150 resultados para Main Memory
Resumo:
When arranging a place to meet in Brisbane, it has become almost second nature to say, “I’ll meet you outside Hungry Jack’s,” which is located in Queen Street Mall. In Melbourne, the common saying is, “I’ll meet you under the clocks,” which refers to the row of clocks above the main entrance to Flinders Street Railway Station. The saying “I’ll meet you under the clocks” is loaded with memory and history for most Melbournians—from WWII farewells to after school meetings. The clocks, and the station, have become part of the symbolic culture of the city. A feature of these two sites is the diversity of people who arrange to meet there, ranging from business people, tourists, teenagers, lovers, families to local schoolchildren. These two spaces cross boundaries of exclusion and enable people to feel as though they belong the city. While it seems appropriate for people to arrange to meet at a railway station, it is interesting that many people who meet at Flinders Street Station do not travel by train to arrive there: some walk; some take the tram and then walk; others arrive by bus. Similarly, most of the many people who arrange to meet outside Hungry Jack’s in Brisbane do not intend to enter the store...
Resumo:
"Whe' yu' from?" The question was put to me as I wandered, camera in hand, in the old square of Spanish Town, Jamaica's former capital. The local man, lounging in the shade of one of the colonial Georgian buildings that enclose the square, was mildly curious about what he took to be a typical white tourish photgraphing the sights of the decayed historic town. At that time, my home was in Kingston where i lived with my wife and baby son. I was then working in the Jamaican Government Town Planning Department in a job that took me all over the island. Turning to my questioner, I replied, "Kingston". There was a brief pause, and then the man spoke again: "No Man! Whe' yu' really from?" I still have difficulties when asked this question. Where am I from? What does this question mean? Does it refer to where I was born, where I spent my previous life or where I live now? Does it have a broader meaning, an enquiry about my origins in terms of background and previous experience? The following chapters are my attempt to answer these questions for my own satisfaction and, I hope, for the amusement of others who may be interested in the life of an ordinary English boy whose dream to travel and see the world was realized in ways he could not possibly have imagined. Finding an appropriate title for this book was difficult. Thursday's Child, North and South and War and Peace all came to mind but, unfortunately for me, those titles had been appropriated by other writers. Thursdays's Child is quite a popular book title, presumably because people who were born on that day and, in the words of the nursery rhyme, had 'far to go', are especially likely to have travellers' tales to tell or life stories of the rags-to-riches variety. Born on a Thursday, I have travelled a lot and I suppose that I have gone far in life. Coming from a working class family, I 'got on' by 'getting a good education' and a 'good job'. I decided against adding to the list of Thursday's Children. North and South would have reflected my life in Britain, spent in both the North and South of England, and my later years, divided between the Northern and Southern Hemispheres of the globe, as well as in countries commonly referred to as the 'advanced' North and the 'underdeveloped' South. North and South has already been appropriated by Mrs Gaskell, something that did not deter one popular American writer from using the title for a book of his. My memories of World War Two and the years afterwards made War and Peace a possible candidate, but readers expectnig an epic tale of Tolstoyan proportions may have been disappointed. To my knowledge, no other book has the title "Whe' Yu' From?". I am grateful to the Jamaican man whose question lingered in my memory and provided the title of this memoir, written decades later. This book is a word picture. It is, in a sense, a self-portrait, and like all portraits, it captures something of the character, it attempts to tell the truth, but it is not the whole truth. This is because it is not my intention to write my entire life story; rather I wish to tell about some of the things in my experience of life that have seemed important or interesting to me. Unlike a painted portrait, the picture I have created is intended to suggest the passage of time. While, for most of us in Western society, time is linear and unidirectional, like the flight of an arrov or the trajectory of a bullet, memory rearranges things, calling up images of the past in no particular order, making connections that may link events in various patterns, circular, web-like, superimposed. The stream of consciousness is