3,166 research outputs found

    More Effective Protection for Native American Cultural Property Through Regulation of Export

    Get PDF

    Subtitling Neapolitan Dialect in “My Brilliant Friend”: Linguistic Choices and Sociocultural Implications in the Screen Adaptation of Elena Ferrante’s Best-selling Novel.

    Get PDF
    n the screen adaptation of Elena Ferrante’s best-selling novel “My Brilliant Friend”, the first foreign language co-production of the American pay-cable network HBO with the Italian public broadcaster RAI, as a specific requirement of the American producers, the Italian of the main characters has been transformed into Neapolitan, a thick regional dialect mostly appropriate to tell the story of a life-long friendship on the backdrop of the 1950s poor outskirts of Naples, the main city of southern Italy. Starting from some background theories of cultural aspects of translation together with audiovisual translation, the aim of this presentation is that of analysing how English subtitlers have faced the translation of the dialectal elements in such a culture-bound audiovisual text and to what extent their choices depend on those made by Italian subtitlers, then discussing about the sociocultural implications of the solutions adopted. The data have been organized and presented with reference to the extralinguistic and the intralinguistic levels (in terms of syntactical, lexico-semantic and crosscultural pragmatic elements)

    A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)

    Full text link
    Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application. Moreover, the analysis should take into consideration how file-system vulnerabilities might in- teract with other vulnerabilities leading an attacker to breach into the web application. In this paper, we first propose a classification of file- system vulnerabilities, and then, based on this classification, we present a formal approach that allows one to exploit file-system vulnerabilities. We give a formal representation of web applications, databases and file- systems, and show how to reason about file-system vulnerabilities. We also show how to combine file-system vulnerabilities and SQL-Injection vulnerabilities for the identification of complex, multi-stage attacks. We have developed an automatic tool that implements our approach and we show its efficiency by discussing several real-world case studies, which are witness to the fact that our tool can generate, and exploit, complex attacks that, to the best of our knowledge, no other state-of-the-art-tool for the security of web applications can find

    Strengthening measurements from the edges: application-level packet loss rate estimation

    Get PDF
    Network users know much less than ISPs, Internet exchanges and content providers about what happens inside the network. Consequently users cannot either easily detect network neutrality violations or readily exercise their market power by knowledgeably switching ISPs. This paper contributes to the ongoing efforts to empower users by proposing two models to estimate -- via application-level measurements -- a key network indicator, i.e., the packet loss rate (PLR) experienced by FTP-like TCP downloads. Controlled, testbed, and large-scale experiments show that the Inverse Mathis model is simpler and more consistent across the whole PLR range, but less accurate than the more advanced Likely Rexmit model for landline connections and moderate PL

    Orchestrating Forest Policy in Italy: Mission Impossible?

    Get PDF
    In the Italian political and economic agenda the forest sector occupies a marginal role. The forest sector in Italy is characterized by a high institutional fragmentation and centralized decision-making processes dominated by Public Forest Administrations. Public participation in forest policy processes has been implemented since the 1990s at national, regional and local levels in several cases. However, today no significant changes have been observed in the overall governance of the forest sector and stakeholders' involvement in Italian forest policy decision-making is still rather limited. The aims of this paper are to describe the state of forest-related participatory processes in Italy at various levels (national, regional and local) and identify which factors and actors hinder or support the establishment and implementation of participatory forest-related processes in the country. The forest-related participatory processes are analyzed adopting a qualitative-based approach and interpreting interactive, complex and non-linear participatory processes through the lens of panarchy theory

    The North Wyke Farm Platform: GreenFeed System Methane and Carbon Dioxide Data

    Get PDF
    The North Wyke Farm Platform (NWFP) was established in 2010 to study and improve grassland livestock production at the farm-scale. The NWFP uses a combination of environmental sensors, routine field and lab-based measurements, and detailed management records to monitor livestock and crop production, emissions to water, emissions to air, soil health, and biodiversity. The rich NWFP datasets help researchers to evaluate the effectiveness of different grassland (and arable) farming systems, which in turn, contributes to the development of sustainable, resilient and net zero land management strategies. This document serves as a user guide to the methane (CH4) and carbon dioxide (CO2) emission data, sampled from housed cattle and sheep using GreenFeed systems. This document is associated with other dedicated user guides that detail the collection, and quality control processing of all the datasets produced on the NWFP

    Transformação dos principais usos da floresta no município de Moju, nordeste paraense.

    Get PDF
    As reflexões aqui apresentadas foram resultantes de uma pesquisa realizada na comunidade Santa Maria, uma das comunidades componentes do Assentamento Olho D?Água II, município de Moju, estado do Pará. O objetivo do artigo é analisar as transformações vivenciadas por um grupo de agricultores quanto ao uso da floresta, mais especificamente as associadas à obtenção de caças e à realização das roças, após a mudança da condição de uso comum (posseiros) para o uso privado (assentados) a partir da implantação do assentamento em 2002. Os resultados apontam que ocorreram transformações nas dinâmicas de uso dos recursos com a intensificação do cultivo de roças e a diminuição da obtenção de caças devido à grande dificuldade em obtê-las, em decorrência das novas condições de acesso privado à terra e ao aumento demográfico cuja demanda por caça supera em muito a oferta dos animais

    A Fast and Efficient Incremental Approach toward Dynamic Community Detection

    Full text link
    Community detection is a discovery tool used by network scientists to analyze the structure of real-world networks. It seeks to identify natural divisions that may exist in the input networks that partition the vertices into coherent modules (or communities). While this problem space is rich with efficient algorithms and software, most of this literature caters to the static use-case where the underlying network does not change. However, many emerging real-world use-cases give rise to a need to incorporate dynamic graphs as inputs. In this paper, we present a fast and efficient incremental approach toward dynamic community detection. The key contribution is a generic technique called Δscreening\Delta-screening, which examines the most recent batch of changes made to an input graph and selects a subset of vertices to reevaluate for potential community (re)assignment. This technique can be incorporated into any of the community detection methods that use modularity as its objective function for clustering. For demonstration purposes, we incorporated the technique into two well-known community detection tools. Our experiments demonstrate that our new incremental approach is able to generate performance speedups without compromising on the output quality (despite its heuristic nature). For instance, on a real-world network with 63M temporal edges (over 12 time steps), our approach was able to complete in 1056 seconds, yielding a 3x speedup over a baseline implementation. In addition to demonstrating the performance benefits, we also show how to use our approach to delineate appropriate intervals of temporal resolutions at which to analyze an input network
    corecore