5,731 research outputs found

    A Homological Approach to Factorization

    Full text link
    Mott noted a one-to-one correspondence between saturated multiplicatively closed subsets of a domain D and directed convex subgroups of the group of divisibility D. With this, we construct a functor between inclusions into saturated localizations of D and projections onto partially ordered quotient groups of G(D). We use this functor to construct many cochain complexes of o-homomorphisms of po-groups. These complexes naturally lead to some fundamental structure theorems and some natural homology theory that provide insight into the factorization behavior of D.Comment: Submitted for publication 12/15/201

    A Decentralised Digital Identity Architecture

    Get PDF
    Current architectures to validate, certify, and manage identity are based on centralised, top-down approaches that rely on trusted authorities and third-party operators. We approach the problem of digital identity starting from a human rights perspective, with a primary focus on identity systems in the developed world. We assert that individual persons must be allowed to manage their personal information in a multitude of different ways in different contexts and that to do so, each individual must be able to create multiple unrelated identities. Therefore, we first define a set of fundamental constraints that digital identity systems must satisfy to preserve and promote privacy as required for individual autonomy. With these constraints in mind, we then propose a decentralised, standards-based approach, using a combination of distributed ledger technology and thoughtful regulation, to facilitate many-to-many relationships among providers of key services. Our proposal for digital identity differs from others in its approach to trust in that we do not seek to bind credentials to each other or to a mutually trusted authority to achieve strong non-transferability. Because the system does not implicitly encourage its users to maintain a single aggregated identity that can potentially be constrained or reconstructed against their interests, individuals and organisations are free to embrace the system and share in its benefits.Comment: 30 pages, 10 figures, 3 table

    Student-Centered Learning: Functional Requirements for Integrated Systems to Optimize Learning

    Get PDF
    The realities of the 21st-century learner require that schools and educators fundamentally change their practice. "Educators must produce college- and career-ready graduates that reflect the future these students will face. And, they must facilitate learning through means that align with the defining attributes of this generation of learners."Today, we know more than ever about how students learn, acknowledging that the process isn't the same for every student and doesn't remain the same for each individual, depending upon maturation and the content being learned. We know that students want to progress at a pace that allows them to master new concepts and skills, to access a variety of resources, to receive timely feedback on their progress, to demonstrate their knowledge in multiple ways and to get direction, support and feedback from—as well as collaborate with—experts, teachers, tutors and other students.The result is a growing demand for student-centered, transformative digital learning using competency education as an underpinning.iNACOL released this paper to illustrate the technical requirements and functionalities that learning management systems need to shift toward student-centered instructional models. This comprehensive framework will help districts and schools determine what systems to use and integrate as they being their journey toward student-centered learning, as well as how systems integration aligns with their organizational vision, educational goals and strategic plans.Educators can use this report to optimize student learning and promote innovation in their own student-centered learning environments. The report will help school leaders understand the complex technologies needed to optimize personalized learning and how to use data and analytics to improve practices, and can assist technology leaders in re-engineering systems to support the key nuances of student-centered learning

    Announcement from the Veils of Angels

    Get PDF

    Government Responsibility for the Acts of Jailhouse Informants Under the Sixth Amendment

    Get PDF
    Once a criminal investigation has identified a suspect, and adversarial proceedings have begun, the Sixth Amendment confers a right to be represented by counsel at the critical stages of the process. The Supreme Court has made clear that the government cannot circumvent this requirement merely by designating a civilian informant to engage in questioning on its behalf. Less clear is when the government is responsible for the actions of an informant; particularly in the case of jailhouse informants, incarcerated individuals who question fellow inmates, government responsibility is a difficult issue for which no clear legal standard has emerged. An examination of federal appellate and state supreme court case law reveals two distinct factors that courts accord the most weight in making their decisions: the agreement between the informant and the government, and the government\u27s targeting of a particular defendant. Federal appellate and state supreme courts disagree about whether one, both, or either are required. The relevant Sixth Amendment principle was first articulated in 1964 in United States v. Massiah. The defendant was a merchant seaman accused of possession of narcotics, and released on bail. Unbeknownst to him, government agents had struck a deal with his co-defendant to allow them to install a radio transmitter in his car and listen in on their conversation. The court held that the defendant\u27s Sixth Amendment rights were violated by the use in evidence against him of incriminating statements which Government agents had deliberately elicited from him after he had been indicted and in absence of his retained counsel. This is the core Massiah standard

    Before Crenshaw: A Historiographical Look at Intersectional Identity in Three Twentieth-Century American Plays by Eaton, Grimké, and Treadwell

    Get PDF
    This thesis anachronistically applies Kimberlé Crenshaw’s term intersectionality to three dramatic texts using Thomas Postlewait’s model of theatre historiography. These plays were authored by twentieth century female playwrights who had similar intersectional lives as the leads discussed. Yuki, from the 1901 novel turned 1903 Broadway play A Japanese Nightingale, was crafted by Winnifred Eaton. Yuki’s identity will be the subject of the first chapter. The second chapter examines the identity of Rachel from Angelina Weld Grimke’s anti-lynching play Rachel. For the third chapter, the identities of both female leads fromHope for a Harvest by Sophie Treadwell are analyzed. Each chapter will also investigate the strong autobiographical ties the playwrights have to their material in terms of intersectional identity and historical context
    • …
    corecore