3,483 research outputs found

    Displacement and the Humanities: Manifestos from the Ancient to the Present

    Get PDF
    This is the final version. Available on open access from MDPI via the DOI in this recordThis is a reprint of articles from the Special Issue published online in the open access journal Humanities (ISSN 2076-0787) (available at: https://www.mdpi.com/journal/humanities/special_issues/Manifestos Ancient Present)This volume brings together the work of practitioners, communities, artists and other researchers from multiple disciplines. Seeking to provoke a discourse around displacement within and beyond the field of Humanities, it positions historical cases and debates, some reaching into the ancient past, within diverse geo-chronological contexts and current world urgencies. In adopting an innovative dialogic structure, between practitioners on the ground - from architects and urban planners to artists - and academics working across subject areas, the volume is a proposition to: remap priorities for current research agendas; open up disciplines, critically analysing their approaches; address the socio-political responsibilities that we have as scholars and practitioners; and provide an alternative site of discourse for contemporary concerns about displacement. Ultimately, this volume aims to provoke future work and collaborations - hence, manifestos - not only in the historical and literary fields, but wider research concerned with human mobility and the challenges confronting people who are out of place of rights, protection and belonging

    A Framework for Resilient, Transparent, High-throughput, Privacy-Enabled Central Bank Digital Currencies

    Get PDF
    Central Bank Digital Currencies refer to the digitization of lifecycle\u27s of central bank money in a way that meets first of a kind requirements for transparency in transaction processing, interoperability with legacy or new world, and resilience that goes beyond the traditional crash fault tolerant model. This comes in addition to legacy system requirements for privacy and regulation compliance, that may differ from central bank to central bank. This paper introduces a novel framework for Central Bank Digital Currency settlement that outputs a system of record---acting a a trusted source of truth serving interoperation, and dispute resolution/fraud detection needs---, and brings together resilience in the event of parts of the system being compromised, with throughput comparable to crash-fault tolerant systems. Our system further exhibits agnosticity of the exact cryptographic protocol adopted for meeting privacy, compliance and transparency objectives, while ensuring compatibility with the existing protocols in the literature. For the latter, performance is architecturally guaranteed to scale horizontally. We evaluated our system\u27s performance using an enhanced version of Hyperledger Fabric, showing how a throughput of >100K TPS can be supported even with computation-heavy privacy-preserving protocols are in place

    LIPIcs, Volume 251, ITCS 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 251, ITCS 2023, Complete Volum

    TransEdge: Supporting Efficient Read Queries Across Untrusted Edge Nodes

    Full text link
    We propose Transactional Edge (TransEdge), a distributed transaction processing system for untrusted environments such as edge computing systems. What distinguishes TransEdge is its focus on efficient support for read-only transactions. TransEdge allows reading from different partitions consistently using one round in most cases and no more than two rounds in the worst case. TransEdge design is centered around this dependency tracking scheme including the consensus and transaction processing protocols. Our performance evaluation shows that TransEdge's snapshot read-only transactions achieve an 9-24x speedup compared to current byzantine systems

    Secure storage systems for untrusted cloud environments

    Get PDF
    The cloud has become established for applications that need to be scalable and highly available. However, moving data to data centers owned and operated by a third party, i.e., the cloud provider, raises security concerns because a cloud provider could easily access and manipulate the data or program flow, preventing the cloud from being used for certain applications, like medical or financial. Hardware vendors are addressing these concerns by developing Trusted Execution Environments (TEEs) that make the CPU state and parts of memory inaccessible from the host software. While TEEs protect the current execution state, they do not provide security guarantees for data which does not fit nor reside in the protected memory area, like network and persistent storage. In this work, we aim to address TEEs’ limitations in three different ways, first we provide the trust of TEEs to persistent storage, second we extend the trust to multiple nodes in a network, and third we propose a compiler-based solution for accessing heterogeneous memory regions. More specifically, ‱ SPEICHER extends the trust provided by TEEs to persistent storage. SPEICHER implements a key-value interface. Its design is based on LSM data structures, but extends them to provide confidentiality, integrity, and freshness for the stored data. Thus, SPEICHER can prove to the client that the data has not been tampered with by an attacker. ‱ AVOCADO is a distributed in-memory key-value store (KVS) that extends the trust that TEEs provide across the network to multiple nodes, allowing KVSs to scale beyond the boundaries of a single node. On each node, AVOCADO carefully divides data between trusted memory and untrusted host memory, to maximize the amount of data that can be stored on each node. AVOCADO leverages the fact that we can model network attacks as crash-faults to trust other nodes with a hardened ABD replication protocol. ‱ TOAST is based on the observation that modern high-performance systems often use several different heterogeneous memory regions that are not easily distinguishable by the programmer. The number of regions is increased by the fact that TEEs divide memory into trusted and untrusted regions. TOAST is a compiler-based approach to unify access to different heterogeneous memory regions and provides programmability and portability. TOAST uses a load/store interface to abstract most library interfaces for different memory regions

