3,487 research outputs found

    Violent and victimized bodies: sexual violence policy in England and Wales

    Get PDF
    This paper uses the notion of the body to frame an archaeology of sexual violence policy in England and Wales, applying and developing Pillow’s ideas. It argues that the dominant construction is of sexual violence as an individualized crime, with the solution being for a survivor to report, and with support often instrumentalized in relation to criminal justice objectives. However, criminal justice proceedings can intensify or create further trauma for sexual violence survivors. Furthermore, in addition to criminalizing the violent body and supporting the victimized one, there is a need for policy to produce alternative types of bodies through preventative interventions. Much sexual violence is situated within (hetero) sexual dynamics constructing a masculine aggressor and a feminine body which eventually yields. Prevention must therefore focus on developing embodied boundaries, and narratives at the margins of policy could underpin such efforts

    Transactional Sapphire: Lessons in High Performance, On-the-fly Garbage Collection

    Get PDF
    Constructing a high-performance garbage collector is hard. Constructing a fully concurrent 'on-the-fly', compacting collector is much more so. We describe our experience of implementing the Sapphire algorithm as the first on-the-fly, parallel, replication copying, garbage collector for the Jikes RVM Java virtual machine. In part, we explain our innovations such as copying with hardware and software transactions, on-the-fly management of Java's reference types and simple, yet correct, lock-free management of volatile fields in a replicating collector. We fully evaluate, for the first time, and using realistic benchmarks, Sapphire's performance and suitability as a low latency collector. An important contribution of this work is a detailed description of our experience of building an on-the-fly copying collector for a complete JVM with some assurance that it is correct. A key aspect of this is model checking of critical components of this complicated and highly concurrent system

    Intersections of Gender and Ethnicity in "Brown Girl in the Ring" by Nalo Hopkinson : Haitian Diaspora and Hybridity, and the Controlling Images of Black Women

    Get PDF
    The topic of my thesis is the analysis of intersections of gender and ethnicity in Nalo Hopkinson's debut novel, "Brown Girl in the Ring" (1998). I do this by focusing on the two main characters, Gros-Jeanne, and Ti-Jeanne. Gros-Jeanne's section concentrates on Haitian diaspora and hybridity while Ti-Jeanne's section centers the controlling images of Black women. The aim is to answer the following questions: (1) How does gender intersect with ethnicity by emphasising the oppression of Black women? (2) How does Gros-Jeanne and Ti-Jeanne fight the oppression? The framework for my analysis comes from Black Feminism and intersectionality. Barbara Smith, bell hooks, Barbara Christian, and Patricia Hill Collins form the base of the theory, but other critics are also used throughout the thesis. The purpose is to shed light onto the unique experiences of Black women. The analysis revealed that being Black and female are always intra-connected. Having Haitian heritage makes Gros-Jeanne the Other of the society, and her Haitian practices of herbal medicine are simultaneously shunned and exploited. Ti-Jeanne, on the other hand, is forced to live with the images of the matriarch and the sapphire created for Black women to justify their oppression. They both fight the injustice by demonstrating their Black womanhood is what also makes them strong

    Windows-pohjaisen myyntikonfiguraattorin muuntaminen web-pohjaiseksi sovellukseksi

