1,579 research outputs found

    Developing an action plan for preservation and access

    Get PDF
    Day 2 of the Newspaper Archive Summit included a brainstorming session to determine what is in a newspaper archive, and idea generation for continuing preservation and access to newspaper archives. This document presents the notes from the session and a typed version of the Worksheets for idea development

    Another Goodbye

    Get PDF

    Pressed Flowers

    Get PDF

    Summit Record

    Get PDF
    The Fall 1989 edition of Summit Record, published by Summit Christian College in Fort Wayne, Indiana.https://pillars.taylor.edu/tufw-alumni-publications/1066/thumbnail.jp

    Inter-Domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks

    Get PDF
    The convergence of diverse but complementary wireless access technologies and inter-operation among administrative domains have been envisioned as crucial for the next generation wireless networks that will provide support for end-user devices to seamlessly roam across domain boundaries. The integration of existing and emerging heterogeneous wireless networks to provide such seamless roaming requires the design of a handover scheme that provides uninterrupted service continuity while facilitating the establishment of authenticity of the entities involved. The existing protocols for supporting re-authentication of a mobile node during a handover across administrative domains typically involve several round trips to the home domain, and hence introduce long latencies. Furthermore, the existing methods for negotiating roaming agreements to establish inter-domain trust rely on a lengthy manual process, thus, impeding seamless roaming across multiple domains in a truly heterogeneous wireless network. In this thesis, we present a new proof-token based authentication protocol that supports quick re-authentication of a mobile node as it moves to a new foreign domain without involving communication with the home domain. The proposed proof-token based protocol can also support establishment of spontaneous roaming agreements between a pair of domains that do not already have a direct roaming agreement, thus allowing flexible business models to be supported. We describe details of the new authentication architecture, the proposed protocol, which is based on EAP-TLS and compare the proposed protocol with existing protocols

    Conceptualizing Female Punk in the Theatre: The Riot Grrrl Revolution as a Radical Force to Inspire a Devised Solo Performance

    Get PDF
    My Independent Study focuses on the technique and aesthetic of the Riot Grrrl Revolution, and how those elements effectively continued the 90s underground punk scene. The movement was a response to masculine domination of the punk sound and space. Though zines and music, Riot Grrrl provided girls and young women a medium of reclaiming the punk scene, finding a community, and discovering an avenue of female empowerment. I have researched these techniques and aesthetics and devised a one-woman performance to continue the ideals of Riot Grrrl
    corecore