9,133 research outputs found

    Christine Jorgensen and the Media: Identity Politics in the Early 1950s Press

    Full text link
    “Christine Jorgensen and the Media: Identity Politics in the Early 1950s Press” analyzes America’s first transgender celebrity and the interpretations of her identity by a seemingly celebratory press. Jorgensen, who rose to fame in December 1952, was propelled to stardom partly because of the cultural climate of the 1950s. The first portion of my essay begins by setting the historical context of how gender nonconforming individuals were treated in the press before Jorgensen, and then analyzes Jorgensen’s personal characteristics that also helped make her a media fixture. However, the veracity of Jorgensen’s female identity was doubted by the time she returned to the United States from Denmark, where she transitioned. Though much of the press began to sour towards Jorgensen in early 1953, it is important to consider the early language used to describe Jorgensen’s initial appearance in newspaper headlines, which arguably precipitated this trend. The media coverage of Jorgensen was often marked by ambivalence and skepticism, as the press seemingly struggled with whether or not to accept her identity as a woman. While this paper provides analysis of Las Vegas’ less-than-flattering interpretation of Jorgensen throughout, it concludes with an examination of Jorgensen’s performance in Vegas. Although Jorgensen was at first hesitant to enter show business, her later willingness to do so perhaps sheds light on her apparent desire to salvage her reputation. Her ability to secure a show in Las Vegas, let alone earn rave reviews, indicates the contradictory attitudes of the press towards Jorgensen in the early 1950s

    Chief Kerry's moose : a guidebook to land use and occupancy mapping, research design, and data collection

    Get PDF
    Aboriginal peoples in Canada have been mapping aspects of their cultures for more than a generation. Indians, Inuit, MĂ©tis, non-status Indians and others have called their maps by different names at various times and places: land use and occupancy; land occupancy and use; traditional use; traditional land use and occupancy; current use; cultural sensitive areas; and so on. I use “land use and occupancy mapping” in a generic sense to include all the above. The term refers to the collection of interview data about traditional use of resources and occupancy of lands by First Nation persons, and the presentation of those data in map form. Think of it as the geography of oral tradition, or as the mapping of cultural and resource geography. (PDF contains 81 pages.

    Flexible Service Provisioning with Advance Agreements

    No full text
    In this paper, we develop a novel algorithm that allows service consumer agents to automatically select and provision service provider agents for their workflows in highly dynamic and uncertain computational service economies. In contrast to existing work, our algorithm reasons explicitly about the impact of failures on the overall feasibility of a workflow, and it mitigates them by proactively provisioning multiple providers in parallel for particularly critical tasks and by explicitly planning for contingencies. Furthermore, our algorithm provisions only part of its workflow at any given time, in order to retain flexibility and to decrease the potential for missing negotiated service time slots. We show empirically that current approaches are unable to achieve a high utility in such uncertain and dynamic environments; whereas our algorithm consistently outperforms them over a range of environments. Specifically, our approach can achieve up to a 27-fold increase in utility and successfully completes most workflows within a strict deadline, even when the majority of providers do not honour their contracts

    Engaging Student Veterans as Researchers: Libraries Initiating Campus Collaborations

    Get PDF
    Student veteran enrollment in higher education has increased significantly following the Post-9/11 GI Bill (Molina & Morse, 2015). The professional literature of academic libraries includes several examples of outreach to this growing population, most of which involve marketing to student veterans differently, customizing existing services and spaces for student veterans, and honoring student veterans for their military service. But reaching out to student veterans can be difficult. Student veterans frequently have work and family responsibilities competing for their time and attention, and, as outreach librarian and former Army sergeant Sarah LeMire notes in her 2015 ACRL contributed paper, they are often reluctant to participate in programs that make them seem more needy than other students. We expanded our library’s outreach to student veterans by hosting a symposium for student veterans to present their research projects. This approach is distinctive insofar as we address potential participants foremost as competent researchers, emphasizing their strengths rather than their needs. We also collaborated with various campus offices to integrate student veteran researchers into campus-wide research showcase events. This paper shares strategies for working with student veteran researchers and for securing buy-in among relevant campus stakeholders