    Get PDF
    Sales configrator is a key component of a home builder ERP system. In a typical sales meeting the home buyer sits down with a sales representative to select where the home should be build, what kind of home will be build and what extra options will be selected. The configurator needs to be able to calculate correct prices, enable/disable options based on rule sets and store the selections to a permanent storage. Traditionally this meeting has been organized at the home builder's premises using a desktop computer but further flexibility is often needed. It is a general trend that traditional platform dependent applications have been migrated to web applications. There are several benefits for the users to be able to run applications in a web browser on most of the devices they might use without the need to install any application on their devices. The continuous development of different web framework technologies have made this possible and easier than ever before. The goal of this thesis is to migrate an old Windows native sales configurator to a web application and to find out what benefits such migration is expected to yield and what kinds of obstacles need to be overcome. This thesis presents one possible way to create a web application UI using React web development framework and the back-end server access using ODATA web API. This thesis also presents two different ways (code quality measurements and performance evaluation) to measure the success of an application migration from Windows native C\# WebForms application to a JavaScript based web application.Myyntikonfiguraattori on tärkeässä roolissa omakotitalorakennuttajille suunnatuissa toiminnanohjausjärjestelmissä. Tyypillisesti myyntitapahtumassa kodin ostaja istuu välittäjän kanssa konfiguraattorin äärellä ja valitsee, minkälaisen talon hän haluaa, mihin se tulee rakentaa ja minkälaisia lisävalintoja ostaja mahdollisesti haluaa. Konfiguraattorin tehtävä on laskea talolle oikea hinta, näyttää/piilottaa valinnat niihin liittyvien sääntöjen perusteella ja tallettaa asiakkaan valinnat johonkin pysyvään tietokantaan. Perinteisesti tämä tapaaminen on järjestetty talonrakennuttajan tiloissa pöytäkoneen äärellä, mutta nykyään tapaaminen usein halutaan järjestää joustavammin asiakkaan ehdoilla. Nykysuuntauksen mukaisesti ohjelmistoja kehitetään usein suoraan web-sovelluksiksi tai vanhoja alustariippuvaisia sovelluksia muunnetaan web-sovelluksiksi. Kyvyssä ajaa sovellusta selaimessa on useita hyötyjä kuten se, että web-sovelluksia voi ajaa eri laitteilla eivätkä ne vaadi käyttäjää asentamaan mitään niihin. Erilaisten web-kehitystekniikoiden kehitys on tehnyt monimutkaisten web-sovellusten tekemisestä mahdollista ja helpompaa kuin koskaan aikaisemmin. Tämän diplomityön tavoitteena on muuntaa vanha Windows-pohjainen myyntikonfiguraattori web-sovellukseksi sekä samalla tutkia, mitä hyötyjä muuntamisesta on ja minkälaisia haasteita muuntamiseen sisältyy. Tämä diplomityö esittää yhden mahdollisen toteutustavan käyttäen React web-kehitysympäristöä sekä ODATA web-ohjelmointirajapintaa. Tässä työssä esitetään myös kaksi eri tapaa (koodin laadun estimointi ja suorituskyvyn evaluointi), joilla tämänkaltaisen muunnostyön onnistumista voi arvioida ja mitata

    Autonomous Satellite Command and Control through the World Wide Web: Phase 3

    Get PDF
    NASA's New Millenium Program (NMP) has identified a variety of revolutionary technologies that will support orders of magnitude improvements in the capabilities of spacecraft missions. This program's Autonomy team has focused on science and engineering automation technologies. In doing so, it has established a clear development roadmap specifying the experiments and demonstrations required to mature these technologies. The primary developmental thrusts of this roadmap are in the areas of remote agents, PI/operator interface, planning/scheduling fault management, and smart execution architectures. Phases 1 and 2 of the ASSET Project (previously known as the WebSat project) have focused on establishing World Wide Web-based commanding and telemetry services as an advanced means of interfacing a spacecraft system with the PI and operators. Current automated capabilities include Web-based command submission, limited contact scheduling, command list generation and transfer to the ground station, spacecraft support for demonstrations experiments, data transfer from the ground station back to the ASSET system, data archiving, and Web-based telemetry distribution. Phase 2 was finished in December 1996. During January-December 1997 work was commenced on Phase 3 of the ASSET Project. Phase 3 is the subject of this report. This phase permitted SSDL and its project partners to expand the ASSET system in a variety of ways. These added capabilities included the advancement of ground station capabilities, the adaptation of spacecraft on-board software, and the expansion of capabilities of the ASSET management algorithms. Specific goals of Phase 3 were: (1) Extend Web-based goal-level commanding for both the payload PI and the spacecraft engineer; (2) Support prioritized handling of multiple PIs as well as associated payload experimenters; (3) Expand the number and types of experiments supported by the ASSET system and its associated spacecraft; (4) Implement more advanced resource management, modeling and fault management capabilities that integrate the space and ground segments of the space system hardware; (5) Implement a beacon monitoring test; (6) Implement an experimental blackboard controller for space system management; (7) Further define typical ground station developments required for Internet-based remote control and for full system automation of the PI-to-spacecraft link. Each of those goals is examined in the next section. Significant sections of this report were also published as a conference paper