very unlike that of streams we encounter in the physical world. Connections are made in all directions; thoughts hop back and forth in time and space, from topic to topic. My book is a composition drawn from periods, events and thoughts as I remember them. Like life itself, it is made up of patches, some good, some bad, but in my experience, always fascinating. In recording my memories, I have been as accurate as possible. Little of what I have written is about spectacular sights and strange customs. Much of it focuses on my more modest explorations includng observations of everyday things that have attracted my attention. Reading through the chapters, I am struck by my childhood freedom to roam and engage in 'dangerous' activities like climbing trees and playing beside streams, things that many children today are no longer allowed to enjoy. Also noticeable is the survival of traditions and superstitions from the distant past. Obvious too, is my preoccupation with place names, both official ones that appear on maps and sign boards and those used by locals and children, names rarely seen in print. If there is any uniting theme to be found in what I have written, it must be my education in the fields, woods and streets of my English homeland, in the various other countries in which I have lived and travelled, as well as more formally from books and in classrooms. Much of my book is concerned with people and places. Many of the people I mention are among those who have been, and often have remained, important and close to me. Others I remember from only the briefest of encounters, but they remain in my memory because of some specific incident or circumstance that fixed a lasting image in my mind. Some of my closest friends and relatives, however, appear nowhere in these pages or they receive only the slightest mention. This is not because they played an unimportant roles in my life. It is because this book is not the whole story. Among those whe receive little or no mention are some who are especially close to me, with whom I have shared happy and sad times and who have shown me and my family much kindness, giving support when this was needed. Some I have known since childhood and have popped up at various times in my life, often in different parts of the world. Although years may pass without me seeing them, in an important sense they are always with me. These people know who they are. I hope that they know how much I love and appreciate them. When writing my memoir, I consulted a few of the people mentioned in this book, but in the main, I have relied on my own memory, asided by daiary and notebook entries and old correspondence. In the preparation of this manuscript, I benefited greatly from the expert advice and encouragement of Neil Marr of BeWrite Books. My wife Anne, inspiration for this book, also contributed in the valuable role of critic. She has my undying gratitude.
Resumo:
The symbolic and improvisational nature of Livecoding requires a shared networking framework to be flexible and extensible, while at the same time providing support for synchronisation, persistence and redundancy. Above all the framework should be robust and available across a range of platforms. This paper proposes tuple space as a suitable framework for network communication in ensemble livecoding contexts. The role of tuple space as a concurrency framework and the associated timing aspects of the tuple space model are explored through Spaces, an implementation of tuple space for the Impromptu environment.
Resumo:
A recent Australian literature digitisation project uncovered some surprising discoveries in the children’s books that it digitised. The Children’s Literature Digital Resources (CLDR) Project digitised children’s books that were first published between 1851 to 1945 and made them available online through AustLit: The Australian Literature Resource. The digitisation process also preserved, within the pages of those books, a range of bookplates, book labels, inscriptions, and loose ephemera. This material allows us to trace the provenance of some of the digitised works, some of which came from the personal libraries of now-famous authors, and others from less celebrated sources. These extra-textual traces can contribute to cultural memory of the past by providing evidence of how books were collected and exchanged, and what kinds of books were presented as prizes in schools and Sunday schools. They also provide insight into Australian literary and artistic networks, particularly of the first few decades of the 20th century. This article describes the kinds of material uncovered in the digitisation process and suggests that the material provides insights into literary and cultural histories that might otherwise be forgotten. It also argues that the indexing of this material is vital if it is not to be lost to future researchers.
