866 resultados para Reproducing kernel
Resumo:
The quantum Jensen-Shannon divergence kernel [1] was recently introduced in the context of unattributed graphs where it was shown to outperform several commonly used alternatives. In this paper, we study the separability properties of this kernel and we propose a way to compute a low-dimensional kernel embedding where the separation of the different classes is enhanced. The idea stems from the observation that the multidimensional scaling embeddings on this kernel show a strong horseshoe shape distribution, a pattern which is known to arise when long range distances are not estimated accurately. Here we propose to use Isomap to embed the graphs using only local distance information onto a new vectorial space with a higher class separability. The experimental evaluation shows the effectiveness of the proposed approach. © 2013 Springer-Verlag.
Resumo:
2000 Mathematics Subject Classification: Primary 47B47, 47B10; Secondary 47A30.
Resumo:
2000 Mathematics Subject Classification: 62G07, 60F10.
Resumo:
Permutation games are totally balanced transferable utility cooperative games arising from certain sequencing and re-assignment optimization problems. It is known that for permutation games the bargaining set and the core coincide, consequently, the kernel is a subset of the core. We prove that for permutation games the kernel is contained in the least core, even if the latter is a lower dimensional subset of the core. By means of a 5-player permutation game we demonstrate that, in sense of the lexicographic center procedure leading to the nucleolus, this inclusion result can not be strengthened. Our 5-player permutation game is also an example (of minimum size) for a game with a non-convex kernel.
Resumo:
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. ^ We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. ^ We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. ^ We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). ^ In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.^
Resumo:
The purpose of this research is to develop an optimal kernel which would be used in a real-time engineering and communications system. Since the application is a real-time system, relevant real-time issues are studied in conjunction with kernel related issues. The emphasis of the research is the development of a kernel which would not only adhere to the criteria of a real-time environment, namely determinism and performance, but also provide the flexibility and portability associated with non-real-time environments. The essence of the research is to study how the features found in non-real-time systems could be applied to the real-time system in order to generate an optimal kernel which would provide flexibility and architecture independence while maintaining the performance needed by most of the engineering applications. Traditionally, development of real-time kernels has been done using assembly language. By utilizing the powerful constructs of the C language, a real-time kernel was developed which addressed the goals of flexibility and portability while still meeting the real-time criteria. The implementation of the kernel is carried out using the powerful 68010/20/30/40 microprocessor based systems.
Resumo:
Peer reviewed
Resumo:
Peer reviewed
Resumo:
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.
Resumo:
Questo lavoro di tesi riguarda lo studio e l’implementazione di un algoritmo di multiple kernel learning (MKL) per la classificazione e la regressione di dati di neuroimaging ed, in particolare, di grafi di connettività funzionale. Gli algoritmi di MKL impiegano una somma pesata di vari kernel (ovvero misure di similarità) e permettono di selezionare le features utili alla discriminazione delle istanze durante l’addestramento del classificatore/regressore stesso. L’aspetto innovativo introdotto in questa tesi è stato lo studio di un nuovo kernel tra grafi di connettività funzionale, con la particolare caratteristica di conservare l’informazione relativa all’importanza di ogni singola region of interest (ROI) ed impiegando la norma lp come metodo per l’aggiornamento dei pesi, al fine di ottenere soluzioni sparsificate. L’algoritmo è stato validato utilizzando mappe di connettività sintetiche ed è stato applicato ad un dataset formato da 32 pazienti affetti da deterioramento cognitivo lieve e malattia dei piccoli vasi, di cui 16 sottoposti a riabilitazione cognitiva tra un’esame di risonanza ma- gnetica funzionale di baseline e uno di follow-up. Le mappe di con- nettività sono state ottenute con il toolbox CONN. Il classificatore è riuscito a discriminare i due gruppi di pazienti in una configurazione leave-one-out annidata con un’accuratezza dell’87.5%. Questo lavoro di tesi è stato svolto durante un periodo di ricerca presso la School of Computer Science and Electronic Engineering dell’University of Essex (Colchester, UK).
