765 resultados para Demoniac possession.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We show the first deterministic construction of an unconditionally secure multiparty computation (MPC) protocol in the passive adversarial model over black-box non-Abelian groups which is both optimal (secure against an adversary who possesses any tpossession of the adversary. Unlike the deterministic constructions from Desmedt et al. (2012) our construction has subexponential complexity and is optimal at the same time, i.e., it is secure for any t

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While landscape photography’s complicity with the colonial possession of new territory has been substantially discussed and well understood, this paper considers the role of the European landscape as the focus of diasporic desire. The interdisciplinary project, S2Q/Good Blood began as a social history map of Scandinavian and Nordic migration to Queensland in the nineteenth century, incorporating archival material from local collections with visual field trip data gathered in Denmark, Sweden, Norway and Finland. In 2011, some of this material found its way into the installation work, 'my mother is water, my father is wood'. What emerged from this experiment was an imaginary landscape, melding its loci through original photography and video footage in tandem with stock imagery and historical material. This juxtaposition reinforced the represented landscape as a narrative landscape and evidence of the performativity of belonging. This practitioner reflection utilizes Lynette Russell’s research into landscape archaeology to consider the significance of relationships with landscapes that are “not always empirically demonstrable.”

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation provides a synchronic grammatical description of Mauwake, a Papuan (Trans-New Guinea) language of about 2000 speakers on the North Coast of the Madang Province in Papua New Guinea. The theoretical background is that of Basic Linguistic Theory (BLT), used extensively in analysing and writing descriptive grammars. The chapters from morphology to clause level are described from form to function; in the later chapters the function is taken more often as the starting point. Any theory-specific terminology is kept to the minimum and formalisms have been avoided in accordance with BLT principles. Mauwake has a classic 5-vowel system and 14 consonant phonemes. With its simple phonology it is a typical representative of the Madang North Coast languages. For a Papuan language there are relatively few morphophonological alternations. Nouns are either alienably or inalienably possessed. There is no obligatory number marking in nouns or noun phrases. Pronouns have several different forms: five for case and three for other functions. The dative pronouns are treated as [+human] locatives, and they have also grammaticalised as possessives. The verbal morphology is agglutinative and mainly suffixal. Unusual features include two distributive suffixes, and the interaction of the derivational benefactive and the inflectional beneficiary suffixes. The applicative suffix has either transitivising or causative but not benefactive function. The switch-reference system distinguishes between simultaneous and sequential action, as well as same or different subject in relation to the following clause. There are several verbs denoting coming and going, and they may combine with one of three prefixes to indicate bringing and taking. Mauwake is a nominative-accusative type language, and the basic constituent order in a clause is SOV. Subject and object are the only syntactic arguments. There is no indirect object, but a clause can have two or even three objects. A nominalised clause with a finite verb functions as a relative clause or a complement clause; one with a nominalised verb has several different functions. Functional domains described include modality, negation, deixis, quantification, possession and comparison. As there are four negators, Mauwake has more variation in negative expressions than is usual in Papuan languages. Clause chaining is the preferred strategy for joining clauses into sentences, but coordination and subordination of finite clauses are also common. The form of a complement clause depends on whether it is of the fact, action or potential type. Tail-head linkage is used as a cohesive device between sentences. The discourse-level features described are topic and focus.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study concentrates on the contested concept of pastiche in literary studies. It offers the first detailed examination of the history of the concept from its origins in the seventeenth century to the present, showing how pastiche emerged as a critical concept in interaction with the emerging conception of authorial originality and the copyright laws protecting it. One of the key results of this investigation is the contextualisation of the postmodern debate on pastiche. Even though postmodern critics often emphasise the radical novelty of pastiche, they in fact resuscitate older positions and arguments without necessarily reflecting on their historical conditions. This historical background is then used to analyse the distinction between the primarily French conception of pastiche as the imitation of style and the postmodern notion of it as the compilation of different elements. The latter s vagueness and inclusiveness detracts from its value as a critical concept. The study thus concentrates on the notion of stylistic pastiche, challenging the widespread prejudice that it is merely an indication of lack of talent. Because it is multiply based on repetition, pastiche is in fact a highly ambiguous or double-edged practice that calls into question the distinction between repetition and original, thereby undermining the received notion of individual unique authorship as a fundamental aesthetic value. Pastiche does not, however, constitute a radical upheaval of the basic assumptions on which the present institution of literature relies, since, in order to mark its difference, pastiche always refers to a source outside itself against which its difference is measured. Finally, the theoretical analysis of pastiche is applied to literary works. The pastiches written by Marcel Proust demonstrate how it can become an integral part of a writer s poetics: imitation of style is shown to provide Proust with a way of exploring the role of style as a connecting point between inner vision and reality. The pastiches of the Sherlock Holmes stories by Michael Dibdin, Nicholas Meyer and the duo Adrian Conan Doyle and John Dickson Carr illustrate the functions of pastiche within a genre detective fiction that is itself fundamentally repetitive. A.S. Byatt s Possession and D.M. Thomas s Charlotte use Victorian pastiches to investigate the conditions of literary creation in the age of postmodern suspicion of creativity and individuality. The study thus argues that the concept of pastiche has valuable insights to offer to literary criticism and theory, and that literary pastiches, though often dismissed in reviews and criticism, are a particularly interesting object of study precisely because of their characteristic ambiguity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article considers the merits of alternative policy approaches to management of companies in insolvency administration, in particular from an identity economics theoretical perspective. The use of this perspective provides a novel assessment of the policy alternatives for insolvency administration, which can be characterized as either following the more flexible United States Chapter 11-style debtor-in-possession arrangement, or relying on the appointment of an external administrator or trustee to manage the insolvent company who automatically displaces incumbent management. This analysis indicates that stigma and reputational damage from automatic removal of managers in voluntary administration leaders to "identity loss" and that an insider alternative to the current external administration approach could be a beneficial policy change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Content delivery networks (CDNs) are an essential component of modern website infrastructures: edge servers located closer to users cache content, increasing robustness and capacity while decreasing latency. However, this situation becomes complicated for HTTPS content that is to be delivered using the Transport Layer Security (TLS) protocol: the edge server must be able to carry out TLS handshakes for the cached domain. Most commercial CDNs require that the domain owner give their certificate's private key to the CDN's edge server or abandon caching of HTTPS content entirely. We examine the security and performance of a recently commercialized delegation technique in which the domain owner retains possession of their private key and splits the TLS state machine geographically with the edge server using a private key proxy service. This allows the domain owner to limit the amount of trust given to the edge server while maintaining the benefits of CDN caching. On the performance front, we find that latency is slightly worse compared to the insecure approach, but still significantly better than the domain owner serving the content directly. On the security front, we enumerate the security goals for TLS handshake proxying and identify a subtle difference between the security of RSA key transport and signed-Diffie--Hellman in TLS handshake proxying; we also discuss timing side channel resistance of the key server and the effect of TLS session resumption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

