880 resultados para Secret


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We have long been critics of the creative work of philosophers and culture at the tender touch of his words, written or verbal, are both with the "hammer" that whoever owns the Ethics in writer-reader relationship is the first, called "comprehensive architect of the word" but inveterate dominant ideals of multiple anonymous.With this statement suggests that the second of this connection is nothing but a later, perhaps a "so and so" incognito benefits from its "home on earth", and who succeeds, after a long journey "cognitive "the privilege of reading. This old argument raised from ancient tradition, makes the reader a living subject-receptor but without providing the bulk of responsibility quantitative space offered by the marketing and consumption.Distrust of the concepts that attempt to establish a definition coldly detached from a bandage dressing, and the reader has not been imposed by the consumer society. In the sixteenth century came the paperback version, the books of Erasmus of Rotterdam were bestsellers in their time. The Praise of Folly and the political writings of Marthin Luther read at a time when the religious world was incorruptible, were read more than the Bible. Imitation of Christ by Thomas a Kempis in the 1300's, that is, before you discover Gutenberg printing circulated throughout Europe in the Latin language, and even in the inscrutable rock monasteries under his cassock, in the secret place of the monk carrying the book. Accepting that the reader is a result of the market, is to bring the book to reified object category and inapreciar history book.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

What is the secret behind Nokia’s phenomenal success in mobile phones? More generally, how to succeed in a turbulent high technology market? Historical and comparative studies bring understanding not only about past phenomena, but also insights about current and coming ones. In this paper we compare Ford and General Motors in the 1920s and 1930s with Motorola and Nokia in the 1980s and 1990s. The insight from this comparison is how reinvention of the product, category, relative to the market incumbent’s market conceptualization, is a recipe for success. Nokia’s success in the 1990s was based on following the guidelines pioneered by General Motors in the 1920s: market segmentation, embracing the latest technological advances, and brand management in the pursuit of consumer repurchases. The article tells how Nokia addresses both GM’s legacy and changes in the business environment. At the end of our paper, we disuss the generalizability of our findings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Luke Banas is a young video artist who lives illegally in the disused Domino sugar refinery in Williamsburg, Brooklyn. While his art is an attempt to fully record and share his own life story, developers want to tear down the building where he works; a building that’s a monument to his hip neighborhood’s industrial past. The novel’s narrator, Lila Fairfax, is a journalist writing her first feature article about Luke and the fate of the factory. Observant and astute, she soon realizes that, despite his obsessive self-revelation, Luke is hiding a secret. Lila’s rational, detached approach to life is disrupted as, in the course of her reporting, she falls in love with Luke and as a result, learns far more than she anticipated. Though primarily a love story, The Sugar Factory is also an investigation of art, and art’s interaction with commerce, history, and new technology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure Multi-party Computation (MPC) enables a set of parties to collaboratively compute, using cryptographic protocols, a function over their private data in a way that the participants do not see each other's data, they only see the final output. Typical MPC examples include statistical computations over joint private data, private set intersection, and auctions. While these applications are examples of monolithic MPC, richer MPC applications move between "normal" (i.e., per-party local) and "secure" (i.e., joint, multi-party secure) modes repeatedly, resulting overall in mixed-mode computations. For example, we might use MPC to implement the role of the dealer in a game of mental poker -- the game will be divided into rounds of local decision-making (e.g. bidding) and joint interaction (e.g. dealing). Mixed-mode computations are also used to improve performance over monolithic secure computations. Starting with the Fairplay project, several MPC frameworks have been proposed in the last decade to help programmers write MPC applications in a high-level language, while the toolchain manages the low-level details. However, these frameworks are either not expressive enough to allow writing mixed-mode applications or lack formal specification, and reasoning capabilities, thereby diminishing the parties' trust in such tools, and the programs written using them. Furthermore, none of the frameworks provides a verified toolchain to run the MPC programs, leaving the potential of security holes that can compromise the privacy of parties' data. This dissertation presents language-based techniques to make MPC more practical and trustworthy. First, it presents the design and implementation of a new MPC Domain Specific Language, called Wysteria, for writing rich mixed-mode MPC applications. Wysteria