223 resultados para Symbolic Computations


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The symbolic and improvisational nature of Livecoding requires a shared networking framework to be flexible and extensible, while at the same time providing support for synchronisation, persistence and redundancy. Above all the framework should be robust and available across a range of platforms. This paper proposes tuple space as a suitable framework for network communication in ensemble livecoding contexts. The role of tuple space as a concurrency framework and the associated timing aspects of the tuple space model are explored through Spaces, an implementation of tuple space for the Impromptu environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Architecture Post Mortem surveys architecture’s encounter with death, decline, and ruination following late capitalism. As the world moves closer to an economic abyss that many perceive to be the death of capital, contraction and crisis are no longer mere phases of normal market fluctuations, but rather the irruption of the unconscious of ideology itself. Post mortem is that historical moment wherein architecture’s symbolic contract with capital is put on stage, naked to all. Architecture is not irrelevant to fiscal and political contagion as is commonly believed; it is the victim and penetrating analytical agent of the current crisis. As the very apparatus for modernity’s guilt and unfulfilled drives-modernity’s debt-architecture is that ideological element that functions as a master signifier of its own destruction, ordering all other signifiers and modes of signification beneath it. It is under these conditions that architecture theory has retreated to an “Alamo” of history, a final desert outpost where history has been asked to transcend itself. For architecture’s hoped-for utopia always involves an apocalypse. This timely collection of essays reformulates architecture’s relation to modernity via the operational death-drive: architecture is but a passage between life and death. This collection includes essays by Kazi K. Ashraf, David Bertolini, Simone Brott, Peggy Deamer, Didem Ekici, Paul Emmons, Donald Kunze, Todd McGowan, Gevork Hartoonian, Nadir Lahiji, Erika Naginski, and Dennis Maher. Contents: Introduction: ‘the way things are’, Donald Kunze; Driven into the public: the psychic constitution of space, Todd McGowan; Dead or alive in Joburg, Simone Brott; Building in-between the two deaths: a post mortem manifesto, Nadir Lahiji; Kant, Sade, ethics and architecture, David Bertolini; Post mortem: building deconstruction, Kazi K. Ashraf; The slow-fast architecture of love in the ruins, Donald Kunze; Progress: re-building the ruins of architecture, Gevork Hartoonian; Adrian Stokes: surface suicide, Peggy Deamer; A window to the soul: depth in the early modern section drawing, Paul Emmons; Preliminary thoughts on Piranesi and Vico, Erika Naginski; architectural asceticism and austerity, Didem Ekici; 900 miles to Paradise, and other afterlives of architecture, Dennis Maher; Index.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A synthesis is presented of the predictive capability of a family of near-wall wall-normal free Reynolds stress models (which are completely independent of wall topology, i.e., of the distance fromthe wall and the normal-to-thewall orientation) for oblique-shock-wave/turbulent-boundary-layer interactions. For the purpose of comparison, results are also presented using a standard low turbulence Reynolds number k–ε closure and a Reynolds stress model that uses geometric wall normals and wall distances. Studied shock-wave Mach numbers are in the range MSW = 2.85–2.9 and incoming boundary-layer-thickness Reynolds numbers are in the range Reδ0 = 1–2×106. Computations were carefully checked for grid convergence. Comparison with measurements shows satisfactory agreement, improving on results obtained using a k–ε model, and highlights the relative importance of redistribution and diffusion closures, indicating directions for future modeling work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Substantial research efforts have been expended to deal with the complexity of concurrent systems that is inherent to their analysis, e.g., works that tackle the well-known state space explosion problem. Approaches differ in the classes of properties that they are able to suitably check and this is largely a result of the way they balance the trade-off between analysis time and space employed to describe a concurrent system. One interesting class of properties is concerned with behavioral characteristics. These properties are conveniently expressed in terms of computations, or runs, in concurrent systems. This article introduces the theory of untanglings that exploits a particular representation of a collection of runs in a concurrent system. It is shown that a representative untangling of a bounded concurrent system can be constructed that captures all and only the behavior of the system. Representative untanglings strike a unique balance between time and space, yet provide a single model for the convenient extraction of various behavioral properties. Performance measurements in terms of construction time and size of representative untanglings with respect to the original specifications of concurrent systems, conducted on a collection of models from practice, confirm the scalability of the approach. Finally, this article demonstrates practical benefits of using representative untanglings when checking various behavioral properties of concurrent systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

