70 research outputs found

    Ficciones sobre la apertura y la endogamia: matrimonio, estereotipo e identidad en dos novelas judeo-argentinas contemporáneas

    Get PDF
    Nuestro objetivo es demostrar cómo el conjunto de rasgos que componen la imagen social de un grupo étnico minoritario, y que deviene estereotipo denigrante, influye dialécticamente en la conformación de los rasgos identitarios de la misma minoría. El efecto paradojal que se produce es el de una presunta homogeneidad, que facilita la visión discriminadora y que realimenta el ciclo. Frente a esos discursos aplanadores, debería resaltarse la complejidad que reside en el seno de la conformación ideológica de la minoría, ya que es el modo en el que el cuerpo estereotípico queda en evidencia y su validez seriamente cuestionada. Para demostrar esta hipótesis, se propone el análisis de matrimonios entre mujeres judías y hombres no judíos en ficciones de dos autores judeo-argentinos contemporáneos: El infierno prometido (2006) de Elsa Drucaroff y Los amantes bajo el Danubio (2015) de Federico Andahazi. Se espera que la consideración de estos ejemplos desmonte el argumento denigrante de la endogamia y, al mismo tiempo, permita delimitar un amplio espectro ideológico sobre el tema desde la mirada judía. Como se puede interpretar de los datos extraídos del corpus, dicho espectro iría desde el conservadurismo, que replica la imagen estereotipada, hasta la apertura libertaria y feminista

    Juan Forn y el asedio a la historia: hacia una genealogía de los saberes sujetos en una novela argentina contemporánea

    Get PDF
    Partiendo de algunas ideas de Michel Foucault sobre la construcción de una genealogía, se analiza cómo María Domecq de Juan Forn ofrece un ejemplo sobre el modo en que la novela histórica posmoderna, o nueva novela histórica, replantea los relatos a través de los cuales se construye una identidad familiar (que, en muchos casos, pretende coincidir con la identidad de un país). En el texto seleccionado es posible observar la introducción de un discurso de denuncia y desenmascaramiento de las atrocidades cometidas por el poder. En una perspectiva más amplia será factible señalar el modo en que esa revisión crítica de la elite dominante apunta a cuestionar el relato oficial sobre los hechos del pasado, es decir, la forma en que se construye la Historia. A partir de dicho movimiento revisionista, se llega a revelar que la memoria de la historia es producto de una relación de fuerzas que se debe desnudar y denunciar

    La Shoá como posmemoria y religión civil: un ejemplo en la literatura argentina contemporánea.

    Get PDF
    A partir de su especificidad, la Shoá se ha convertido tanto en un objeto de las representaciones como en un objeto de análisis, cuyo estudio excede el campo historiográfico. El concepto de posmemoria (surgido en la década de 1990 para dar cuenta de los relatos que los hijos o nietos de los sobrevivientes del genocidio heredaban de sus mayores) es un ejemplo sobre cómo la trascendencia de la Shoá como experiencia problemáticamente transmisible, obliga a extender las fronteras de la comprensión y, por lo tanto, a desarrollar herramientas y estrategias más eficaces. En este trabajo se analiza "Camino a Auschwitz" una novela gráfica de la literatura argentina contemporánea, que puede leerse como un ejemplo de la posmemoria y que permite, por lo tanto, considerar la pertinencia en la actualidad del concepto. Nuestra hipótesis es que la posmemoria en el arte es la manifestación de la relación que los descendientes entablan con las     historias heredadas y que, al mismo tiempo, reflejan la pervivencia, en las vidas de los descendientes, del trauma masivo ocasionado por la maquinaria nazi. Abstract From its specificity, the Shoah has become both an object of representations and an object of analysis, whose study exceeds the historiographical field. The concept of postmemory (emerged in the 1990s to name the stories that the children or grandchildren of genocide survivors inherited from their elders) is an example on how the Shoah, as a problematically transmissible experience, forces to extend the frontiers of understanding and, therefore, to develop more effective tools and strategies. In this paper we analyze "Camino a Auschwitz", a graphic novel of contemporary Argentine literature, which can be read as an example of postmemory and which allows, therefore, to consider the relevance of the concept at the present time. Our hypothesis is that postmemory in art is the manifestation of the relationship between the descendants and the inherited stories. At the same time, these stories, reflect the persistence, in the lives of the descendants, of the massive trauma caused by the Nazi machinery