provides several benefits over previous languages, including a conceptual single thread of control, generic support for more than two parties, high-level abstractions for secret shares, and a fully formalized type system and operational semantics. Using Wysteria, we have implemented several MPC applications, including, for the first time, a card dealing application. The dissertation next presents Wys*, an embedding of Wysteria in F*, a full-featured verification oriented programming language. Wys* improves on Wysteria along three lines: (a) It enables programmers to formally verify the correctness and security properties of their programs. As far as we know, Wys* is the first language to provide verification capabilities for MPC programs. (b) It provides a partially verified toolchain to run MPC programs, and finally (c) It enables the MPC programs to use, with no extra effort, standard language constructs from the host language F*, thereby making it more usable and scalable. Finally, the dissertation develops static analyses that help optimize monolithic MPC programs into mixed-mode MPC programs, while providing similar privacy guarantees as the monolithic versions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Regarding this issue, it seems appropriate to quote Gorman who says: And it came to pass that when Kutta, assistant God made the first library, she noted that it was good. So he called together all librarians and divided as a shepherd divides the sheep and goats. The first group spoke to him saying: you will dwell in the clarity and serve the readers and their glory will be great. Then he turned to the second group and spoke to him saying: you will dwell in the darkness. Secret must be hidden effort and work. You do not know the reader nor shall you know them. Go away and sort ... and has been up to these days (1979, p. 435).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The text analyses the intelligence activity against Poland in the period 1944-1989. The paper also contains a case study, i.e. an analysis of the American intelligence service activity held against Poland. While examining the research thesis, the author used the documents and analyses prepared by the Ministry of Internal Affairs. In order to best illustrate the point, the author presented a number of cases of persons who spied for the USA, which was possible thanks to the analysis of the training materials of the Ministry of Internal Affairs directed to the officers of the Security Service and the Citizens’ Militia. The text tackles the following issues: (1) to what extent did the character of the socio-political system influence the number of persons convicted for espionage against Poland in the period under examination?, (2) what was the level of interest of the foreign intelligence services in Poland before the year 1990?, (3) is it possible to indicate the specificity of the U.S. intelligence activity against Poland? 1) The analysis of data indicates that the period 1946-1956 witnessed a great number of convictions for espionage, which is often associated with the peculiar political situation in Poland of that time. Up to 1953, the countries of the Eastern bloc had reproduced the Stalin’s system, which only ceased due to the death of Stalin himself. Since then, the communist systems gradually transformed into the system of nomenklatura. Irrespective of these changes, Poland still witnessed a wave of repressions, which resulted from the threats continuously looming over the communist authorities – combating the anti-communist underground movement, fighting with the Ukrainian Insurgent Army, the Polish government-in-exile, possible revisionism of borders, social discontent related to the socio-political reforms. Hence, a great number of convictions for espionage at that time could be ascribed to purely political sentences. Moreover, equally significant was the fact that the then judicial practice was preoccupied assessing negatively any contacts and relations with foreigners. This excessive number of convictions could ensue from other criminal-law provisions, which applied with respect to the crimes against the State, including espionage. What is also important is the fact that in the Stalin’s period the judiciary personnel acquired their skills and qualifications through intensive courses in law with the predominant spirit of the theory of evidence and law by Andrey Vyshinsky. Additionally, by the decree of 1944 the Penal Code of the Polish Armed Forces was introduced; the code envisaged the increase in the number of offences classified as penalised with death penalty, whereas the high treason was subject to the military jurisdiction (the civilians were prosecuted in military courts till 1955; the espionage, however, still stood under the military jurisdiction). In 1946, there was introduced the Decree on particularly dangerous crimes in the period of the State’s recovery, which was later called a Small Penal Code. 2) The interest that foreign intelligence services expressed in relation to Poland was similar to the one they had in all countries of Eastern and Central Europe. In the case of Poland, it should be noted that foreign intelligence services recruited Polish citizens who had previously stayed abroad and after WWII returned to their home country. The services also gathered information from Poles staying in immigrant camps (e.g. in FRG). The activity of the American intelligence service