‘Social innovation’ is a construct increasingly used to explain the practices, processes and actors through which sustained positive transformation occurs in the network society (Mulgan, G., Tucker, S., Ali, R., Sander, B. (2007). Social innovation: What it is, why it matters and how can it be accelerated. Oxford:Skoll Centre for Social Entrepreneurship; Phills, J. A., Deiglmeier, K., & Miller, D. T. Stanford Social Innovation Review, 6(4):34–43, 2008.). Social innovation has been defined as a “novel solution to a social problem that is more effective, efficient, sustainable, or just than existing solutions, and for which the value created accrues primarily to society as a whole rather than private individuals.” (Phills,J. A., Deiglmeier, K., & Miller, D. T. Stanford Social Innovation Review, 6 (4):34–43, 2008: 34.) Emergent ideas of social innovation challenge some traditional understandings of the nature and role of the Third Sector, as well as shining a light on those enterprises within the social economy that configure resources in novel ways. In this context, social enterprises – which provide a social or community benefit and trade to fulfil their mission – have attracted considerable policy attention as one source of social innovation within a wider field of action (see Leadbeater, C. (2007). ‘Social enterprise and social innovation: Strategies for the next 10 years’, Cabinet office,Office of the third sector http://www.charlesleadbeater.net/cms xstandard/social_enterprise_innovation.pdf. Last accessed 19/5/2011.). And yet, while social enterprise seems to have gained some symbolic traction in society, there is to date relatively limited evidence of its real world impacts.(Dart, R. Not for Profit Management and Leadership, 14(4):411–424, 2004.) In other words, we do not know much about the social innovation capabilities and effects of social enterprise. In this chapter, we consider the social innovation practices of social enterprise, drawing on Mulgan, G., Tucker, S., Ali, R., Sander, B. (2007). Social innovation: What it is, why it matters and how can it be accelerated. Oxford: Skoll Centre for Social Entrepreneurship: 5) three dimensions of social innovation: new combinations or hybrids of existing elements; cutting across organisational, sectoral and disciplinary boundaries; and leaving behind compelling new relationships. Based on a detailed survey of 365 Australian social enterprises, we examine their self-reported business and mission-related innovations, the ways in which they configure and access resources and the practices through which they diffuse innovation in support of their mission. We then consider how these findings inform our understanding of the social innovation capabilities and effects of social enterprise,and their implications for public policy development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In May 2011, the Centre for Crime and Justice Studies published Lessons for the Coalition: an end of term report on New Labour and Criminal Justice (Silvestri, 2011). In that collection I described Labour's performance on environmental issues as ‘too little too late’. The UK experienced a period of Blair/Brown environmental governance that demonstrated ‘symbolic success but real failure’. Amongst New Labour's environmental achievements were the establishment of the Climate Change Act 2008, the creation of the Department of Energy and Climate Change and the establishment of numerous green quangos to oversee and implement a range of environmental policies. However, these steps forward were seemingly threatened by the early days of a Cameron-led coalition where austerity measure, trade and the abolition of green quangos were on the cards. In sum, I concluded ‘future UK government report cards on the environment do not look good’ (Walters, 2011). After two and half years of a Conservative/Liberal Democratic coalition, and much rhetoric about it being ‘the greenest government ever’, the interim report card for the Cameron government on environmental matters is grim reading indeed. The demise of green quangos, record carbon emissions, renewable energies policies stultified, environmental criminality and victimisation all but ignored, and billions of pounds lost to environmental corporate fraudsters are just some of the headlines of Tory inspired governance with much environmental rhetoric and no environmental results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Balboni identifies her interest as being the processes of official disclosure and the path taken to civil litigation by survivors of child sexual abuse by Roman Catholic Clergy. The empirical data, on which this work is based, come in the form of in-depth face-to-face interviews with 22 survivors of clergy sexual abuse who have pursued litigation and 13 of their advocates. Balboni provides a space for survivors’ accounts of the ‘why’ behind their decision making and the impact of civil litigation on their lives to be heard, discussed and contextualized with both clarity and sensitivity. She acknowledges the breadth and depth of survivor responses, and the perspectives of their legal advocates, employing defiance theory, symbolic interaction and other points of analysis, to capture the journey of survivors towards litigation and beyond. Balboni’s work is deeply poignant in its recognition of survivors’ voices, the complex transformative capacity of litigation, the effects of community forming amongst survivors and the complex nature of ‘empowerment’ obtained by survivors through civil litigation. Acknowledging that, for many survivors, litigation becomes a means of identity change and truth telling, Balboni admits that ‘these survivors helped me understand that litigation is more about voice than monetary settlement’ (p. 149). This work is not deeply analytical or theoretically rich but privileges the voices of survivors and their advocates with sufficient frameworks to contextualize and explain participants’ perspectives and experiences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: The nature of contemporary cancer therapy