Resumo:
The process of researching children’s literature from the past is a growing challenge as resources age and are increasingly treated as rare items, stored away within libraries and other research centres. In Australia, researchers and librarians have collaborated with the bibliographic database AustLit: The Australian Literature Resource to produce the Australian Children’s Literature Digital Resources Project (CLDR). This Project aims to address the growing demand for online access to rare children’s literature resources, and demonstrates the research potential of early Australian children’s literature by supplementing the collection with relevant critical articles. The CLDR project is designed with a specific focus and provides access to full text Australian children’s literature from European settlement to 1945. The collection demonstrates a need and desire to preserve literature treasures to prevent losing such collections in a digital age. The collection covers many themes relevant to the conference including, trauma, survival, memory, survival, hauntings, and histories. The resource provides new and exciting ways with which to research children’s literature from the past and offers a fascinating repository to scholars and professionals of ranging disciplines who are in interested in Australian children’s literature.
Resumo:
This paper presents the main findings of a narrative examination of higher court sentencing remarks to explore the relationship between Indigeneity and sentencing for female defendants in Western Australia. Using the theoretical framework of focal concerns, we found that key differences in the construction of blameworthiness and risk between the sentencing stories of Indigenous and non-Indigenous female offenders, through the identification of issues such as mental health, substance abuse, familial trauma and community ties. Further, in the sentencing narratives, Indigenous women were viewed differently in terms of social costs of imprisonment.
Resumo:
Elaborated Intrusion theory (EI theory; Kavanagh, Andrade, & May, 2005) posits two main cognitive components in craving: associative processes that lead to intrusive thoughts about the craved substance or activity, and elaborative processes supporting mental imagery of the substance or activity. We used a novel visuospatial task to test the hypothesis that visual imagery plays a key role in craving. Experiment 1 showed that spending 10 min constructing shapes from modeling clay (plasticine) reduced participants' craving for chocolate compared with spending 10 min 'letting your mind wander'. Increasing the load on verbal working memory using a mental arithmetic task (counting backwards by threes) did not reduce craving further. Experiment 2 compared effects on craving of a simpler verbal task (counting by ones) and clay modeling. Clay modeling reduced overall craving strength and strength of craving imagery, and reduced the frequency of thoughts about chocolate. The results are consistent with EI theory, showing that craving is reduced by loading the visuospatial sketchpad of working memory but not by loading the phonological loop. Clay modeling might be a useful self-help tool to help manage craving for chocolate, snacks and other foods.
Resumo:
Free association norms indicate that words are organized into semantic/associative neighborhoods within a larger network of words and links that bind the net together. We present evidence indicating that memory for a recent word event can depend on implicitly and simultaneously activating related words in its neighborhood. Processing a word during encoding primes its network representation as a function of the density of the links in its neighborhood. Such priming increases recall and recognition and can have long lasting effects when the word is processed in working memory. Evidence for this phenomenon is reviewed in extralist cuing, primed free association, intralist cuing, and single-item recognition tasks. The findings also show that when a related word is presented to cue the recall of a studied word, the cue activates it in an array of related words that distract and reduce the probability of its selection. The activation of the semantic network produces priming benefits during encoding and search costs during retrieval. In extralist cuing recall is a negative function of cue-to-distracter strength and a positive function of neighborhood density, cue-to-target strength, and target-to cue strength. We show how four measures derived from the network can be combined and used to predict memory performance. These measures play different roles in different tasks indicating that the contribution of the semantic network varies with the context provided by the task. We evaluate spreading activation and quantum-like entanglement explanations for the priming effect produced by neighborhood density.
Resumo:
Two experiments examine outcomes for sponsor and ambusher brands within sponsorship settings. It is demonstrated that although making consumers aware of the presence of ambusher brands can reduce subsequent event recall to competitor cues, recall to sponsor cues can also suffer. Attitudinal effects are also considered.