    SAT-Based Synthesis Methods for Safety Specs

    Full text link
    Automatic synthesis of hardware components from declarative specifications is an ambitious endeavor in computer aided design. Existing synthesis algorithms are often implemented with Binary Decision Diagrams (BDDs), inheriting their scalability limitations. Instead of BDDs, we propose several new methods to synthesize finite-state systems from safety specifications using decision procedures for the satisfiability of quantified and unquantified Boolean formulas (SAT-, QBF- and EPR-solvers). The presented approaches are based on computational learning, templates, or reduction to first-order logic. We also present an efficient parallelization, and optimizations to utilize reachability information and incremental solving. Finally, we compare all methods in an extensive case study. Our new methods outperform BDDs and other existing work on some classes of benchmarks, and our parallelization achieves a super-linear speedup. This is an extended version of [5], featuring an additional appendix.Comment: Extended version of a paper at VMCAI'1

    On QBF Proofs and Preprocessing

    Full text link
    QBFs (quantified boolean formulas), which are a superset of propositional formulas, provide a canonical representation for PSPACE problems. To overcome the inherent complexity of QBF, significant effort has been invested in developing QBF solvers as well as the underlying proof systems. At the same time, formula preprocessing is crucial for the application of QBF solvers. This paper focuses on a missing link in currently-available technology: How to obtain a certificate (e.g. proof) for a formula that had been preprocessed before it was given to a solver? The paper targets a suite of commonly-used preprocessing techniques and shows how to reconstruct certificates for them. On the negative side, the paper discusses certain limitations of the currently-used proof systems in the light of preprocessing. The presented techniques were implemented and evaluated in the state-of-the-art QBF preprocessor bloqqer.Comment: LPAR 201

    The Frequency Dependence of Critical-velocity Behavior in Oscillatory Flow of Superfluid Helium-4 Through a 2-micrometer by 2-micrometer Aperture in a Thin Foil

    Full text link
    The critical-velocity behavior of oscillatory superfluid Helium-4 flow through a 2-micrometer by 2-micrometer aperture in a 0.1-micrometer-thick foil has been studied from 0.36 K to 2.10 K at frequencies from less than 50 Hz up to above 1880 Hz. The pressure remained less than 0.5 bar. In early runs during which the frequency remained below 400 Hz, the critical velocity was a nearly-linearly decreasing function of increasing temperature throughout the region of temperature studied. In runs at the lowest frequencies, isolated 2 Pi phase slips could be observed at the onset of dissipation. In runs with frequencies higher than 400 Hz, downward curvature was observed in the decrease of critical velocity with increasing temperature. In addition, above 500 Hz an alteration in supercritical behavior was seen at the lower temperatures, involving the appearance of large energy-loss events. These irregular events typically lasted a few tens of half-cycles of oscillation and could involve hundreds of times more energy loss than would have occurred in a single complete 2 Pi phase slip at maximum flow. The temperatures at which this altered behavior was observed rose with frequency, from ~ 0.6 K and below, at 500 Hz, to ~ 1.0 K and below, at 1880 Hz.Comment: 35 pages, 13 figures, prequel to cond-mat/050203

    DepQBF 6.0: A Search-Based QBF Solver Beyond Traditional QCDCL

    Full text link
    We present the latest major release version 6.0 of the quantified Boolean formula (QBF) solver DepQBF, which is based on QCDCL. QCDCL is an extension of the conflict-driven clause learning (CDCL) paradigm implemented in state of the art propositional satisfiability (SAT) solvers. The Q-resolution calculus (QRES) is a QBF proof system which underlies QCDCL. QCDCL solvers can produce QRES proofs of QBFs in prenex conjunctive normal form (PCNF) as a byproduct of the solving process. In contrast to traditional QCDCL based on QRES, DepQBF 6.0 implements a variant of QCDCL which is based on a generalization of QRES. This generalization is due to a set of additional axioms and leaves the original Q-resolution rules unchanged. The generalization of QRES enables QCDCL to potentially produce exponentially shorter proofs than the traditional variant. We present an overview of the features implemented in DepQBF and report on experimental results which demonstrate the effectiveness of generalized QRES in QCDCL.Comment: 12 pages + appendix; to appear in the proceedings of CADE-26, LNCS, Springer, 201

