719 resultados para atomicity violation
Resumo:
The increase of crime in Brazilian society has attracted the interest of a growing number of scholars. In psychology, among the aspects studied for the understanding of antisocial and criminal behaviors, there is the personality, object of study of the different fields of this discipline, such as Cognitive Psychology. Thus, in this study, it was used the Young‟s Personality‟s Schemas theory, which considers that schemas are dysfunctional cognitive or emotional patterns that are constituted in the personality (Young et al., 2008). Moreover, for antisocial and criminal conducts, it was considered the Seisdedos‟ design, which says that the first one represents a violation of social rules, that doesn‟t cause serious harm to others, while the second one causes serious injury (Formiga & Gouveia, 2003). The research aimed mainly, to verify the existence of differences in means of responses to the Scale of Antisocial and Criminal Conducts and Young Schema Questionnaire for different crimes (theft, robbery, murder, rape and drug trafficking). For this purpose, the research was applied on a sample of 355 inmates. First, it was analyzed the reliability of the questionnaires, resulting in excellents reliabilities for this sample. There were significant differences between mean responses only for criminal conducts. The schemas that presented significant differences were: Emotional Deprivation, Social Isolation, Entitlement/Grandiosity and Dependence / Incompetence. The type of conduct and schema prevalent for each offense and total sample were also verified. Antisocial conduct prevailed for total sample and all the offences, except for robbery. Moreover, Self-sacrifice was prevalent for total sample and all the offenses.
Resumo:
Ostensibly, BITs are the ideal international treaty. First, until just recently, they almost uniformly came with explicit dispute resolution mechanisms through which countries could face real costs for violation (Montt 2009). Second, the signing, ratification, and violation of them are easily accessible public knowledge. Thus countries presumably would face reputational costs for violating these agreements. Yet, these compliance devices have not dissuaded states from violating these agreements. Even more interestingly, in recent years, both developed and developing countries have moved towards modifying the investor-friendly provisions of these agreements. These deviations from the expectations of the credible commitment argument raise important questions about the field's assumptions regarding the ability of international treaties with commitment devices to effectively constrain state behavior.
Resumo:
Episodic memory formation is shaped by expectation. Events that generate expectations have the capacity to influence memory. Additionally, whether subsequent events meet or violate expectations has consequences for memory. However, clarification is still required to illuminate the circumstances and direction of memory modulation. In the brain, the mechanisms by which expectation modulates memory formation also require consideration. The dopamine system has been implicated in signaling events associated with different states of expectancy; it has also been shown to modulate episodic memory formation in the hippocampus. Thus, the studies included in this dissertation utilized both functional magnetic resonance imaging (fMRI) and behavioral testing to examine when and how the dopaminergic system supports the modulation of memory by expectation. The work aimed to characterize the activation of dopaminergic circuitry in response to cues that generate expectancy, during periods of anticipation, and in response to outcomes that resolve expectancy. The studies also examined how each of these event types influenced episodic memory formation. The present findings demonstrated that novelty and expectancy violation both drive dopaminergic circuitry capable of contributing to memory formation. Consistent with elevated dopaminergic midbrain and hippocampus activation for each, expected versus expectancy violating novelty did not differentially affect memory success. We also showed that high curiosity expectancy states drive memory formation. This was supported by activation in dopaminergic circuitry that was greater for subsequently remembered information only in the high curiosity state. Finally, we showed that cues that generate high expected reward value versus high reward uncertainty differentially modulate memory formation during reward anticipation. This behavioral result was consistent with distinct temporal profiles of dopaminergic action having differential downstream effects on episodic memory formation. Integrating the present studies with previous research suggests that dopaminergic circuitry signals events that are unpredicted, whether cuing or resolving expectations. It also suggests that contextual differences change the contribution of the dopaminergic system during anticipation, depending on the nature of the expectation. And finally, this work is consistent with a model in which dopamine elevation in response to expectancy events positively modulates episodic memory formation.
Resumo:
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.
Resumo:
When a court imposes a fine or forfeiture for a violation of state law, or city or county ordinance, except an ordinance regulating the parking of motor vehicles, the court or the clerk of the district court shall assess an additional penalty in the form of a criminal penalty surcharge equal to thirty-five percent of the fine or forfeiture imposed.