Resumo:
Boron, which is an essential element for plants, is toxic to humans and animals at high concentrations. Layered double hydroxides (LDHs) and thermally activated LDHs have shown good uptake of a range of boron species in laboratory scale experiments when compared to current available methods, which are for the most part ineffective or prohibitively expensive. LDHs were able to remove anions from water by anion exchange, the reformation (or memory) effect and direct precipitation. The main mechanism of boron uptake appeared to be anion exchange, which was confirmed by powder X-ray diffraction (XRD) measurements. Solution pH appeared to have little effect on boron sorption while thermal activation did not always significantly improve boron uptake. In addition, perpetration of numerous LDHs with varying boron anions in the interlayer region by direct co-precipitation and anion exchange have been reported by a number of groups. The composition and orientation of the interlayer boron ions could be identified with reasonable certainty by applying a number of characterisation techniques including: powder XRD, nuclear magnetic resonance spectroscopy (NMR), X-ray photoelectron spectroscopy (XPS) and infrared (IR) spectroscopy. There is still considerable scope for future research on the application of LDHs for the removal of boron contaminants.
Resumo:
The generation of a correlation matrix from a large set of long gene sequences is a common requirement in many bioinformatics problems such as phylogenetic analysis. The generation is not only computationally intensive but also requires significant memory resources as, typically, few gene sequences can be simultaneously stored in primary memory. The standard practice in such computation is to use frequent input/output (I/O) operations. Therefore, minimizing the number of these operations will yield much faster run-times. This paper develops an approach for the faster and scalable computing of large-size correlation matrices through the full use of available memory and a reduced number of I/O operations. The approach is scalable in the sense that the same algorithms can be executed on different computing platforms with different amounts of memory and can be applied to different problems with different correlation matrix sizes. The significant performance improvement of the approach over the existing approaches is demonstrated through benchmark examples.
Resumo:
This study presents research findings to informthe design and development of innovativemobile services aiming to enable collocated people to interact with each other in public urban places. The main goal of this research is to provide applications and deliver guidelines to positively influence the user experience of different public urban places during everyday urban life. This study describes the design and evaluation of mobile content and services enabling mobile mediated interactions in an anonymous way. The research described in this thesis is threefold. First, this study investigates how Information and Communication Technology (ICT) can be utilised in particular urban public places to influence the experience of urban dwellers during everyday life. The research into urban residents and public places guides the design of three different technologies that form case studies to investigate and discover possibilities to digitally augment the public urban space and make the invisible data of our interactions in the urban environment visible. • Capital Music enables urban dwellers to listen to their music on their mobile devices as usual but also visualises the artworks of songs currently being played and listened to by other users in ones’ vicinity. • PlaceTagz uses QR codes printed on stickers that link to a digital message board enabling collocated users to interact with each other over time resulting in a place-based digital memory. • Sapporo World Window, Brisbane Hot Spots, and YourScreen are interactive content applications allowing people to share data with their mobile phones on public urban screens. The applications employ mobile phones to mediate interactions in form of location and video sharing. Second, this study sets out to explore the quality and nature of the experiences created through the developed and deployed case study applications. The development of a user experience framework for evaluating mobile mediated interactions in urban public places is described and applied within each case. Third, drawing on research from urban sociology, psychology, urban design, and the findings from this study, this thesis discusses how such interactions can have an impact on the urban experience.
Resumo:
The world is rapidly ageing. It is against this backdrop that there are increasing incidences of dementia reported worldwide, with Alzheimer's disease (AD) being the most common form of dementia in the elderly. It is estimated that AD affects almost 4 million people in the US, and costs the US economy more than 65 million dollars annually. There is currently no cure for AD but various therapeutic agents have been employed in attempting to slow down the progression of the illness, one of which is oestrogen. Over the last decades, scientists have focused mainly on the roles of oestrogen in the prevention and treatment of AD. Newer evidences suggested that testosterone might also be involved in the pathogenesis of AD. Although the exact mechanisms on how androgen might affect AD are still largely unknown, it is known that testosterone can act directly via androgen receptor-dependent mechanisms or indirectly by converting to oestrogen to exert this effect. Clinical trials need to be conducted to ascertain the putative role of androgen replacement in Alzheimer's disease.
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.