    Priority-Driven Differentiated Performance for NoSQL Database-As-a-Service

    Get PDF
    Designing data stores for native Cloud Computing services brings a number of challenges, especially if the Cloud Provider wants to offer database services capable of controlling the response time for specific customers. These requests may come from heterogeneous data-driven applications with conflicting responsiveness requirements. For instance, a batch processing workload does not require the same level of responsiveness as a time-sensitive one. Their coexistence may interfere with the responsiveness of the time-sensitive workload, such as online video gaming, virtual reality, and cloud-based machine learning. This paper presents a modification to the popular MongoDB NoSQL database to enable differentiated per-user/request performance on a priority basis by leveraging CPU scheduling and synchronization mechanisms available within the Operating System. This is achieved with minimally invasive changes to the source code and without affecting the performance and behavior of the database when the new feature is not in use. The proposed extension has been integrated with the access-control model of MongoDB for secure and controlled access to the new capability. Extensive experimentation with realistic workloads demonstrates how the proposed solution is able to reduce the response times for high-priority users/requests, with respect to lower-priority ones, in scenarios with mixed-priority clients accessing the data store

    Amazonian Vision: Representations of Women Artists in Victorian Fiction

    Get PDF
    Title from PDF of title page, viewed June 14, 2023Dissertation advisors: Jennifer Phegley and Linda MitchellVitaIncludes bibliographical references (pages 320-337)Dissertation (Ph.D.)--Department of English Language and Literature. Department of History. University of Missouri--Kansas City, 2023This dissertation examines representations of women artists—writers, musicians, painters, and photographers—in nineteenth-century British novels and poetry written by Charlotte BrontĂ«, Elizabeth Barrett Browning, George Eliot, Anne BrontĂ«, Dinah Craik, Charlotte Yonge, and Amy Levy. It analyzes how their heroines wield literal and metaphorical vision to navigate the male gaze and male surveillance of the Victorian art world. These authors utilize the symbiotic relationship between vision and art to contest binary societal definitions that insisted men were creative and women imitative. This study is arranged by forms of vision adopted by the characters addressed in each chapter. Chapter one examines how the heroines of Charlotte Brontë’s Jane Eyre and Elizabeth Barrett Browning’s Aurora Leigh exercise “spiritual vision,” which facilitates Miltonic artistic agency as they author autobiographies following the blinding of their (male) romantic counterparts. Chapter two examines George Eliot’s use of contrasting characters in Middlemarch and Daniel Deronda to show how Eliot’s women must step outside of the frame as art objects and wield “moral vision” to realize her vision of the artist as an instrument of human sympathy. Chapter three examines the “Amazonian vision” adopted by women painters in Anne Brontë’s The Tenant of Wildfell Hall, Dinah Craik’s Olive, and Charlotte Yonge’s The Pillars of the House; they forge entry into the historically male-dominated visual art world and achieve financial self-sufficiency by selling their work. Finally, chapter four examines how adopting “metropolitan vision” empowers the speaker of Amy Levy’s “A London Plane-Tree” poems and the Lorimer sisters in her novel The Romance of a Shop, respectively, as a poet and as professional photographers. This work utilizes an interdisciplinary approach to synthesize discussion of the novels with historical sources—primarily art histories, biographies, the authors’ diaries and letters, and nineteenth-century periodical press articles. It finds that, in consideration of historical circumstances, the women authors under discussion exercised progressive vision of their own. This vision was surprisingly radical in its early manifestations but often reliant on spiritualization and abstraction; over time, in fiction as in history, women artists’ presence in the art world gained immediacy and strength.Spiritual vision: the miltonic artist in Jane Eyre and Aurora Leigh -- Moral vision: sympathy, vanity, and art in Middlemarch and Daniel Deronda -- Amazonian vision: painterly success in The tenant of Wildfell Hall, Olive, and The pillars of the house -- Metropolitan vision: London-inspired art in Amy Levy's "A London plane-tree" poems and The romance of a sho

    The Exile\u27s War

    Get PDF
    In Gaelwyn, the village of a thousand stories, Katchan receives a powerful ruby and an ancient technique called writing hidden by his grandmother, Maggaline. Jealous of the power Katchan has, the village Elder seeks to destroy him. After escaping the Elder, Katchan must leave his home and traverse a dangerous and mysterious wasteland that will lead him directly into an ancient conflict that lost a powerful empire to the sands of time

    Modern meat: the next generation of meat from cells

    Get PDF
    Modern Meat is the first textbook on cultivated meat, with contributions from over 100 experts within the cultivated meat community. The Sections of Modern Meat comprise 5 broad categories of cultivated meat: Context, Impact, Science, Society, and World. The 19 chapters of Modern Meat, spread across these 5 sections, provide detailed entries on cultivated meat. They extensively tour a range of topics including the impact of cultivated meat on humans and animals, the bioprocess of cultivated meat production, how cultivated meat may become a food option in Space and on Mars, and how cultivated meat may impact the economy, culture, and tradition of Asia
    • 

    corecore