means that patients are faced with difficult treatment decisions about surgery, chemotherapy and radiotherapy. For some, this process may also involve consideration of therapies that sit outside the biomedical approach to cancer treatment, in our research, traditional Chinese medicine (TCM). Thus, it is important to explore how cancer patients in Taiwan incorporate TCM into their cancer treatment journey. This paper aims to explore of the patterns of combining the use of TCM and Western medicine into cancer treatment journey in Taiwanese people with cancer. Methods: The sampling was purposive and the data collected through in-depth interviews. Data collection occurred over an eleven month. The research was grounded in the premises of symbolic interactionism and adopted the methods of grounded theory. Twenty four participants who were patients receiving cancer treatment were recruited from two health care settings in Taiwan. Results: The study findings suggest that perceptions of health and illness are mediated through ongoing interactions with different forms of therapy. The participants in this study had a clear focus on “process and patterns of using TCM and Western medicine”. Further, ‘different importance in Western medicine and TCM’, ‘taken for granted to use TCM’, ‘each has specialized skills in Western medicine and TCM’ and ‘different symptoms use different approaches (Western medicine or TCM)’ may explicit how the participants in this study see CAM and Western medicine. Conclusions/Implications for practice: The descriptive frame of the study suggests that TCM and Western medicine occupy quite distinct domains in terms of decision making over their use. People used TCM based on interpretations of the present and against a background of an enduring cultural legacy grounded in Chinese philosophical beliefs about health and healthcare. The increasingly popular term of 'integrative medicine' obscures the complex contexts of the patterns of use of both therapeutic modalities. It is this latter point that is worthy of further exploration.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In order to drive sustainable financial profitability, service firms make significant investments in creating service environments that consumers will prefer over the environments of their competitors. To date, servicescape research is over-focused on understanding consumers’ emotional and physiological responses to servicescape attributes, rather than taking a holistic view of how consumers cognitively interpret servicescapes. This thesis argues that consumers will cognitively ascribe symbolic meanings to servicescapes and then evaluate if those meanings are congruent with their sense of Self in order to form a preference for a servicescape. Consequently, this thesis takes a Self Theory approach to servicescape symbolism to address the following broad research question: How do ascribed symbolic meanings influence servicescape preference? Using a three-study, mixed-method approach, this thesis investigates the symbolic meanings consumers ascribe to servicescapes and empirically tests whether the joint effects of congruence between consumer Self and the symbolic meanings ascribed to servicescapes influence consumers’ servicescape preference. First, Study One identifies the symbolic meanings ascribed to salient servicescape attributes using a combination of repertory tests and laddering techniques within 19 semi-structured individual depth interviews. Study Two modifies an existing scale to create a symbolic servicescape meaning scale in order to measure the symbolic meanings ascribed to servicescapes. Finally, Study Three utilises the Self-Congruity Model to empirically examine the joint effects of consumer Self and servicescape on consumers’ preference for servicescapes. Using polynomial regression with response surface analysis, 14 joint effect models demonstrate that both Self-Servicescape incongruity and congruity influence consumers’ preference for servicescapes. Combined, the findings of three studies suggest that the symbolic meanings ascribed to servicescapes and their (in)congruities with consumers’ sense of self can be used to predict consumers’ preferences for servicescapes. These findings have several key theoretical and practical contributions to services marketing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

“Slow Horizon” is comprised of six lenticular panels hung in an even, horizontal sequence. As the viewer moves in front of the work, each panel alternates subtly between two vertical colour gradients. From left to right, the panels move through yellow, orange, magenta and violet to ‘midnight blue’. Together, the coloured panels comprise an abstract horizon line that references the changing nature of light at sunset. The scale, movement and chromatic qualities of the panels also allude to the formal characteristics of the screen technologies that pervade contemporary visual culture. “Slow Horizon” contributes to studies in the field of contemporary art. It is particularly concerned with the relationships between abstraction, colour, signification and perception. Since early Modernity, debates concerning representation and the formal qualities of the picture plane have been fundamental to art practice and theory. These debates have often dovetailed with questions of art’s capacity to generate shifts in thought and perception. Practitioners such as Ellsworth Kelly, James Turrell and Ed Ruscha have variously used block and blended colour to engage in these formal, symbolic and perceptual potentials of colour. Using a practice-led research methodology, “Slow Horizon” furthers this creative inquiry. By conflating the reductive visual logics of abstraction and minimalism with the iconic, romantic evocations of sunset imagery, it questions not only the contemporary relationship between abstraction and image-making, but also art’s ability to create moments of stillness and contemplation in a context significantly shaped by screen technologies. “Slow Horizon” has been exhibited internationally as part of “Supermassive” at LA Louver Gallery, Venice, California in 2013. The exhibition was reviewed in The Los Angeles Times.