the authors in 2014, we discuss a working
prototype of the first of those, a so-called `pseudo-homomorphic' design. This
processor is in principle safe against physical or software-based attacks by
the owner/operator of the processor on user processes running in it. The
processor is intended as a more secure option for those emerging computing
paradigms that require trust to be placed in computations carried out in remote
locations or overseen by untrusted operators.
The prototype has a single-pipeline superscalar architecture that runs
OpenRISC standard machine code in two distinct modes. The processor runs in the
encrypted mode (the unprivileged, `user' mode, with a long pipeline) at 60-70%
of the speed in the unencrypted mode (the privileged, `supervisor' mode, with a
short pipeline), emitting a completed encrypted instruction every 1.67-1.8
cycles on average in real trials.Comment: 6 pages, draf
Accounting for knowledge embedded in physical objects and environments : the role of artefacts in transferring knowledge
The intention to investigate the role of artefacts (objects and environments) in codifying, embedding and disseminating knowledge was inspired by an awareness that organisations across all sectors are increasingly being asked not only to provide products in the first instance, but also to support them throughout their service life. Thus a move from product-delivery to product-service designs is suggested. This paper considers ways in which knowledge can be embedded into the physical properties of artefacts and how this can consequently aid the dissemination and management of knowledge in and across stages of life cycles. A literature review and fieldwork based on an ethnomethodological approach are used to investigate this topic. Accounts of the situated meaning of artefacts within social processes are obtained using ethnographic armchair research. Unique adequacy is used to achieve an understanding of how people make sense of artefacts. The initial findings of the current research show that knowledge can be embedded or encoded into the physical properties of artefacts and that this can be successfully transferred from artefact to user
Harmonious architecture and kinetic linear energy
This is a chapter in a book based upon the work from an Erasmus International Project which took place in Athens in July 2012
Influencing driver behaviour through road marking
This paper will describe how road marking can be used to influence driver behaviour in order to improve road safety and traffic flows. Extensive use will be made of examples from recent research undertaken by the authors on overtaking lane design, speed change management, managing speed around curves and improving the safety of high risk sections of roads. This research included both on-road and driving simulator-based measurements. The concept of self explaining roads and what is required to implement it will also be described
Time-division SQUID multiplexers with reduced sensitivity to external magnetic fields
Time-division SQUID multiplexers are used in many applications that require
exquisite control of systematic error. One potential source of systematic error
is the pickup of external magnetic fields in the multiplexer. We present
measurements of the field sensitivity figure of merit, effective area, for both
the first stage and second stage SQUID amplifiers in three NIST SQUID
multiplexer designs. These designs include a new variety with improved
gradiometry that significantly reduces the effective area of both the first and
second stage SQUID amplifiers.Comment: 4 pages, 7 figures. Submitted for publication in the IEEE
Transactions on Applied Superconductivity, August 201
Spartan Daily, September 30, 2014
Volume 143, Issue 14https://scholarworks.sjsu.edu/spartandaily/1513/thumbnail.jp
- âŠ