Resumo:
The recent report by Dame Elish Angiolini report (2/6/15) into rape investigation in The Metropolitan Police highlights the issues in modern day rape investigation and makes a list of recommendations(See Table 1) .The report states that ”Rape is one of the most serious but misunderstood crimes and presents investigators and prosecutors with unique challenges. In its variety and complexity rape often presents difficulties far in excess of those encountered in investigating other crimes, including homicide”. This reflects the authors experience as a detective managing detective units and investigating rape in London. The Home Office Research Study in 2005 saw rape as, ‘a unique crime, representing both a physical and psychological violation’. In 2010 Baroness Stern went further, observing, ‘It is unique in the way it strikes at the bodily integrity and self-respect of the complainant, in the demands it makes on those public authorities required to respond to it and in the controversy it generates’. This article will look at these recommendations and place them in the context of 40 years of changing policy towards rape investigation, legal changes and the change in the social milieu.
Resumo:
In the context of a renormalizable supersymmetric SO(10) Grand Unified Theory, we consider the fermion mass matrices generated by the Yukawa couplings to a 10 circle plus 120 circle plus (126) over bar representation of scalars. We perform a complete investigation of the possibilities of imposing flavour symmetries in this scenario; the purpose is to reduce the number of Yukawa coupling constants in order to identify potentially predictive models. We have found that there are only 14 inequivalent cases of Yukawa coupling matrices, out of which 13 cases are generated by 74 symmetries, with suitable n, and one case is generated by a Z(2) x Z(2) symmetry. A numerical analysis of the 14 cases reveals that only two of them-dubbed A and B in the present paper allow good fits to the experimentally known fermion masses and mixings. (C) 2016 The Authors. Published by Elsevier B.V.
Resumo:
Introdução: O alongamento coronário é um procedimento que pode envolver, ou não, técnicas cirúrgicas, e que tem como principal objetivo aumentar o tamanho da coroa clínica, assim como devolver a estética, a forma e a função às arcadas dentárias. Este procedimento realiza-se, ou por motivos estéticos ou motivos restauradores. Ultimamente, os motivos estéticos têm vindo a ganhar importância e são eles que, muitas da vezes, levam os pacientes às consultas de medicina dentária. O sorriso gengival é um desses motivos, e pode ser causado, entre outras razões por, uma erupção passiva alterada ou/e um excesso vertical maxilar. Estas são as etiologias que serão descritas neste trabalho. O aumento coronário realiza-se, também, quando há a necessidade de reabilitar um dente, quer seja com resinas compostas ou com coroas. Este, deve sempre respeitar os limites biológicos do periodonto, nomeadamente o espaço biológico. A invasão deste espaço pode por em risco a manutenção da saúde do periodonto e a viabilidade do tratamento a longo prazo, por isto, preconiza-se que deve ser deixado um espaço de 3mm, desde a crista óssea até a margem restauradora. As técnicas de alongamento coronário enumeradas e definidas ao longo desta tese são: a gengivectomia, o retalho apicalmente posicionado e a erupção dentária forçada. Cada uma delas possui as suas indicações e contra-inidcaçoes. A gengivectomia é realizada quando não há necessidade de recontorno ósseo, pelo contrário, quando essa necessidade existe opta-se pelo retalho apicalmente posicionado. A erupção forçada é uma alternativa ao alongamento cirúrgico e aplica-se, normalmente a dentes não restauráveis mas com estrutura dentária sã abaixo do da crista óssea. Um ótimo diagnóstico é o essencial para a escolha da técnica de aumento coronário que melhor se adequa a cada caso. Objetivo: O objetivo desta revisão bibliográfica tem por base a pesquisa das técnicas de alongamento coronário, começando por perceber a anatomia do periodonto, as alterações que nele acontecem antes e depois dos procedimentos de alongamento coronário, a descrição e a comparação dos mesmos. Materiais e métodos: Para a realização desta revisão foram utilizados os principais motores de busca de dados científicos como a PubMed, B-on, Medline, Scielo, Google Académico e ainda o repositório on-line da Universidade Fernando Pessoa. Foram utilizadas as seguintes palavras chaves: “altered passive eruption”, “gingivectomy”, “gingivoplasty”, “apically repositioned flap”, “surgical crown lengthening”, “biologic width”, “mucogengival junction”, “forced eruption”, “prostethic dentistry”, “gummy smile”, resultando num pesquisa de 45 artigos e duas obras literarátias de interesse. Conclusões: Foi possível concluir que existem varias técnicas de alongamento coronário, cada uma adequada a cada caso e verificou-se que existem vários motivos pelo qual se realiza essa técnica.