Resumo:
When Kate and Laura Mulleavy of Rodarte worked with MAC to create their Autumn/Winter 2010 makeup collection and based their ideas on the murdered women of Ciudad Juarez, there was a public and industry outcry which led to the withdrawal of cosmetics with names such as ‘Factory’ ‘Juarez’ and ‘Ghost Town’. Rodarte tapped into the borderland mythologies of Juarez and crated an illusory fantasy world which sought to simultaneously obliterate and venerate the dead women. One eyeshadow, ‘Bordertown’, appears to look like chunks of rotting flesh streaked with blood. The models for their catwalk show had hollow blackened eyes, green-white pallor and lips that had been bloodlessly ‘lip-erased’ with a product specifically designed for the purpose. In Spanish, maquillar is to make up, to assemble. The women in the factories are asked to repeat simple mechanical operations thousands of times a day to make up the products which will be sold by global corporations. At the same time their images are being assembled, made up and aestheticized to create a cosmetic erasure of the crimes which they are subject to. When two American women and a global company make profit from this dangerous cosmetic erasure in order to sell products, the borders between bodies, countries, art and crime become leaky through the act and the illusion of symbiosis between the women of Ciudad Juarez and the products they inspired is threatened by the haunting of exploitation. Since then, the situation has become more complex. Chris Brown got a neck tattoo, based, he says, on the promotional material produced by MAC for the Rodarte sisters campaign. The image, which is of a skull, bears a striking resemblance to the police photographs of his ex, and now current, girlfriend, superstar Rihanna. The controversy over gendered violence, race and exploitation, begun by Rodarte and MAC, came back, haunting, once again. This paper seeks to address these connections, and ask what happens when domestic violence collides with globalism, fashion and murder.
Resumo:
During the early Stuart period, England’s return to male monarchal rule resulted in the emergence of a political analogy that understood the authority of the monarch to be rooted in the “natural” authority of the father; consequently, the mother’s authoritative role within the family was repressed. As the literature of the period recognized, however, there would be no family unit for the father to lead without the words and bodies of women to make narratives of dynasty and legitimacy possible. Early modern discourse reveals that the reproductive roles of men and women, and the social hierarchies that grow out of them, are as much a matter of human design as of divine or natural law. Moreover, despite the attempts of James I and Charles I to strengthen royal patriarchal authority, the role of the monarch was repeatedly challenged on stage and in print even prior to the British Civil Wars and the 1649 beheading of Charles I. Texts produced at moments of political crisis reveal how women could uphold the legitimacy of familial and political hierarchies, but they also disclose patriarchy’s limits by representing “natural” male authority as depending in part on women’s discursive control over their bodies. Due to the epistemological instability of the female reproductive body, women play a privileged interpretive role in constructing patriarchal identities. The dearth of definitive knowledge about the female body during this period, and the consequent inability to fix or stabilize somatic meaning, led to the proliferation of differing, and frequently contradictory, depictions of women’s bodies. The female body became a site of contested meaning in early modern discourse, with men and women struggling for dominance, and competitors so diverse as to include kings, midwives, scholars of anatomy, and female religious sectarians. Essentially, this competition came down to a question of where to locate somatic meaning: In the opaque, uncertain bodies of women? In women’s equally uncertain and unreliable words? In the often contradictory claims of various male-authored medical treatises? In the whispered conversations that took place between women behind the closed doors of birthing rooms? My dissertation traces this representational instability through plays by William Shakespeare, John Ford, Thomas Middleton, and William Rowley, as well as in monstrous birth pamphlets, medical treatises, legal documents, histories, satires, and ballads. In these texts, the stories women tell about and through their bodies challenge and often supersede male epistemological control. These stories, which I term female bodily narratives, allow women to participate in defining patriarchal authority at the levels of both the family and the state. After laying out these controversies and instabilities surrounding early modern women’s bodies in my first chapter, my remaining chapters analyze the impact of women’s words on four distinct but overlapping reproductive issues: virginity, pregnancy, birthing room rituals, and paternity. In chapters 2 and 3, I reveal how women construct the inner, unseen “truths” of their reproductive bodies through speech and performance, and in doing so challenge the traditional forms of male authority that depend on these very constructions for coherence. Chapter 2 analyzes virginity in Thomas Middleton and William Rowley’s play The Changeling (1622) and in texts documenting the 1613 Essex divorce, during which Frances Howard, like Beatrice-Joanna in the play, was required to undergo a virginity test. These texts demonstrate that a woman’s ability to