10,882 research outputs found
'Genealogical misfortunes': Achille Mbembe's (re-)writing of postcolonial Africa
In his latest work, Sortir de la grande nuit, the Cameroonian social theorist, Achille Mbembe nuances his description of the ontological status of the postcolonial African subject, which he had theorized extensively in his best-known text, On the Postcolony, and at the same time exploits the conceptual resources of a number of Jean-Luc Nancyâs lexical innovations. This recent text is also a reprise of an earlier autobiographical essay, and the gesture of this âreinscriptionâ is critical to our understanding of Mbembeâs status as a contemporary âpostcolonial thinkerâ, and the way in which he positions himself within a certain intellectual genealogy of postcolonial theory. Within this trajectory, I argue that we can read fruitfully his relationship to three influential figures: Jacques Derrida, Jean-Luc Nancy and Ruben Um NyobĂš
The role of recent experience and weight on hen's agonistic behaviour during dyadic conflict resolution.
Recent victory or defeat experiences and 2-hour familiarity with the meeting place were combined with size differences in order to better understand their effects on the behaviour leading to the establishment of dyadic dominance relationships between hens not previously acquainted with each other. Three kinds of encounters were videotaped: (i) a previous winner unfamiliar with the meeting place met a previous loser familiar for 2 hours with the meeting place (n = 12 dyads); (ii) as in (i) but both were unfamiliar with the meeting place (n=12); (iii) as in (i) but the previous winner was familiar with the meeting place while the previous loser was unfamiliar (n=13). The weight asymmetry was combined with these three types of encounters by selecting hens of various weight differences: in 29 dyads the recent loser was heavier than the recent winner and in 8 dyads it was the reverse. Recent experience had a major influence upon both agonistic behaviour and dominance outcome. Hens that were familiar with the meeting site initiated attacks more frequently than their unfamiliar opponent but did not win significantly more often. Recent experience and site familiarity could be used to identify 80% of future initiators. Once the first aggressive behaviour had been initiated, it led to victory of its initiator in 92% of cases. Weight was not found to influence agonistic behaviour nor dominance outcome. However, hens with superior comb and wattles areas won significantly more initial meetings than opponents with smaller ones. In the final encounters, victory also went more frequently to the bird showing larger comb and wattles, which happened also to be the previous dominant in a majority of cases. The use of higher-order partial correlations as an ex post facto control for comb and wattles indicates that they were not influential upon agonistic behaviour nor on dominance outcome, but were simply co-selected with the selection of victorious and defeated birds in the first phase of the experiment designed to let hens acquire recent victory/defeat experience
The role of hen's weight and recent experience on dyadic conflict outcome
This study simultaneously varied experiences of recent victory or defeat, 2-hour familiarity with the meeting place, and hen weight in order to understand their combined effects on the establishment of dyadic dominance relationships between hens not previously acquainted with each other. Three kinds of encounters were arranged: (i) a previous winner unfamiliar with the meeting place met a previous loser familiar with the meeting place (n =28 dyads); (ii) a previous winner met a previous loser, both unfamiliar with the meeting place (n=27); (iii) a previous winner familiar with the meeting place encountered a previous loser unfamiliar with the meeting place (n=28). The weight asymmetry was combined with these three types of encounters by selecting hens showing various weight differences, in favour of the recent loser in 54 dyads and of the recent winner in 29 dyads. Results indicate that recent victory or defeat experience significantly affected the outcome. Even an important weight asymmetry, or familiarity with the meeting place were not sufficient for a hen recently defeated to overcome an opponent that was previously victorious. A 2-hour period of familiarization with the meeting place did not provide any significant advantage over unfamiliarity. Although a significant relationship was found to exist between comb and wattles areas and the initial and final statuses, examination of partial correlations indicates that the influence was from initial status to final status, rather than from comb and wattles to final status. These results suggest that more importance should be attributed to recent social experience in comparison to intrinsic factors in determining dyadic dominance in the hen
Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android
A common security architecture is based on the protection of certain
resources by permission checks (used e.g., in Android and Blackberry). It has
some limitations, for instance, when applications are granted more permissions
than they actually need, which facilitates all kinds of malicious usage (e.g.,
through code injection). The analysis of permission-based framework requires a
precise mapping between API methods of the framework and the permissions they
require. In this paper, we show that naive static analysis fails miserably when
applied with off-the-shelf components on the Android framework. We then present
an advanced class-hierarchy and field-sensitive set of analyses to extract this
mapping. Those static analyses are capable of analyzing the Android framework.