From left to right: Walter Gottschalk, Ida, Charlie Sloan (Karl Hermann Solomon); Ida, Kaete Solomon's maid, nursed Charlie back to health after his release from Dachau

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital Image

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Includes l-r: Hermann Stenz, Adam Remmele, Erwin Sammet, Ludwig Marum, Gustav Heller, Sally Gruenebaum and August Furrer

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Typed caption on verso: Schaufahrt durch Karlsruhe, 16 May 1933 auf der Kaiserstrasse mit dem Blick auf die Fahrbahn: ganz hinten allein: Ludwig Marum dann: Erwin Sammet u. Hermann Stenz verdeckt: Sally Gruenebaum u. August Furrer vorne: Gustav Heller u. Adam Remmele

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Reprinted almost identically in "Fuehrer" on 23 July 1933 with the caption "Sozialistischer Schlafsaal"

Relevância:

10.00% 10.00%

Publicador:

Resumo:

l-r: Thekla Oppenheimer-Benedick, Jenny Oppenheimer-Frank, Fanny Oppenheimer and Adele Oppenheimer-Nathan

Relevância:

10.00% 10.00%

Publicador:

Resumo:

l-r: Sisters Adele Oppenheimer-Nathan, Thekla Oppenheimer-Benedick, Jenny Oppenheimer-Frank and their mother Fanny Oppenheimer