151 research outputs found
Structural analysis of whole-system provenance graphs
System based provenance generates traces captured from
various systems, a representation method for inferring these traces is
a graph. These graphs are not well understood, and current work focuses
on their extraction and processing, without a thorough characterization
being in place. This paper studies the topology of such graphs. We an-
alyze multiple Whole-system-Provenance graphs and present that they
have hubs-and-authorities model of graphs as well as a power law distri-
bution. Our observations allow for a novel understanding of the structure
of Whole-system-Provenance graphs.DARP
Recommended from our members
A primer on provenance
Better understanding data requires tracking its history and context.</jats:p
General hardware multicasting for fine-grained message-passing architectures
Manycore architectures are increasingly favouring message-passing or partitioned global address spaces (PGAS) over cache coherency for reasons of power efficiency and scalability. However, in the absence of cache coherency, there can be a lack of hardware support for one-to-many communication patterns, which are prevalent in some application domains. To address this, we present new hardware primitives for multicast communication in rack-scale manycore systems. These primitives guarantee delivery to both colocated and distributed destinations, and can capture large unstructured communication patterns precisely. As a result, reliable multicast transfers among any number of software tasks, connected in any topology, can be fully offloaded to hardware. We implement the new primitives in a research platform consisting of 50K RISC-V threads distributed over 48 FPGAs, and demonstrate significant performance benefits on a range of applications expressed using a high-level vertex-centric programming model
From toothpick legs to dropping vaginas: Gender and sexuality in Joan Rivers' stand-up comedy performance
This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2011 Intellect.This article employs sociocultural analysis to examine Joan Riversâ stand-up comedy performances in order to reveal how she successfully operates in a sphere of artistic expression that has been, and continues to be, male-dominated. The analysis uncovers how Riversâ stand-up comedy performance involves a complex combination of elements and how it fuses features that are regarded as âtraditionally masculineâ, such as aggression, with features frequently used by other female stand-up comedians, such as self-deprecating comedy and confessional comedy. Furthermore, the analysis exposes the complex ways in which constructions of gender and sexuality are negotiated and re-negotiated in Riversâ stand-up comedy performance, and illustrates how dominant ideological identity constructions can be simultaneously reinforced and subverted within the same comic moment
Recommended from our members
Applying provenance in APT monitoring and analysis: Practical challenges for scalable, efficient and trustworthy distributed provenance
Advanced Persistent Threats (APT) are a class of security threats in which a well-resourced attacker targets a specific individual or organisation with a predefined goal. This typically involves exfiltration of confidential material, although increasingly attacks target the encryption or destruction of mission critical data. With traditional prevention and detection mechanisms failing to stem the tide of such attacks, there is a pressing need for new monitoring and analysis tools that reduce both false-positive rates and the cognitive burden on human analysts. We propose that local and distributed provenance metadata can simplify and improve monitoring and analysis of APTs by providing a single, authoritative sequence of events that captures the context (and side effects) of potentially malicious activities. Provenance metadata allows a human analyst to backtrack from detection of malicious activity to the point of intrusion and, similarly, to work forward to fully understand the consequences. Applying provenance to APT monitoring and analysis introduces some significantly different challenges and requirements in comparison to more traditional applications. Drawing from our experiences working with and adapting the OPUS (Observed Provenance in User Space) system to an APT monitoring and analysis use case, we introduce and discuss some of the key challenges in this space. These preliminary observations are intended to prime a discussion within the community about the design space for scalable, efficient and trustworthy distributed provenance for scenarios that impose different constraints from traditional provenance applications such as workflow and data processing frameworks
PG545, a dual heparanase and angiogenesis inhibitor, induces potent anti-tumour and anti-metastatic efficacy in preclinical models
BACKGROUND: PG545 is a heparan sulfate (HS) mimetic that inhibits tumour angiogenesis by sequestering angiogenic growth factors in the extracellular matrix (ECM), thus limiting subsequent binding to receptors. Importantly, PG545 also inhibits heparanase, the only endoglycosidase which cleaves HS chains in the ECM. The aim of the study was to assess PG545 in various solid tumour and metastasis models
The need for fresh blood: understanding organizational age inequality through a vampiric lens
YesThis article argues that older age inequality within and across working life is the result of vampiric forms and structures constitutive of contemporary organizing. Rather than assuming ageism occurs against a backdrop of neutral organizational processes and practices, the article denaturalizes (and in the process super-naturalizes) organizational orientations of ageing through three vampiric aspects: (un)dying, regeneration and neophilia. These dimensions are used to illustrate how workplace narratives and logics normalize and perpetuate the systematic denigration of the ageing organizational subject. Through our analysis it is argued that older workers are positioned as inevitable âsacrificial objectsâ of the all-consuming immortal organization. To challenge this, the article explicitly draws on the vampire and the vampiric in literature and popular culture to consider the possibility of subverting existing notions of the âolder workerâ in order to confront and challenge the subtle and persistent monstrous discourses that shape organizational life
Controlled Radical Polymerization of Vinyl Acetate Mediated by a Bis(imino)pyridine Vanadium Complex
Source type: Prin
- âŠ