Resumo:
ABSTRACT Title of Dissertation: A BETTER PLACE TO BE: REPUBLICANISM AS AN ALTENATIVE TO THE AUTHORITARIANISM-DEMOCRACY DICHOTOMY Christopher Ronald Binetti, Doctor of Philosophy, and 2016 Dissertation directed by: Dr. Charled Frederick Alford, Department of Government and Politics In this dissertation, I argue that in modern or ancient regimes, the simple dichotomy between democracies and autocracies/dictatorships is both factually wrong and problematic for policy purposes. It is factually wrong because regimes between the two opposite regime types exist and it is problematic because the either/or dichotomy leads to extreme thinking in terms of nation-building in places like Afghanistan. In planning for Afghanistan, the argument is that either we can quickly nation-build it into a liberal democracy or else we must leave it in the hands of a despotic dictator. This is a false choice created by both a faulty categorization of regime types and most importantly, a failure to understand history. History shows us that the republic is a regime type that defies the authoritarian-democracy dichotomy. A republic by my definition is a non-dominating regime, characterized by a (relative) lack of domination by any one interest group or actor, mostly non-violent competition for power among various interest groups/factions, the ability of factions/interest groups/individual actors to continue to legitimately play the political game even after electoral or issue-area defeat and some measure of effectiveness. Thus, a republic is a system of government that has institutions, laws, norms, attitudes, and beliefs that minimize the violation of the rule of law and monopolization of power by one individual or group as much as possible. These norms, laws, attitudes, and beliefs ae essential to the republican system in that they make those institutions that check and balance power work. My four cases are Assyria, Persia, Venice and Florence. Assyria and Persia are ancient regimes, the first was a republic and then became the frightening opposite of a republic, while the latter was a good republic for a long time, but had effectiveness issues towards the end. Venice is a classical example of a medieval or early modern republic, which was very inspirational to Madison and others in building republican America. Florence is the example of a medieval republic that fell to despotism, as immortalized by Machiavelli’s writings. In all of these examples, I test certain alternative hypotheses as well as my own.
Resumo:
We propose a very long baseline atom interferometer test of Einstein's equivalence principle (EEP) with ytterbium and rubidium extending over 10m of free fall. In view of existing parametrizations of EEP violations, this choice of test masses significantly broadens the scope of atom interferometric EEP tests with respect to other performed or proposed tests by comparing two elements with high atomic numbfers. In the first step, our experimental scheme will allow us to reach an accuracy in the Eotvos ratio of 7 . 10(-13). This achievement will constrain violation scenarios beyond our present knowledge and will represent an important milestone for exploring a variety of schemes for further improvements of the tests as outlined in the paper. We will discuss the technical realisation in the new infrastructure of the Hanover Institute of Technology (HITec) and give a short overview of the requirements needed to reach this accuracy. The experiment will demonstrate a variety of techniques, which will be employed in future tests of EEP, high-accuracy gravimetry and gravity gradiometry. It includes operation of a force-sensitive atom interferometer with an alkaline earth-like element in free fall, beam splitting over macroscopic distances and novel source concepts.
Resumo:
This research looks into forms of state crime taking place around the U.S.-Mexico border. On the Mexican side of the border violent corruption and criminal activities stemming from state actors complicity with drug trafficking organisations has produced widespread violence and human casualty while forcing many to cross the border legally or illegally in fear for their lives. Upon their arrival on the U.S. side of the border, these individuals are treated as criminal suspects. They are held in immigration detention facilities, interrogated and categorised as inadmissible ‘economic migrants’ or ‘drug offenders’ only to be denied asylum status and deported to dangerous and violent zones in Mexico. These individuals have been persecuted and victimised by the state during the 2007-2012 counter narcotic operations on one side of the border while criminalised and punished by a categorizing anti-immigration regime on the other side of the border. This thesis examines this border crisis as injurious actions against border residents have been executed by the states under legal and illegal formats in violation of criminal law and human rights conventions. The ethnographic research uses data to develop a nuanced understanding of individuals’ experiences of state victimisation on both sides of the border. In contributing to state crime scholarship it presents a multidimensional theoretical lens by using organised crime theoretical models and critical criminology concepts to explain the role of the state in producing multiple insecurities that exclude citizens and non-citizens through criminalisation processes.