    Malvinas en clave literaria

    Get PDF
    La afirmación, en sí misma "enigmática" de Arnaldo Canclini (2014), que hemos colocado como epígrafe, es la que nos anima a acercarnos a este tema tan sensible para todos los argentinos (y probablemente, para todos los hispano-hablantes) -“Quizás la única deuda internacional que los argentinos no han perdonado" (Canclini, 2014: 9)- no desde el ángulo de lo histórico, sino desde la literatura. Esto es así porque, como afirma Julieta Vitullo (2012), la literatura se cuela precisamente por esos intersticios que deja la versión “oficial" o establecida de los hechos, para construir sus propios avatares, para dar cuenta de sus recónditas motivaciones, para sugerir o postular “otras" verdades. Si se parte de que la literatura es ficción y se caracteriza por su aptitud para crear mundos autónomos respecto del real, es también indudable que entre los "mundos posibles" literarios y la realidad empírica se tejen distintos tipos de relaciones, que algunos teóricos, como Lubomir Dolezel (1994 y 1997), denominan “relaciones de accesibilidad" y que se desarrollan según una gama de posibilidades que van desde la completa semejanza hasta la (pretendida) total autonomía.Fil: Varela, Fabiana Inés. Universidad Nacional de Cuyo. Facultad de Filosofía y Letras.Fil: Marín, Marta. Universidad Nacional de Cuyo. Facultad de Filosofía y Letras.Fil: Brandalise, Antonio Fabián. Universidad Nacional de Cuyo. Facultad de Filosofía y Letras.Fil: Burlot, María Lorena. Universidad Nacional de Cuyo. Facultad de Filosofía y Letras.Fil: Niemetz, Diego E. . Universidad Nacional de Cuyo. Facultad de Filosofía y Letras.Fil: Castellino, Lucía Inés . Universidad Nacional de Cuyo. Facultad de Filosofía y Letras.Fil: Vitarelli, María B. . Universidad Nacional de Cuyo. Facultad de Filosofía y Letras.Fil: Castellino, María Elena . Universidad Nacional de Cuyo. Facultad de Filosofía y Letras

    A Bit-Vector Differential Model for the Modular Addition by a Constant

    Get PDF
    ARX algorithms are a class of symmetric-key algorithms constructed by Addition, Rotation, and XOR, which achieve the best software performances in low-end microcontrollers. To evaluate the resistance of an ARX cipher against differential cryptanalysis and its variants, the recent automated methods employ constraint satisfaction solvers, such as SMT solvers, to search for optimal characteristics. The main difficulty to formulate this search as a constraint satisfaction problem is obtaining the differential models of the non-linear operations, that is, the constraints describing the differential probability of each non-linear operation of the cipher. While an efficient bit-vector differential model was obtained for the modular addition with two variable inputs, no differential model for the modular addition by a constant has been proposed so far, preventing ARX ciphers including this operation from being evaluated with automated methods. In this paper, we present the first bit-vector differential model for the n-bit modular addition by a constant input. Our model contains O(log2(n)) basic bit-vector constraints and describes the binary logarithm of the differential probability. We also represent an SMT-based automated method to look for differential characteristics of ARX, including constant additions, and we provide an open-source tool ArxPy to find ARX differential characteristics in a fully automated way. To provide some examples, we have searched for related-key differential characteristics of TEA, XTEA, HIGHT, and LEA, obtaining better results than previous works. Our differential model and our automated tool allow cipher designers to select the best constant inputs for modular additions and cryptanalysts to evaluate the resistance of ARX ciphers against differential attacks.acceptedVersio

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Get PDF
    Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential characteristics. However, already at EUROCRYPT'91, Lai et al. comprehended that differential cryptanalysis rather uses differentials instead of single characteristics. In this paper, we consider exactly the gap between these two approaches and investigate this gap in the context of recent lightweight cryptographic primitives. This shows that for many recent designs like Midori, Skinny or Sparx one has to be careful as bounds from counting the number of active S-boxes only give an inaccurate evaluation of the best differential distinguishers. For several designs we found new differential distinguishers and show how this gap evolves. We found an 8-round differential distinguisher for Skinny-64 with a probability of 2−56.932−56.93, while the best single characteristic only suggests a probability of 2−722−72. Our approach is integrated into publicly available tools and can easily be used when developing new cryptographic primitives. Moreover, as differential cryptanalysis is critically dependent on the distribution over the keys for the probability of differentials, we provide experiments for some of these new differentials found, in order to confirm that our estimates for the probability are correct. While for Skinny-64 the distribution over the keys follows a Poisson distribution, as one would expect, we noticed that Speck-64 follows a bimodal distribution, and the distribution of Midori-64 suggests a large class of weak keys
    corecore