94 resultados para POLYNOMIAL IDENTITIES
Resumo:
Contemporary social and political constructions of victimhood and offending behaviour lie at the heart of regulatory policies on child sexual abuse. Legislation is named after specific child victims of high profile cases, and a burgeoning range of pre-emptive measures are enacted to protect an amorphous class of ‘all potential victims’ from the risk sex offenders are seen as posing. Such policies are also heavily premised on the omnipresent predatory stranger. These constructed identities, however, are at odds with the actual identities of victims and offenders of such crimes. Drawing on a range of literatures, the core task of this article is to confront some of the complexities and tensions surrounding constructions of the victim/offender dyad within the specific context of sexual offending against children. In particular, the article argues that discourses on ‘blame’ – and the polarised notions of ‘innocence’ and ‘guilt’ – inform respective hierarchies of victimhood and offending concerning ‘legitimate’ victim and offender status. Based on these insights, the article argues for the need to move beyond such monochromatic understandings of victims and offenders of sexual crime and to reframe the politics of risk accordingly.
Resumo:
The entanglement of identity and personal attire in colonial settings is explored through consideration of a tattered set of clothes from late sixteenth-early seventeenth-century Ireland incorporating elements of Irish, English, and Scots fashion. Reconsideration of the clothing, recovered from a bog, provides a rare opportunity to explore the physical manifestations of processes of hybridity and mimesis, as well as the pragmatic accommodations of impoverishment and displacement in colonial settings. In addition to considering the role of material culture in colonial identity formation and negotiation, examination of what has become known as the Dungiven costume also speaks to the ongoing legacy of early modern colonial encounters, as the cultural associations of the garments, and by extension their past wearer(s), continue to be subjected to the politically charged nature of identity politics in contemporary Northern Ireland.
Resumo:
Let C be a bounded cochain complex of finitely generatedfree modules over the Laurent polynomial ring L = R[x, x−1, y, y−1].The complex C is called R-finitely dominated if it is homotopy equivalentover R to a bounded complex of finitely generated projective Rmodules.Our main result characterises R-finitely dominated complexesin terms of Novikov cohomology: C is R-finitely dominated if andonly if eight complexes derived from C are acyclic; these complexes areC ⊗L R[[x, y]][(xy)−1] and C ⊗L R[x, x−1][[y]][y−1], and their variants obtainedby swapping x and y, and replacing either indeterminate by its inverse.
Resumo:
The question of whether and to what extent sovereignty has been transferred to the European Union (EU) from its Member States remains a central debate within the EU and is interlinked with issues such as Kompetenz-Kompetenz, direct effect and primacy. Central to any claim to sovereignty is the principle of primacy, which requires that Member States uphold EU law over national law where there is a conflict. However, limitations to primacy can traditionally be found in national jurisprudence and the Maastricht Treaty introduced a possible EU limitation with the requirement that the EU respect national identities of Member States. The Lisbon Treaty provided only minimal further support to the principle of primacy whilst simultaneously developing the provision on national identities, now found within Article 4(2) TEU. There are indications from the literature, national constitutional courts and the Court of Justice of the EU that the provision is gathering strength as a legal tool and is likely to have a wider scope than the text might indicate. In its new role, Article 4(2) TEU bolsters the Member States’ claim to sovereignty and the possibility to uphold aspects crucial to them in conflict with EU law and the principle of primacy. Consequently, it is central to the relationship between the constitutional courts of the Member States and the CJEU, and where the final elements of control remain in ‘hard cases’. However, it does so as part of EU law, thereby facilitating the evasion of direct fundamental conflicts and reflecting the concept of constitutional pluralism.
Resumo:
Until now, scholars have argued that, unlike other Latin American countries with sizable indigenous populations, indigenous politics are largely unimportant in Peru because indigenous-based parties or national-level movements are absent. Rather than focusing solely on the emergence of indigenous parties or movements, which ignores the larger consequence of individuals' indigenous identifications for electoral politics, we argue that it is more important to examine the emergence of indigenous political divisions and their effects on indigenous representation. Using data from the World Values Survey across the presidential elections of 1995, 2001, and 2006, we show that, as indigenous identity has become more carefully defined, indigenous voting divisions have emerged in Peru, and concomitantly, parties have begun to recognize and respond to these divisions.
Resumo:
Credal networks relax the precise probability requirement of Bayesian networks, enabling a richer representation of uncertainty in the form of closed convex sets of probability measures. The increase in expressiveness comes at the expense of higher computational costs. In this paper, we present a new variable elimination algorithm for exactly computing posterior inferences in extensively specified credal networks, which is empirically shown to outperform a state-of-the-art algorithm. The algorithm is then turned into a provably good approximation scheme, that is, a procedure that for any input is guaranteed to return a solution not worse than the optimum by a given factor. Remarkably, we show that when the networks have bounded treewidth and bounded number of states per variable the approximation algorithm runs in time polynomial in the input size and in the inverse of the error factor, thus being the first known fully polynomial-time approximation scheme for inference in credal networks.