Resumo:
Human operators are unique in their decision making capability, judgment and nondeterminism. Their sense of judgment, unpredictable decision procedures, susceptibility to environmental elements can cause them to erroneously execute a given task description to operate a computer system. Usually, a computer system is protected against some erroneous human behaviors by having necessary safeguard mechanisms in place. But some erroneous human operator behaviors can lead to severe or even fatal consequences especially in safety critical systems. A generalized methodology that can allow modeling and analyzing the interactions between computer systems and human operators where the operators are allowed to deviate from their prescribed behaviors will provide a formal understanding of the robustness of a computer system against possible aberrant behaviors by its human operators. We provide several methodology for assisting in modeling and analyzing human behaviors exhibited while operating computer systems. Every human operator is usually given a specific recommended set of guidelines for operating a system. We first present process algebraic methodology for modeling and verifying recommended human task execution behavior. We present how one can perform runtime monitoring of a computer system being operated by a human operator for checking violation of temporal safety properties. We consider the concept of a protection envelope giving a wider class of behaviors than those strictly prescribed by a human task that can be tolerated by a system. We then provide a framework for determining whether a computer system can maintain its guarantees if the human operators operate within their protection envelopes. This framework also helps to determine the robustness of the computer system under weakening of the protection envelopes. In this regard, we present a tool called Tutela that assists in implementing the framework. We then examine the ability of a system to remain safe under broad classes of variations of the prescribed human task. We develop a framework for addressing two issues. The first issue is: given a human task specification and a protection envelope, will the protection envelope properties still hold under standard erroneous executions of that task by the human operators? In other words how robust is the protection envelope? The second issue is: in the absence of a protection envelope, can we approximate a protection envelope encompassing those standard erroneous human behaviors that can be safely endured by the system? We present an extension of Tutela that implements this framework. The two frameworks mentioned above use Concurrent Game Structures (CGS) as models for both computer systems and their human operators. However, there are some shortcomings of this formalism for our uses. We add incomplete information concepts in CGSs to achieve better modularity for the players. We introduce nondeterminism in both the transition system and strategies of players and in the modeling of human operators and computer systems. Nondeterministic action strategies for players in \emph{i}ncomplete information \emph{N}ondeterministic CGS (iNCGS) is a more precise formalism for modeling human behaviors exhibited while operating a computer system. We show how we can reason about a human behavior satisfying a guarantee by providing a semantics of Alternating Time Temporal Logic based on iNCGS player strategies. In a nutshell this dissertation provides formal methodology for modeling and analyzing system robustness against both expected and erroneous human operator behaviors.
Resumo:
In this article we go back to basics – to the very idea of the gendered organisation. Probably all researchers on gender and diversity in the workplace have some notion, however implicit, of the gendered organisation. This applies in both empirical research and more general theoretical analysis of organisations and management. Our task here is to assist in making explicit what those assumptions may be and help us to take a critical look at how we understand and conceptualise ‘the gendered organisation’, and the assumptions that we bring with us in our own and others’ work. We organise our discussion in two main parts. First, we examine the concept of the gendered organisation, by setting out a very short history, including some of the basic assumptions about the gendered organisation and some continuing questions in studying the gendered organisation. The second main part develops a positive critique of the concept of the gendered organisation. This positive critique involves the re-evaluation of several key elements: the concept of ‘organisation’ itself; the concept of ‘gender’; the relation of gender and sexuality; the relations of gender, sexuality, violence and violation; the intersection of gender and other social divisions; as well as some more general methodological critiques. This critical engagement is a necessary part of empirical and conceptual development on gender and diversity in workplaces and organisations more generally.
Resumo:
This study investigates the renegotiation of security alliances, specifically the structural conditions surrounding their revision. Although the field of international relations offers a rich discussion of the formation and violation of alliance treaties, few scholars have addressed the reasons why alliance members amend security obligations. After the formation of an alliance, a member may become dissatisfied owing to changes in the external and domestic security environments. A failure to address this discontent increases the risk of alliance breakdown. Members manage their alliance relationship through a negotiation process or intra-alliance bargaining in the search for a new arrangement that can endure. Factors that help to show commitment to the alliance and communicate a set of feasible solutions are crucial if members are to find a mutually acceptable arrangement. By taking these factors into account, allies are more likely to revise an existing treaty. Examining a set of bilateral alliances dating from 1945 to 2001, this research demonstrates that public requests for renegotiation compel allies to change the status quo. It is found that alliance-related fixed assets and the formation of external alliances increase the likelihood of treaty revision, though institutionalization of an alliance does not help to resolve interest divergence. In addition, this study examines the strategy of delay in intra-alliance bargaining. Allies may postpone a dispute by ignoring it while working to maintain the alliance. Tension among allies thus increases, but the alliance endures. I examine three alliances in order to illustrate this renegotiation process. Among these, the Anglo-Japanese alliance demonstrates two successful renegotiations that prolonged a wavering alliance relationship; the Sino-Soviet alliance is an example of failure owing to the lack of substantive cooperation; and the US-Taiwan alliance during the 1970s demonstrates successful use of a strategy of delay that appeases a dissatisfied member.