838 resultados para Reproducing kernel Hilbert spaces


Relevância:

20.00% 20.00%

Publicador:

Resumo:

On the night of April 20, 2010, a group of students from the University of Puerto Rico (UPR), Río Piedras campus, met to organize an indefinite strike that quickly broadened into a defense of accessible public higher education of excellence as a fundamental right and not a privilege. Although the history of student activism in the UPR can be traced back to the early 1900s, the 2010-2011 strike will be remembered for the student activists’ use of new media technologies as resources that rapidly prompted and aided the numerous protests. This activist research entailed a critical ethnography and a critical discourse analysis (CDA) of traditional and alternative media coverage and treatment during the 2010 -2011 UPR student strike. I examined the use of the 2010-2011 UPR student activists’ resistance performances in constructing local, corporeal, and virtual spaces of resistance and contention during their movement. In particular, I analyzed the different tactics and strategies of resistance or repertoire of collective actions that student activists used (e.g. new media technologies) to frame their collective identities via alternative news media’s (re)presentation of the strike, while juxtaposing the university administration’s counter-resistance performances in counter-framing the student activists’ collective identity via traditional news media representations of the strike. I illustrated how both traditional and alternative media (re)presentations of student activism developed, maintained, and/or modified students activists’ collective identities. As such, the UPR student activism’s success should not be measured by the sum of demands granted, but by the sense of community achieved and the establishment of networks that continue to create resistance and change. These networks add to the debate surrounding Internet activism and its impact on student activism. Ultimately, the results of this study highlight the important role student movements have had in challenging different types of government policies and raising awareness of the importance of an accessible public higher education of excellence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. ^ We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. ^ We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. ^ We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). ^ In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this research is to develop an optimal kernel which would be used in a real-time engineering and communications system. Since the application is a real-time system, relevant real-time issues are studied in conjunction with kernel related issues. The emphasis of the research is the development of a kernel which would not only adhere to the criteria of a real-time environment, namely determinism and performance, but also provide the flexibility and portability associated with non-real-time environments. The essence of the research is to study how the features found in non-real-time systems could be applied to the real-time system in order to generate an optimal kernel which would provide flexibility and architecture independence while maintaining the performance needed by most of the engineering applications. Traditionally, development of real-time kernels has been done using assembly language. By utilizing the powerful constructs of the C language, a real-time kernel was developed which addressed the goals of flexibility and portability while still meeting the real-time criteria. The implementation of the kernel is carried out using the powerful 68010/20/30/40 microprocessor based systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Goddesses in African religions are spirits that affect humans and demand reverence from them. They are also embodiments of ideas that African people have about women, their powers and their roles in society. This study focused on Mame Wata, a goddess in Half Assini, an Nzema-speaking coastal community in western Ghana. It sought to resolve a paradox, that is, the fact that, the goddess is at the center of a Pentecostalist tradition even though traditional Pentecostalism in Ghana views her as an agent of the devil. The study involved fieldwork in this community of the goddess's female worshippers led by Agyimah, a charismatic man, and an agent of the goddess. The study interpreted the goddess as a post-colonial invented symbol personifying both pre-colonial and emerging ideas about female power. Findings from the study also show that through Mame Wata the followers celebrate the spirituality of the female.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

La trattazione che segue fornisce un'introduzione agli operatori lineari. Il primo capitolo contiene dei cenni sugli spazi di Hilbert di dimensione infinita, in modo da poter lavorare con operatori definiti non solo su spazi finito dimensionali, che sono generalmente rappresentati da matrici. Nel secondo capitolo si prosegue con lo studio degli operatori lineari limitati, proponendo come esempio l'operatore di proiezione. Viene definito anche l'importante concetto di operatore aggiunto, generalizzato nel capitolo successivo. Il capitolo finale tratta gli operatori non limitati, che possono essere analizzati con più facilità se soddisfano una proprietà topologica, che è la chiusura. Si affronta anche il concetto di spettro di un operatore, soprattutto nel caso di un operatore autoaggiunto, concludendo con l' esempio di un importante operatore, cioè l'operatore differenziale, fondamentale in meccanica quantistica.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We completely determine the spectra of composition operators induced by linear fractional self-maps of the unit disc acting on weighted Dirichlet spaces; extending earlier results by Higdon [8] and answering the open questions in this context.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer reviewed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Date of Acceptance: 06/03/2015 Acknowledgement: This research was funded by NCR and the Northern Research Partnership

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer reviewed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Date of Acceptance: 06/03/2015 Acknowledgement: This research was funded by NCR and the Northern Research Partnership

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer reviewed