    Sensitivity Analysis of Flexible Provisioning

    No full text
    This technical report contains a sensitivity analysis to extend our previous work. We show that our flexible service provisioning strategy is robust to inaccurate performance information (when the available information is within 10% of the true value), and that it degrades gracefully as the information becomes less accurate. We also identify and discuss one particular case where inaccurate information may lead to undesirable losses in highly unreliable environments

    Structure, substrate recognition and reactivity of Leishmania major mevalonate kinase

    Get PDF
    This research was supported by the German Academic Exchange Service (DAAD), the Wellcome Trust (TKS and WNH as Trust Senior Research fellows), the Biotechnology and Biological Science Research Council (Structural Proteomics of Rational Targets) and the European Synchrotron Radiation Facility.Background: Isoprenoid precursor synthesis via the mevalonate route in humans and pathogenic trypanosomatids is an important metabolic pathway. There is however, only limited information available on the structure and reactivity of the component enzymes in trypanosomatids. Since isoprenoid biosynthesis is essential for trypanosomatid viability and may provide new targets for therapeutic intervention it is important to characterize the pathway components. Results: Putative mevalonate kinase encoding genes from Leishmania major (LmMK) and Trypanosoma brucei (TbMK) have been cloned, over-expressed in and proteins isolated from procyclic-form T. brucei. A highly sensitive radioactive assay was developed and shows ATP-dependent phosphorylation of mevalonate. Apo and (R)-mevalonate bound crystal structures of LmMK, from a bacterial expression system, have been determined to high resolution providing, for the first time, information concerning binding of mevalonate to an MK. The mevalonate binds in a deep cavity lined by highly conserved residues. His25 is key for binding and for discrimination of (R)-over (S)-mevalonate, with the main chain amide interacting with the C3 hydroxyl group of ( R)mevalonate, and the side chain contributing, together with Val202 and Thr283, to the construction of a hydrophobic binding site for the C3 methyl substituent. The C5 hydroxyl, where phosphorylation occurs, points towards catalytic residues, Lys18 and Asp155. The activity of LmMK was significantly reduced compared to MK from other species and we were unable to obtain ATP-binding data. Comparisons with the rat MK:ATP complex were used to investigate how this substrate might bind. In LmMK, helix alpha 2 and the preceding polypeptide adopt a conformation, not seen in related kinase structures, impeding access to the nucleotide triphosphate binding site suggesting that a conformational rearrangement is required to allow ATP binding. Conclusion: Our new structural information, consistent with data on homologous enzymes allows a detailed description of how mevalonate is recognized and positioned for catalysis in MK. The mevalonate-binding site is highly conserved yet the ATP-binding site is structurally distinct in LmMK. We are unable to provide a definitive explanation for the low activity of recombinant protein isolated from a bacterial expression system compared to material isolated from procyclic-form Trypanosoma brucei.Publisher PDFPeer reviewe

    Combined Release and Radiation Effects Satellite (CRRES) experiments data collection, analysis, and publication

    Get PDF
    The Combined Release and Radiation Effects Satellite (CRRES) program experiments data collection, analysis, and publication activities are described. These activities were associated with both the satellite chemical release and a planned Puerto Rico sounding rocket campaign. To coordinate these activities, a working group meeting was organized and conducted

    An Effective Strategy for the Flexible Provisioning of Service Workflows

    No full text
    Recent advances in service-oriented frameworks and semantic Web technologies have enabled software agents to discover and invoke resources over large distributed systems, in order to meet their high-level objectives. However, most work has failed to acknowledge that such systems are complex and dynamic multi-agent systems, where service providers act autonomously and follow their own decision-making procedures. Hence, the behaviour of these providers is inherently uncertain - services may fail or take uncertain amounts of time to complete. In this work, we address this uncertainty and take an agent-oriented approach to the problem of provisioning service providers for the constituent tasks of abstract workflows. Specifically, we describe an algorithm that uses redundancy to deal with unreliable providers, and we demonstrate that it achieves an 8-14% improvement in average utility over previous work, while performing up to 6 times as well as approaches that do not consider service uncertainty. We also show that our algorithm performs well in the presence of inaccurate service performance information
    • 

    corecore