939 resultados para Latin letters, Medieval and modern
Resumo:
Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.
Resumo:
Pyatt, F.B., Pyatt, A.J., Walker, C., Sheen, T., Grattan, J.P, The heavy metal content of skeletons from an ancient metalliferous polluted area in southern Jordan with particular reerence to bioaccumulation and human health, Ecotoxicology & Environmental Safety 60, 13th August 2003, 295-300
Resumo:
Wydział Biologii: Instytut Antropologii
Resumo:
My text is an attempt to apply Charles Taylor’s theory, dealing with the origins of the modern self, to Czech autobiographical literature originating in Romanticism. Taking a cue from Jean Starobinski and Philippe Lejeune’s concepts of modern autobiography, I analyse Karel Hynek Mácha’s personal diary from 1835 and try to find and emphasize its narrative and compositional aspects, which anticipate the poetics of modern poetic diaries.
Resumo:
The early music revival of the late twentieth century revolutionized music with the birth of historically lnformed performance. With this revolution came a stereotype of the "early music singing voice" as small, bright, straight-toned, and unfortunately, often inferior techrucally to the mainstream opera singer. An assessment of the validity of this stereotype was made though readings of treatises and modern manuals of performance practice, and through listening to recordings. Sources on ornamentation, recitative, dance rhythm, and baroque gesture were examined, resulting in the finding that these issues are far more important to historical accuracy than are voice timbre and size. This dissertation is comprised of three historically informed performances intended to satisfy both the early music specialist and the mainstream voice teacher. Program One (May 15, 2004) is a performance of The "Peasant" Cantata, BWV 212, by J.S. Bach, with The Bach Sinfonia at the Washington Conservatory of Music. Program Two (January 29, 2005) is the role of Eurilla in a staged production of Antonio Vivaldi's serenata, Eurilla e Alcindo. The performance is a collaboration with the Baltimore-based ensemble, La Rocinante, and is conducted from the keyboard by Joseph Gascho. Program Three (March 14, 2005) is a solo recital entitled, Fairest Isle: Music of Baroque London. All three programs are documented in a digital audio format available on compact disc, with accompanying programs and notes also available in digital format.
Resumo:
Opera in America: Music of, by, and for the people is a study of the relationship between American popular culture and opera in the United States. Four performance projects demonstrate the on-going exchange between the operatic community-including its composer, singers, and patrons-and the country's popular entertainment industry with its broad audience base. Numerous examples of artistic cross pollination between lowbrow and highbrow music will illustrate the artistic and social consequences created by this artistic amalgamation. Program #1, By George! By Ira! By Gershwin!, is a retrospective of Gershwin's vocal music representing a blending of popular and serious music in both style and form. The concert includes selections from Porgy and Bess, a work considered by many musicologists as the first American opera. Program #2, Shadowboxer, is a premiere performance of an opera by Frank Proto and John Chenault. For this newly commissioned work, I serve as Assistant Director to Leon Major. Shadowboxer provides a clear example of opera utilizing popular culture both musically and dramatically to tell the true story of American hero and legendary boxer, Joe Louis. Program #3, Just a Song at Twilight, is an original theatrical music piece featuring music, letters, diaries, and journals of the Gilded Age, an era when opera was synonymous with popular entertainment. Special attention is focused on tum-of the-century singers who performed in both opera and vaudeville. Program #4 is a presentation of Dominick Argento's Miss Manners on Music and illustrates the strong relationship that can exist between opera and American popular entertainment. Originally conceived as a song cycle, I have staged the work as a one-act opera sung and acted by soprano Carmen Balthrop. This piece is based on the writings of pop icon and newspaper columnist Judith Martin, otherwise known as Miss Manners. All four performances are recorded in audio and video formats.