    Using Execution Transactions To Recover From Buffer Overflow Attacks

    Get PDF
    We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based buffer overflow and underflow attacks, and recover from them by allowing the program to continue execution. Our hypothesis is that we can treat each code function as a transaction that can be aborted when an attack is detected, without affecting the application's ability to correctly execute. Our approach allows us to selectively enable or disable components of this defensive mechanism in response to external events, allowing for a direct tradeoff between security and performance. We combine our defensive mechanism with a honeypot-like configuration to detect previously unknown attacks and automatically adapt an application's defensive posture at a negligible performance cost, as well as help determine a worm's signature. The main benefits of our scheme are its low impact on application performance, its ability to respond to attacks without human intervention, its capacity to handle previously unknown vulnerabilities, and the preservation of service availability. We implemented a stand-alone tool, DYBOC, which we use to instrument a number of vulnerable applications. Our performance benchmarks indicate a slow-down of 20% for Apache in full-protection mode, and 1.2% with partial protection. We validate our transactional hypothesis via two experiments: first, by applying our scheme to 17 vulnerable applications, successfully fixing 14 of them; second, by examining the behavior of Apache when each of 154 potentially vulnerable routines are made to fail, resulting in correct behavior in 139 of cases

    Countering Code Injection Attacks With Instruction Set Randomization

    Get PDF
    We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff's principle, by creating process-specific randomized instruction sets (e.g., machine instructions) of the system executing potentially vulnerable software. An attacker who does not know the key to the randomization algorithm will inject code that is invalid for that randomized processor, causing a runtime exception. To determine the difficulty of integrating support for the proposed mechanism in the operating system, we modified the Linux kernel, the GNU binutils tools, and the bochs-x86 emulator. Although the performance penalty is significant, our prototype demonstrates the feasibility of the approach, and should be directly usable on a suitable-modified processor (e.g., the Transmeta Crusoe).Our approach is equally applicable against code-injecting attacks in scripting and interpreted languages, e.g., web-based SQL injection. We demonstrate this by modifying the Perl interpreter to permit randomized script execution. The performance penalty in this case is minimal. Where our proposed approach is feasible (i.e., in an emulated environment, in the presence of programmable or specialized hardware, or in interpreted languages), it can serve as a low-overhead protection mechanism, and can easily complement other mechanisms

    Montana Kaimin, March 1-7, 2017

    Get PDF
    Student newspaper of the University of Montana, Missoula.https://scholarworks.umt.edu/studentnewspaper/7996/thumbnail.jp

    Establishing safe havens: a comparative study between the UK and the UAE of the infrastructure for improving the reporting and detection of rape against women

    Get PDF
    Rape, as a crime of power and dominance over women. The United Arab Emirates is developing its infrastructure and systems with a strategic goal to be amongst the best countries in the world. A comparative analysis between the UK and the UAE was conducted to determine if the UAE could offer more support to female rape victims, the analysis in this study first examined the procedures and supports the UK and the UAE utilized in rape cases, which indicated the UK was more advanced in its support resources offered to female victims of rape, as well as the investigative and prosecutorial components of adjudicating these cases. This analysis included survey data from UAE and UK samples from police and legal rape experts, which was analysed and formed the recommendations for a Female Support Centre (FSC) in the UAE, confirmed by field visits to specialised rape crisis centres in the UK. Findings supported introducing essential support for female rape victims, specialised investigative techniques and more efficient, prosecutorial and adjudicative processes into the proposed FSCs’. The findings highlighted areas of specific strategies to be included in the FSC to include increased public awareness and having a multi-functioning facility which offers victim centred, immediate and comprehensive care. The types of services and care supported in the survey findings centred on legal support, emotional counselling, medical care and forensic capabilities, ways of allowing victims to talk about their attack without fear, keeping them informed of all the updates in the case, improving the methods of collective evidence, and maintaining consistent service quality standards
    corecore