959 resultados para Literary puzzles


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper will focus on the issue of training future literary reading mediators or promoters. It will propose a practical exercise on playing with intertextuality with the aid of two children literature classics and masterpieces—The Adventures of Alice in Wonderland by Lewis Carroll (1865) and The Very Hungry Caterpillar by Eric Carle (1969). This exercise is not designed to be a pedagogical or didactic tool used with children (that could alternatively be done with the same corpora), but it is designed to focus on issues of literary studies and contemporary culture. The aim of this practical exercise with future reading promoters is to enable graduate students or trainees to be able to recognize that literary reading can be a team game. However, before arriving at the agan stage, where the rules get simplified and attainable by young readers, hard and solitary work of the mediator is required. The rules of this solitary game of preparing the reading of classical texts are not always evident. On the other hand, the reason why literary reading could be (and perhaps should be) defined as a new team game in our contemporary and globalized world derives directly from the fact that we now live in a world where mass culture is definitely installed. We should be pragmatic on evaluating the conditions of communication between people (not only young adults or children) and we should look the way people read the signs on everyday life and consequently behave in contemporary society, and then apply the same rules or procedures to introduce old players such as the classical books in the game. We are talking about adult mediators and native digital readers. In the contemporary democratic social context, cultural producers and consumers are two very important elements (as the book itself) of the literary polissystem. So, teaching literature is more than ever to be aware that the literary reader meaning of a text does not reside only in the text and in its solitary relationship with the quiet and comfortably installed reader. Meaning is produced by the reader in relation both to the text in question and to the complex network of texts invoked in the reading process and plural connections provided by the world of a new media environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present the first detailed application of Meadows’s cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two denial of service attacks against the protocol that are possible when an attacker is willing to reveal the source IP address. The first attack was identified through direct application of a cost-based modelling framework, while the second was only identified after considering coordinated attackers. Finally, we demonstrate how the inclusion of client puzzles in the protocol can improve denial of service resistance against both identified attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This is the first volume to capture the essence of the burgeoning field of cultural studies in a concise and accessible manner. Other books have explored the British and North American traditions, but this is the first guide to the ideas, purposes and controversies that have shaped the subject. The author sheds new light on neglected pioneers and a clear route map through the terrain. He provides lively critical narratives on a dazzling array of key figures including, Arnold, Barrell, Bennett, Carey, Fiske, Foucault, Grossberg, Hall, Hawkes, hooks, Hoggart, Leadbeater, Lissistzky, Malevich, Marx, McLuhan, McRobbie, D Miller, T Miller, Morris, Quiller-Couch, Ross, Shaw, Urry, Williams, Wilson, Wolfe and Woolf. Hartley also examines a host of central themes in the subject including literary and political writing, publishing, civic humanism, political economy and Marxism, sociology, feminism, anthropology and the pedagogy of cultural studies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This is a review of a poetry book by Jaya Savige (Latecomers, University of Qld Press, 2005), which explores contemporary poetics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This creative writing work was selected for publication in a bi-lingual anthology, published in China, as suitable to be culturally applicable to both Chinese and Australian social contexts. The poem raises six social/ethical issues and comments on them. It is based on research into Chinese traditional poetry that focuses on an image, and after each image this poem provides an ethical comment. It is based in the ethical hypothesis that moral evaluation of individual and social behaviour can not be achieved without ethical judgement which questions social norms. In particular, the poem questions the validity of fundamentalism – the belief in religious, scientific and moral absolutes. This is a key issue in contemporary research into the effect of religion on politics. It also draws on contemporary psychological theory, especially the concept of narcissism. The sociological basis of the work is in drawing parallels between eastern and western ethical issues, stressing similarity by inference. The imagery on which the poem is based selects objects such a single ‘stone’ that take on symbolic connotations common to both Australian and Chinese readers. This is innovative, since very little creative writing has been dome to address commonalities between Australian and Chinese ethical thinking, especially by adopting Chinese motifs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this study, Lampert examines how cultural identities are constructed within fictional texts for young people written about the attacks on the Twin Towers. It identifi es three significant identity categories encoded in 9/11 books for children:ethnic identities, national identities, and heroic identities,arguing that the identities formed within the selected children’s texts are in flux, privileging performances of identities that are contingent on post-9/11 politics. Looking at texts including picture books, young adult fiction, and a selection of DC Comics, Lampert finds in post-9/11 children’s literature a co-mingling of xenophobia and tolerance; a binaried competition between good and evil and global harmony and national insularity; and a lauding of both the commonplace hero and the super-human. The shifting identities evident in texts that are being produced for children about 9/11 offer implicit and explicit accounts of what constitutes good citizenship, loyalty to nation and community, and desirable attributes in a Western post-9/11 context. This book makes an original contribution to the field of children’s literature by providing a focused and sustained analysis of how texts for children about 9/11 contribute to formations of identity in these complex times of cultural unease and global unrest.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Gender Dilemmas in Children's Fiction examines how fictional texts – picture books, novels, and films – produced for children and young adults are responding to the tensions and dilemmas that arise from new gender relations and sexual differences. The book discusses a diverse range of international children's fiction published between 1990 and 2008. Some of the key dilemmas that emerge are around the texts' treatment of romance, beauty, cyberbodies, queer, and comedy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reads a range of nineteenth-century texts for children that retell either Shakespeare's The Tempest or mermaid narratives, considering the models of feminine subjectivity and sexuality that they construct. It then moves on to two key contemporary texts — Disney's film adaptation of The Little Mermaid (Clements and Musker 1989) and Penni Russon's Undine (2004) — that combine the Shakespearean heroine with the mermaid, and reads them against the nineteenth-century models. Ultimately, the essay determines that, while these texts seem to perform a progressive appropriation of the two traditions, they actually combine the most conservative aspects of both The Tempest and mermaid stories to produce authoritative (and dangerously persuasive) ideals of passive feminine sexuality that confine girls within patriarchally-dictated familial positions. The new figure for adolescent female subjectivity, the mermaid-Miranda, becomes in turn a model of identification and aspiration for the implied juvenile consumer.