Resumo:
We provide a select overview of tools supporting traditional Jewish learning. Then we go on to discuss our own HyperJoseph/HyperIsaac project in instructional hypermedia. Its application is to teaching, teacher training, and self-instruction in given Bible passages. The treatment of two narratives has been developed thus far. The tool enables an analysis of the text in several respects: linguistic, narratological, etc. Moreover, the Scriptures' focality throughout the cultural history makes this domain of application particularly challenging, in that there is a requirement for the tool to encompass the accretion of receptions in the cultural repertoire, i.e., several layers of textual traditions—either hermeneutic (i.e., interpretive), or appropriations—related to the given core passage, thus including "secondary" texts (i.e., such that are responding or derivative) from as disparate realms as Roman-age and later homiletics, Medieval and later commentaries or supercommentaries, literary appropriations, references to the arts and modern scholarship, etc. in particular, the Midrash (homiletic expansions) is adept at narrative gap filling, so the narratives mushroom at the interstices where the primary text is silent. The genealogy of the project is rooted in Weiss' index of novelist Agnon's writings, which was eventually upgraded into a hypertextual tool, including Agnon's full-text and ancillary materials. Those early tools being intended primarily for reference and research-support in literary studies, the Agnon hypertext system was initially emulated in the conception of HyperJoseph, which is applied to the Joseph story from Genesis. Then, the transition from a tool for reference to an instructional tool required a thorough reconception in an educational perspective, which led to HyperIsaac, on the sacrifice of Isaac, and to a redesign and upgrade of HyperJoseph as patterned after HyperIsaac.
Resumo:
In The Eye of Power, Foucault delineated the key concerns surrounding hospital architecture in the latter half of the eighteenth century as being the ‘visibility of bodies, individuals and things'. As such, the ‘new form of hospital' that came to be developed ‘was at once the effect and support of a new type of gaze'. This was a gaze that was not simply concerned with ways of minimising overcrowding or cross-contamination. Rather, this was a surveillance intended to produce knowledge about the pathological bodies contained within the hospital walls. This would then allow for their appropriate classification. Foucault went on to describe how these principles came to be applied to the architecture of prisons. This was exemplified for him in the distinct shape of Bentham's panopticon. This circular design, which has subsequently become an often misused synonym for a contemporary culture of surveillance, was premised on a binary of the seen and the not-seen. An individual observer could stand at the central point of the circle and observe the cells (and their occupants) on the perimeter whilst themselves remaining unseen. The panopticon in its purest form was never constructed, yet it conveys the significance of the production of knowledge through observation that became central to institutional design at this time and modern thought more broadly. What is curious though is that whilst the aim of those late eighteenth century buildings was to produce wellventilated spaces suffused with light, this provoked an interest in its opposite. The gothic movement in literature that was developing in parallel conversely took a ‘fantasy world of stone walls, darkness, hideouts and dungeons…' as its landscape (Vidler, 1992: 162). Curiously, despite these modern developments in prison design, the façade took on these characteristics. The gothic imagination came to describe that unseen world that lay behind the outer wall. This is what Evans refers to as an architectural ‘hoax'. The façade was taken to represent the world within the prison walls and it was the façade that came to inform the popular imagination about what occurred behind it. The rational, modern principles ordering the prison became conflated with the meanings projected by and onto the façade. This confusion of meanings have then been repeated and reenforced in the subsequent representations of the prison. This is of paramount importance since it is the cinematic and televisual representation of the prison, as I argue here and elsewhere, that maintain this erroneous set of meanings, this ‘hoax'.
Resumo:
The aim of this article is to analyze the social policy in Latin America in a context of emerging welfare states. To understand the changes one takes into consideration the theories about institutional reform and the transformations produced in the XX century and the beginning of the XXI to substitute a social security regime mainly based on segmentation of benefi ts and on programs to fi ght poverty by another with an institutional and redistributive nature. The paper pays attention in particular to the path of the most developed welfare states of Latin America: Costa Rica, Chile, Argentina, Brasil y Uruguay.