feign virginity could allow her to undermine patriarchal authority within the family and the state, even as they reveal how men relied on women to represent their reproductive bodies in socially stabilizing ways. During the British Civil Wars and Interregnum (1642-1660), Parliamentary writers used Howard as an example of how the unruly words and bodies of women could disrupt and transform state politics by influencing court faction; in doing so, they also revealed how female bodily narratives could help recast political historiography. In chapter 3, I investigate depictions of pregnancy in John Ford’s tragedy, ‘Tis Pity She’s a Whore (1633) and in early modern medical treatises from 1604 to 1651. Although medical texts claim to convey definitive knowledge about the female reproductive body, in actuality male knowledge frequently hinged on the ways women chose to interpret the unstable physical indicators of pregnancy. In Ford’s play, Annabella and Putana take advantage of male ignorance in order to conceal Annabella’s incestuous, illegitimate pregnancy from her father and husband, thus raising fears about women’s ability to misrepresent their bodies. Since medical treatises often frame the conception of healthy, legitimate offspring as a matter of national importance, women’s ability to conceal or even terminate their pregnancies could weaken both the patriarchal family and the patriarchal state that the family helped found. Chapters 4 and 5 broaden the socio-political ramifications of women’s words and bodies by demonstrating how female bodily narratives are required to establish paternity and legitimacy, and thus help shape patriarchal authority at multiple social levels. In chapter 4, I study representations of birthing room gossip in Thomas Middleton’s play, A Chaste Maid in Cheapside (1613), and in three Mistris Parliament pamphlets (1648) that satirize parliamentary power. Across these texts, women’s birthing room “gossip” comments on and critiques such issues as men’s behavior towards their wives and children, the proper use of household funds, the finer points of religious ritual, and even the limits of the authority of the monarch. The collective speech of the female-dominated birthing room thus proves central not only to attributing paternity to particular men, but also to the consequent definition and establishment of the political, socio-economic, and domestic roles of patriarchy. Chapter 5 examines anxieties about paternity in William Shakespeare’s The Winter’s Tale (1611) and in early modern monstrous birth pamphlets from 1600 to 1647, in which children born with congenital deformities are explained as God’s punishment for the sexual, religious, and/or political transgressions of their parents or communities. Both the play and the pamphlets explore the formative/deformative power of women’s words and bodies over their offspring, a power that could obscure a father’s connection to his children. However, although the pamphlets attempt to contain and discipline women’s unruly words and bodies with the force of male authority, the play reveals the dangers of male tyranny and the crucial role of maternal authority in reproducing and authenticating dynastic continuity and royal legitimacy. My emphasis on the socio-political impact of women’s self-representation distinguishes my work from that of scholars such as Mary Fissell and Julie Crawford, who claim that early modern beliefs about the female reproductive body influenced textual depictions of major religious and political events, but give little sustained attention to the role female speech plays in these representations. In contrast, my dissertation reveals that in such texts, patriarchal society relies precisely on the words women speak about their own and other women’s bodies. Ultimately, I argue that female bodily narratives were crucial in shaping early modern culture, and they are equally crucial to our critical understanding of sexual and state politics in the literature of the period.
Resumo:
Efforts to ‘modernize’ the clinical workforce of the English National Health Service have sought to reconfigure the responsibilities of professional groups in pursuit of more effective, joined-up service provision. Such efforts have met resistance from professions eager to protect their jurisdictions, deploying legitimacy claims familiar from the insights of the sociology of professions. Yet to date few studies of professional boundaries have grounded these insights in the specific context of policy challenges to the inter- and intra-professional division of labour, in relation the medical profession and other health-related occupations. In this paper we address this gap by considering the experience of newly instituted general practitioners (family physicians) with a special interest (GPSIs) in genetics, introduced to improve genetics knowledge and practice in primary care. Using qualitative data from four comparative case studies, we discuss how an established intra-professional division of labour within medicine—between clinical geneticists and GPs—was opened, negotiated and reclosed in these sites. We discuss the contrasting attitudes towards the nature of genetics knowledge and its application of GPSIs and geneticists, and how these were used to advance conflicting visions of what the nascent GPSI role should involve. In particular, we show how the claims to knowledge of geneticists and GPSIs interacted with wider policy pressures to produce a rather more conservative redistribution of power and responsibility across the intra-professional boundary than the rhetoric of modernization might suggest.