10,882 research outputs found

    'Genealogical misfortunes': Achille Mbembe's (re-)writing of postcolonial Africa

    Get PDF
    In his latest work, Sortir de la grande nuit, the Cameroonian social theorist, Achille Mbembe nuances his description of the ontological status of the postcolonial African subject, which he had theorized extensively in his best-known text, On the Postcolony, and at the same time exploits the conceptual resources of a number of Jean-Luc Nancy’s lexical innovations. This recent text is also a reprise of an earlier autobiographical essay, and the gesture of this ‘reinscription’ is critical to our understanding of Mbembe’s status as a contemporary ‘postcolonial thinker’, and the way in which he positions himself within a certain intellectual genealogy of postcolonial theory. Within this trajectory, I argue that we can read fruitfully his relationship to three influential figures: Jacques Derrida, Jean-Luc Nancy and Ruben Um Nyobù

    The role of recent experience and weight on hen's agonistic behaviour during dyadic conflict resolution.

    No full text
    Recent victory or defeat experiences and 2-hour familiarity with the meeting place were combined with size differences in order to better understand their effects on the behaviour leading to the establishment of dyadic dominance relationships between hens not previously acquainted with each other. Three kinds of encounters were videotaped: (i) a previous winner unfamiliar with the meeting place met a previous loser familiar for 2 hours with the meeting place (n = 12 dyads); (ii) as in (i) but both were unfamiliar with the meeting place (n=12); (iii) as in (i) but the previous winner was familiar with the meeting place while the previous loser was unfamiliar (n=13). The weight asymmetry was combined with these three types of encounters by selecting hens of various weight differences: in 29 dyads the recent loser was heavier than the recent winner and in 8 dyads it was the reverse. Recent experience had a major influence upon both agonistic behaviour and dominance outcome. Hens that were familiar with the meeting site initiated attacks more frequently than their unfamiliar opponent but did not win significantly more often. Recent experience and site familiarity could be used to identify 80% of future initiators. Once the first aggressive behaviour had been initiated, it led to victory of its initiator in 92% of cases. Weight was not found to influence agonistic behaviour nor dominance outcome. However, hens with superior comb and wattles areas won significantly more initial meetings than opponents with smaller ones. In the final encounters, victory also went more frequently to the bird showing larger comb and wattles, which happened also to be the previous dominant in a majority of cases. The use of higher-order partial correlations as an ex post facto control for comb and wattles indicates that they were not influential upon agonistic behaviour nor on dominance outcome, but were simply co-selected with the selection of victorious and defeated birds in the first phase of the experiment designed to let hens acquire recent victory/defeat experience

    The role of hen's weight and recent experience on dyadic conflict outcome

    No full text
    This study simultaneously varied experiences of recent victory or defeat, 2-hour familiarity with the meeting place, and hen weight in order to understand their combined effects on the establishment of dyadic dominance relationships between hens not previously acquainted with each other. Three kinds of encounters were arranged: (i) a previous winner unfamiliar with the meeting place met a previous loser familiar with the meeting place (n =28 dyads); (ii) a previous winner met a previous loser, both unfamiliar with the meeting place (n=27); (iii) a previous winner familiar with the meeting place encountered a previous loser unfamiliar with the meeting place (n=28). The weight asymmetry was combined with these three types of encounters by selecting hens showing various weight differences, in favour of the recent loser in 54 dyads and of the recent winner in 29 dyads. Results indicate that recent victory or defeat experience significantly affected the outcome. Even an important weight asymmetry, or familiarity with the meeting place were not sufficient for a hen recently defeated to overcome an opponent that was previously victorious. A 2-hour period of familiarization with the meeting place did not provide any significant advantage over unfamiliarity. Although a significant relationship was found to exist between comb and wattles areas and the initial and final statuses, examination of partial correlations indicates that the influence was from initial status to final status, rather than from comb and wattles to final status. These results suggest that more importance should be attributed to recent social experience in comparison to intrinsic factors in determining dyadic dominance in the hen

    Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android

    Get PDF
    A common security architecture is based on the protection of certain resources by permission checks (used e.g., in Android and Blackberry). It has some limitations, for instance, when applications are granted more permissions than they actually need, which facilitates all kinds of malicious usage (e.g., through code injection). The analysis of permission-based framework requires a precise mapping between API methods of the framework and the permissions they require. In this paper, we show that naive static analysis fails miserably when applied with off-the-shelf components on the Android framework. We then present an advanced class-hierarchy and field-sensitive set of analyses to extract this mapping. Those static analyses are capable of analyzing the Android framework. They use novel domain specific optimizations dedicated to Android.Comment: IEEE Transactions on Software Engineering (2014). arXiv admin note: substantial text overlap with arXiv:1206.582

    Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android

    Get PDF
    A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications can be granted more permissions than they actually need, what we call a "permission gap". Malware can leverage the unused permissions for achieving their malicious goals, for instance using code injection. In this paper, we present an approach to detecting permission gaps using static analysis. Our prototype implementation in the context of Android shows that the static analysis must take into account a significant amount of platform-specific knowledge. Using our tool on two datasets of Android applications, we found out that a non negligible part of applications suffers from permission gaps, i.e. does not use all the permissions they declare

    Can one improve the Froissart bound?

    Full text link
    We explain why we hope that the Froissart bound can be improved, either qualitatively or, more likely, quantitatively, by making a better use of unitarity, in particular elastic unitarity. In other instances (Gribov's theorem) elastic unitarity played a crucial role. A preliminary requirement for this is to work with an appropriate average of the cross-section, to make the problem well defined. This is possible, without destroying the Lukaszuk--Martin bound.Comment: 4 pages, latex with AIP style, Talk given at "Diffraction 2008", Lalonde-les-Maures, France, September 2008. Missing square root restored p. 3. pi^2->pi corrected in eq. (1

    Solving the CH4−_4^- riddle: the fundamental role of spin to explain metastable anionic methane

    Full text link
    When atoms or molecules exist in the form of stable negative ions, they play a crucial role in the gas phase chemistry. Determining the existence of such an ion, its internal energy and its stability are necessary prerequisites to analyze the role of this ion in a particular medium. Experimental evidence of the existence of a negative methane ion CH4−_4^- has been provided over a period of 50 years. However, quantum chemistry had not been able to explain its existence, and a detailed recent study has shown that the experimentally observed species cannot be described by the attachement of an electron in the ground state of CH4−_4^-. Here we describe CH4−_4^- as being a metastable species in its lowest quartet spin state and we find that this species is a CH2−_2^--:H2_2 exciplex with three open shells, lying 5.8 eV above the methane singlet ground state but slightly below the dissociation fragments. The formation of charged exciplexes is a novel mechanism to explain small molecular anions with implications in a plethora of basic and applied research fields

    The Gift and the meaning-giving subject: A Reading of Given Time

    Get PDF
    In this essay the relation between justice and the gift in Derrida’s thinking is explored. The essay shows that an understanding of the ontological difference or the relation between Being and beings in Heidegger’s thinking as well as Freud’s speculations on the death drive are essential to comprehend the ‘concept’ or ‘notion’ of diffĂ©rance as well as the gift in Derrida’s thinking. The analysis points to the complexity of Derrida’s thinking in his contemplation of the relation between justice and law and the need for a broader investigation to understand what is at stake in this regard. An exploration of the gift shows that Derrida’s thinking on justice is not ‘relativistic’ as is often assumed and that the gift can in a certain way function as a ‘guide’ in questions of constitutional interpretation

    In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments

    Get PDF
    In this paper we claim that an efficient and readily applicable means to improve privacy of Android applications is: 1) to perform runtime monitoring by instrumenting the application bytecode and 2) in-vivo, i.e. directly on the smartphone. We present a tool chain to do this and present experimental results showing that this tool chain can run on smartphones in a reasonable amount of time and with a realistic effort. Our findings also identify challenges to be addressed before running powerful runtime monitoring and instrumentations directly on smartphones. We implemented two use-cases leveraging the tool chain: BetterPermissions, a fine-grained user centric permission policy system and AdRemover an advertisement remover. Both prototypes improve the privacy of Android systems thanks to in-vivo bytecode instrumentation.Comment: ISBN: 978-2-87971-111-
    • 

    corecore