3,483 research outputs found
Displacement and the Humanities: Manifestos from the Ancient to the Present
This is the final version. Available on open access from MDPI via the DOI in this recordThis is a reprint of articles from the Special Issue published online in the open access journal Humanities (ISSN 2076-0787) (available at: https://www.mdpi.com/journal/humanities/special_issues/Manifestos Ancient Present)This volume brings together the work of practitioners, communities, artists and other researchers from multiple disciplines. Seeking to provoke a discourse around displacement within and beyond the field of Humanities, it positions historical cases and debates, some reaching into the ancient past, within diverse geo-chronological contexts and current world urgencies. In adopting an innovative dialogic structure, between practitioners on the ground - from architects and urban planners to artists - and academics working across subject areas, the volume is a proposition to: remap priorities for current research agendas; open up disciplines, critically analysing their approaches; address the socio-political responsibilities that we have as scholars and practitioners; and provide an alternative site of discourse for contemporary concerns about displacement. Ultimately, this volume aims to provoke future work and collaborations - hence, manifestos - not only in the historical and literary fields, but wider research concerned with human mobility and the challenges confronting people who are out of place of rights, protection and belonging
A Framework for Resilient, Transparent, High-throughput, Privacy-Enabled Central Bank Digital Currencies
Central Bank Digital Currencies refer to the digitization of lifecycle\u27s of central bank money in a way that meets first of a kind requirements for transparency in transaction processing, interoperability with legacy or new world, and resilience that goes beyond the traditional crash fault tolerant model. This comes in addition to legacy system requirements for privacy and regulation compliance, that may differ from central bank to central bank.
This paper introduces a novel framework for Central Bank Digital Currency settlement that outputs a system of record---acting a a trusted source of truth serving interoperation, and dispute resolution/fraud detection needs---, and brings together resilience in the event of parts of the system being compromised, with throughput comparable to crash-fault tolerant systems. Our system further exhibits agnosticity of the exact cryptographic protocol adopted for meeting privacy, compliance and transparency objectives, while ensuring compatibility with the existing protocols in the literature. For the latter, performance is architecturally guaranteed to scale horizontally. We evaluated our system\u27s performance using an enhanced version of Hyperledger Fabric, showing how a throughput of >100K TPS can be supported even with computation-heavy privacy-preserving protocols are in place
LIPIcs, Volume 251, ITCS 2023, Complete Volume
LIPIcs, Volume 251, ITCS 2023, Complete Volum
TransEdge: Supporting Efficient Read Queries Across Untrusted Edge Nodes
We propose Transactional Edge (TransEdge), a distributed transaction
processing system for untrusted environments such as edge computing systems.
What distinguishes TransEdge is its focus on efficient support for read-only
transactions. TransEdge allows reading from different partitions consistently
using one round in most cases and no more than two rounds in the worst case.
TransEdge design is centered around this dependency tracking scheme including
the consensus and transaction processing protocols. Our performance evaluation
shows that TransEdge's snapshot read-only transactions achieve an 9-24x speedup
compared to current byzantine systems
Secure storage systems for untrusted cloud environments
The cloud has become established for applications that need to be scalable and highly
available. However, moving data to data centers owned and operated by a third party,
i.e., the cloud provider, raises security concerns because a cloud provider could easily
access and manipulate the data or program flow, preventing the cloud from being
used for certain applications, like medical or financial.
Hardware vendors are addressing these concerns by developing Trusted Execution
Environments (TEEs) that make the CPU state and parts of memory inaccessible from
the host software. While TEEs protect the current execution state, they do not provide
security guarantees for data which does not fit nor reside in the protected memory
area, like network and persistent storage.
In this work, we aim to address TEEsâ limitations in three different ways, first we
provide the trust of TEEs to persistent storage, second we extend the trust to multiple
nodes in a network, and third we propose a compiler-based solution for accessing
heterogeneous memory regions. More specifically,
âą SPEICHER extends the trust provided by TEEs to persistent storage. SPEICHER
implements a key-value interface. Its design is based on LSM data structures, but
extends them to provide confidentiality, integrity, and freshness for the stored
data. Thus, SPEICHER can prove to the client that the data has not been tampered
with by an attacker.
âą AVOCADO is a distributed in-memory key-value store (KVS) that extends the
trust that TEEs provide across the network to multiple nodes, allowing KVSs to
scale beyond the boundaries of a single node. On each node, AVOCADO carefully
divides data between trusted memory and untrusted host memory, to maximize
the amount of data that can be stored on each node. AVOCADO leverages the
fact that we can model network attacks as crash-faults to trust other nodes with
a hardened ABD replication protocol.