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations. Instead, pairwise (symmetric) keys are required to be pre-distributed by assigning a list of keys, (a.k.a. key-chain), to each sensor node. If a pair of nodes does not have a common key after deployment then they must find a key-path with secured links. The objective is to minimize the keychain size while (i) maximizing pairwise key sharing probability and resilience, and (ii) minimizing average key-path length. This paper presents a deterministic key distribution scheme based on Expander Graphs. It shows how to map the parameters (e.g., degree, expansion, and diameter) of a Ramanujan Expander Graph to the desired properties of a key distribution scheme for a physical network topology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Teacher assessment literacy is a phrase that is often used but rarely defined. Yet understanding teacher assessment literacy is important in an international curriculum and assessment reform context that continues to challenge teachers’ assessment practices. In this article situated examples of classroom assessment literacies are analysed using Bernstein’s (Pedagogy, symbolic control and identity: Theory, research and critique, Taylor and Francis, London, 1996; Br J Sociol Educ 20(2):157–173, 1999) theoretical tools of vertical and horizontal discourses, classification and framing. Drawing on a sociocultural view of learning, the authors define teacher assessment literacies as dynamic social practices which are context dependent and which involve teachers in articulating and negotiating classroom and cultural knowledges with one another and with learners, in the initiation, development and practice of assessment to achieve the learning goals of students. This conceptualisation of assessment literacy aims to make explicit some underpinning theoretical constructs of assessment literacy to inform dialogue and decision making for policy and practice to benefit student learning and achievement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Identifying the design features that impact construction is essential to developing cost effective and constructible designs. The similarity of building components is a critical design feature that affects method selection, productivity, and ultimately construction cost and schedule performance. However, there is limited understanding of what constitutes similarity in the design of building components and limited computer-based support to identify this feature in a building product model. This paper contributes a feature-based framework for representing and reasoning about component similarity that builds on ontological modelling, model-based reasoning and cluster analysis techniques. It describes the ontology we developed to characterize component similarity in terms of the component attributes, the direction, and the degree of variation. It also describes the generic reasoning process we formalized to identify component similarity in a standard product model based on practitioners' varied preferences. The generic reasoning process evaluates the geometric, topological, and symbolic similarities between components, creates groupings of similar components, and quantifies the degree of similarity. We implemented this reasoning process in a prototype cost estimating application, which creates and maintains cost estimates based on a building product model. Validation studies of the prototype system provide evidence that the framework is general and enables a more accurate and efficient cost estimating process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

“Supermassive” is a synchronised four-channel video installation with sound. Each video channel shows a different camera view of an animated three-dimensional scene, which visually references galactic or astral imagery. This scene is comprised of forty-four separate clusters of slowly orbiting white text. Each cluster refers to a different topic that has been sourced online. The topics are diverse with recurring subjects relating to spirituality, science, popular culture, food and experiences of contemporary urban life. The slow movements of the text and camera views are reinforced through a rhythmic, contemplative soundtrack. As an immersive installation, “Supermassive” operates somewhere between a meditational mind map and a representation of a contemporary data stream. “Supermassive” contributes to studies in the field of contemporary art. It is particularly concerned with the ways that graphic representations of language can operate in the exploration of contemporary lived experiences, whether actual or virtual. Artists such as Ed Ruscha and Christopher Wool have long explored the emotive and psychological potentials of graphic text. Other artists such as Doug Aitken and Pipilotti Rist have engaged with the physical and spatial potentials of audio-visual installations to create emotive and symbolic experiences for their audiences. Using a practice-led research methodology, “Supermassive” extends these creative inquiries. By creating a reflective atmosphere in which divergent textual subjects are pictured together, the work explores not only how we navigate information, but also how such navigations inform understandings of our physical and psychological realities. “Supermassive” has been exhibited internationally at LA Louver Gallery, Venice, California in 2013 and nationally with GBK as part of Art Month Sydney, also in 2013. It has been critically reviewed in The Los Angeles Times.