Resumo:
This article fi rst summarizes the structural reforms of pensions (total or partial privatization) in Latin America and Central and Eastern Europe, identifying their advantages and disadvantages, and does the same with the international process of re-reforms of pensions with a greater role of the state. Second, chooses Chile as a case study, as a world pioneer in both types of reforms; describes their characteristics and effects on social welfare of the structural reform of 1981 and the re-reform of 2008. Such effects are evaluated based on ten basic principles of social security from the International Labour Offi ce (ILO): 1) social dialogue to approve the reforms, 2) universal coverage of the population, 3) equal treatment of insured persons, 4) social solidarity, 5) gender equity, 6) suffi ciency of benefi ts, 7) effi ciency and reasonable administrative cost, 8) social participation in the management of the system, 9) role of the state and supervision, and 10) fi nancial sustainability. Third, it summarizes the advantages and disadvantages-challenges of the re-reform and informs on the current debate for further reforms.
Resumo:
Bolivia and Peru adopted the same instruments of social policy —conditional cash transfer programs— to solve the same public problems under different political regimes. By means of the qualitative methodology of discourse analysis, this paper studies the representations of poverty and State made by key actors of those social programs. Underlying more differences than similarities, one demonstrates that the same social policy is linked to opposite social representations of poverty and the State role in every country. The main explanation for this is, far from being imposed by international organizations, those programs are adopted and adapted by each political regime.
Resumo:
We review the uses of fossil insects, particularly Coleoptera (beetles) and Chironomidae (non-biting midges) from ancient deposits to inform the study of wetland ecosystems and their ecological and restoration processes. In particular, we focus on two contrasting ecosystems, drawing upon research undertaken by us on British raised mire peats and shallow lake systems, one an essentially terrestrial ecosystem, the other aquatic, but in which wetland insects play an important and integral part. The study of raised mire peats suggests that faunal stability is a characteristic of these wetland systems, over what appear to be extensive periods of time (up to several millennia), whilst studies of shallow lake ecosystems over recent timescales indicates that faunal instability appears to be more common, usually driven by increasing eutrophication. Drawing upon a series of fossil Coleoptera records spanning several thousand years from Hatfield Moors, south Yorkshire, we reconstruct in some detail the mire’s ontogeny and fluctuations in site hydrology and vegetation cover, illustrating the intimate association between substrate, topography and peat development. A comparison between fossil and modern beetle populations indicates that the faunal characteristics of this mire and its adjacent neighbour, Thorne Moors, become established during the early phases of peat development, including its rare endemics, and that the faunal biodiversity on the sites today is dictated by complex site histories. The over-riding characteristic of these faunas is of stability over several thousand years, which has important implications for the restoration of degraded sites, especially those where refugial areas are limited. In contrast, analyses of fossil Chironomidae from shallow lakes allow researchers to track changes in limnological status and while attempts have been made to reconstruct changes in nutrient levels quantitatively, the chironomids respond indirectly to such changes, typically mediated through complex ecosystem dynamics such as changes in fish and/or macrophyte communities. These changes are illustrated via historic chironomid stratigraphies and diversity indices from a range of shallow lakes located across Britain: Slapton Ley, Frensham Great Pond, Fleet Pond, Kyre Pool and Barnes Loch. These sites have shown varying degrees of eutrophication over recent timescales which tends to be associated with a decline in chironomid diversity. While complex functional processes exist within these ecosystems, our evidence suggests that one of the key drivers in the loss of shallow lake chironomid diversity appears to be the loss of aquatic macrophytes. Overall, while chironomids do show a clear response to altered nutrient regimes, multi-proxy reconstructions are recommended for a clear interpretation of past change. We conclude that if we are to have a better understanding of biota at the ecosystem level we need to know more of the complex interactions between different insect groups as well as with other animal and plant communities. A palaeoecological approach is thus crucial in order to assess the role of insect groups in ecosystem processes, both in the recent past and over long time scales, and is essential for wetland managers and conservation organisations involved in long term management and restoration of wetland systems.