âą TOAST is based on the observation that modern high-performance systems
often use several different heterogeneous memory regions that are not easily
distinguishable by the programmer. The number of regions is increased by the
fact that TEEs divide memory into trusted and untrusted regions. TOAST is a
compiler-based approach to unify access to different heterogeneous memory
regions and provides programmability and portability. TOAST uses a
load/store interface to abstract most library interfaces for different memory
regions
Priority-Driven Differentiated Performance for NoSQL Database-As-a-Service
Designing data stores for native Cloud Computing services brings a number of challenges, especially if the Cloud Provider wants to offer database services capable of controlling the response time for specific customers. These requests may come from heterogeneous data-driven applications with conflicting responsiveness requirements. For instance, a batch processing workload does not require the same level of responsiveness as a time-sensitive one. Their coexistence may interfere with the responsiveness of the time-sensitive workload, such as online video gaming, virtual reality, and cloud-based machine learning. This paper presents a modification to the popular MongoDB NoSQL database to enable differentiated per-user/request performance on a priority basis by leveraging CPU scheduling and synchronization mechanisms available within the Operating System. This is achieved with minimally invasive changes to the source code and without affecting the performance and behavior of the database when the new feature is not in use. The proposed extension has been integrated with the access-control model of MongoDB for secure and controlled access to the new capability. Extensive experimentation with realistic workloads demonstrates how the proposed solution is able to reduce the response times for high-priority users/requests, with respect to lower-priority ones, in scenarios with mixed-priority clients accessing the data store
Amazonian Vision: Representations of Women Artists in Victorian Fiction
Title from PDF of title page, viewed June 14, 2023Dissertation advisors: Jennifer Phegley and Linda MitchellVitaIncludes bibliographical references (pages 320-337)Dissertation (Ph.D.)--Department of English Language and Literature. Department of History. University of Missouri--Kansas City, 2023This dissertation examines representations of women artistsâwriters, musicians, painters, and photographersâin nineteenth-century British novels and poetry written by Charlotte BrontĂ«, Elizabeth Barrett Browning, George Eliot, Anne BrontĂ«, Dinah Craik, Charlotte Yonge, and Amy Levy. It analyzes how their heroines wield literal and metaphorical vision to navigate the male gaze and male surveillance of the Victorian art world. These authors utilize the symbiotic relationship between vision and art to contest binary societal definitions that insisted men were creative and women imitative.
This study is arranged by forms of vision adopted by the characters addressed in each chapter. Chapter one examines how the heroines of Charlotte BrontĂ«âs Jane Eyre and Elizabeth Barrett Browningâs Aurora Leigh exercise âspiritual vision,â which facilitates Miltonic artistic agency as they author autobiographies following the blinding of their (male) romantic counterparts. Chapter two examines George Eliotâs use of contrasting characters in Middlemarch and Daniel Deronda to show how Eliotâs women must step outside of the frame as art objects and wield âmoral visionâ to realize her vision of the artist as an instrument of human sympathy. Chapter three examines the âAmazonian visionâ adopted by women painters in Anne BrontĂ«âs The Tenant of Wildfell Hall, Dinah Craikâs Olive, and Charlotte Yongeâs The Pillars of the House; they forge entry into the historically male-dominated visual art world and achieve financial self-sufficiency by selling their work. Finally, chapter four examines how adopting âmetropolitan visionâ empowers the speaker of Amy Levyâs âA London Plane-Treeâ poems and the Lorimer sisters in her novel The Romance of a Shop, respectively, as a poet and as professional photographers.
This work utilizes an interdisciplinary approach to synthesize discussion of the novels with historical sourcesâprimarily art histories, biographies, the authorsâ diaries and letters, and nineteenth-century periodical press articles. It finds that, in consideration of historical circumstances, the women authors under discussion exercised progressive vision of their own. This vision was surprisingly radical in its early manifestations but often reliant on spiritualization and abstraction; over time, in fiction as in history, women artistsâ presence in the art world gained immediacy and strength.Spiritual vision: the miltonic artist in Jane Eyre and Aurora Leigh -- Moral vision: sympathy, vanity, and art in Middlemarch and Daniel Deronda -- Amazonian vision: painterly success in The tenant of Wildfell Hall, Olive, and The pillars of the house -- Metropolitan vision: London-inspired art in Amy Levy's "A London plane-tree" poems and The romance of a sho
The Exile\u27s War
In Gaelwyn, the village of a thousand stories, Katchan receives a powerful ruby and an ancient technique called writing hidden by his grandmother, Maggaline. Jealous of the power Katchan has, the village Elder seeks to destroy him. After escaping the Elder, Katchan must leave his home and traverse a dangerous and mysterious wasteland that will lead him directly into an ancient conflict that lost a powerful empire to the sands of time
Modern meat: the next generation of meat from cells
Modern Meat is the first textbook on cultivated meat, with contributions from over 100 experts within the cultivated meat community.
The Sections of Modern Meat comprise 5 broad categories of cultivated meat: Context, Impact, Science, Society, and World.
The 19 chapters of Modern Meat, spread across these 5 sections, provide detailed entries on cultivated meat. They extensively tour a range of topics including the impact of cultivated meat on humans and animals, the bioprocess of cultivated meat production, how cultivated meat may become a food option in Space and on Mars, and how cultivated meat may impact the economy, culture, and tradition of Asia
- âŠ