They use novel domain specific optimizations dedicated to Android.Comment: IEEE Transactions on Software Engineering (2014). arXiv admin note:
substantial text overlap with arXiv:1206.582
Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android
A common security architecture, called the permission-based security model
(used e.g. in Android and Blackberry), entails intrinsic risks. For instance,
applications can be granted more permissions than they actually need, what we
call a "permission gap". Malware can leverage the unused permissions for
achieving their malicious goals, for instance using code injection. In this
paper, we present an approach to detecting permission gaps using static
analysis. Our prototype implementation in the context of Android shows that the
static analysis must take into account a significant amount of
platform-specific knowledge. Using our tool on two datasets of Android
applications, we found out that a non negligible part of applications suffers
from permission gaps, i.e. does not use all the permissions they declare
Can one improve the Froissart bound?
We explain why we hope that the Froissart bound can be improved, either
qualitatively or, more likely, quantitatively, by making a better use of
unitarity, in particular elastic unitarity. In other instances (Gribov's
theorem) elastic unitarity played a crucial role. A preliminary requirement for
this is to work with an appropriate average of the cross-section, to make the
problem well defined. This is possible, without destroying the Lukaszuk--Martin
bound.Comment: 4 pages, latex with AIP style, Talk given at "Diffraction 2008",
Lalonde-les-Maures, France, September 2008. Missing square root restored p.
3. pi^2->pi corrected in eq. (1
Solving the CH riddle: the fundamental role of spin to explain metastable anionic methane
When atoms or molecules exist in the form of stable negative ions, they play
a crucial role in the gas phase chemistry. Determining the existence of such an
ion, its internal energy and its stability are necessary prerequisites to
analyze the role of this ion in a particular medium. Experimental evidence of
the existence of a negative methane ion CH has been provided over a
period of 50 years. However, quantum chemistry had not been able to explain its
existence, and a detailed recent study has shown that the experimentally
observed species cannot be described by the attachement of an electron in the
ground state of CH. Here we describe CH as being a metastable
species in its lowest quartet spin state and we find that this species is a
CH-:H exciplex with three open shells, lying 5.8 eV above the methane
singlet ground state but slightly below the dissociation fragments. The
formation of charged exciplexes is a novel mechanism to explain small molecular
anions with implications in a plethora of basic and applied research fields
The Gift and the meaning-giving subject: A Reading of Given Time
In this essay the relation between justice and the gift in Derridaâs thinking is explored. The essay shows that an understanding of the ontological difference or the relation between Being and beings in Heideggerâs thinking as well as Freudâs speculations on the death drive are essential to comprehend the âconceptâ or ânotionâ of diffĂ©rance as well as the gift in Derridaâs thinking. The analysis points to the complexity of Derridaâs thinking in his contemplation of the relation between justice and law and the need for a broader investigation to understand what is at stake in this regard. An exploration of the gift shows that Derridaâs thinking on justice is not ârelativisticâ as is often assumed and that the gift can in a certain way function as a âguideâ in questions of constitutional interpretation
In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments
In this paper we claim that an efficient and readily applicable means to
improve privacy of Android applications is: 1) to perform runtime monitoring by
instrumenting the application bytecode and 2) in-vivo, i.e. directly on the
smartphone. We present a tool chain to do this and present experimental results
showing that this tool chain can run on smartphones in a reasonable amount of
time and with a realistic effort. Our findings also identify challenges to be
addressed before running powerful runtime monitoring and instrumentations
directly on smartphones. We implemented two use-cases leveraging the tool
chain: BetterPermissions, a fine-grained user centric permission policy system
and AdRemover an advertisement remover. Both prototypes improve the privacy of
Android systems thanks to in-vivo bytecode instrumentation.Comment: ISBN: 978-2-87971-111-
- âŠ