on the territory of FRG and West Berlin played a key role. The documents of the Ministry of Internal Affairs pointed to the global range of this activity, e.g. through the recruitment of Polish sailors in the ports of the Netherlands, Japan, etc. In line with the development in the 1970s, espionage, which had so far concentrated on the defence and strategic sectors, became focused on science and technology of the People’s Republic of Poland. The acquisition of collaborators in academic circles was much easier, as PRL opened to academic exchange. Due to the system of visas, the process of candidate selection for intelligence services (e.g. the American) began in embassies. In the 1980s, the activity of the foreign intelligence services concentrated on the specific political situation in Poland, i.e. the growing significance of the “Solidarity” social movement. 3) The specificity of the American intelligence activity against Poland was related to the composition of the residency staff, which was the largest in comparison to other Western countries. The wide range of these activities can be proved by the quantitative data of convictions for espionage in the years 1944-1984 (however, one has to bear in mind the factors mentioned earlier in the text, which led to the misinterpretation of these data). Analysing the data and the documents prepared by the Ministry of Internal Affairs, one should treat them with caution, as, frequently, the Polish counter-intelligence service used to classify the ordinary diplomatic practice and any contacts with foreigners as espionage threats. It is clearly visible in the language of the training materials concerned with “secret service methods of the intelligence activity” as well as in the documents on operational activities of the Security Service in relation to foreigners. The level of interest the USA had in Poland was mirrored in the classification of diplomatic posts, according to which Warsaw occupied the second place (the so-called Group “B”) on the three-point scale. The CIA experienced spectacular defeats during their activity in Poland: supporting the Polish underground anti-communist organisation Freedom and Independence and the so-called Munich-Berg episode (both cases took place in the 1950s). The text focuses only on selected issues related to the espionage activities against Poland. Similarly, the analysis of the problem has been based on selected sources, which has limited the research scope - however, it was not the aim of the author to present the espionage activity against Poland in a comprehensive way. In order to assess the real threat posed by the espionage activity, one should analyse the case of persons convicted for espionage in the period 1944-1989, as the available quantitative data, mentioned in the text, cannot constitute an explicit benchmark for the scale of espionage activity. The inaccuracies in the interpretation of data and variables, which can affect the evaluation of this phenomenon, have been pointed out in the text.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tese (doutorado)—Universidade de Brasília, Instituto de Ciências Sociais, Departamento de Antropologia, Programa de Pós-graduação em Antropologia Social, 2015.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The article analyses the 'ordinary' violence of revolutionary politics, particularly acts of gendered and sexual violence that tend to be neglected in the face of the 'extraordinariness' of political terror. Focusing on the extreme left Naxalbari movement of West Bengal, it points to those morally ambiguous 'grey zones' that confound the rigid distinctions between victim and victimizer in insurrectionary politics. Public and private recollections of sexual and gender-based injuries by women activists point to the complex intermeshing of different forms of violence (everyday, political, structural, symbolic) across 'safe' and 'unsafe' spaces, 'public' and 'private' worlds, and communities of trust and those of betrayal. In making sense of these memories and their largely secret or 'untellable' nature, the article places sexual violence on a continuum of multiple and interrelated forces that are both overt and symbolic, and include a society's ways of mourning some forms of violence and silencing others. The idea of a continuum explores the 'greyness' of violence as the very object of anthropological inquiry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação de Mestrado apresentada ao Instituto Superior de Psicologia Aplicada para obtenção de grau de Mestre na especialidade de Psicologia Clínica.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With its powerful search engines and billions of published pages, the Worldwide Web has become the ultimate tool to explore the human experience. But, despite the advent of the digital revolution, e-books, at their core, have remained remarkably similar to their printed siblings. This has resulted in a clear dichotomy between two ways of reading: on one side, the multi-dimensional world of the Web; on the other, the linearity of books and e-books. My investigation of the literature indicates that the focus of attempts to merge these two modes of production, and hence of reading, has been the insertion of interactivity into fiction. As I will show in the Literature Review, a clear thrust of research since the early 1990s, and in my opinion the most significant, has concentrated on presenting the reader with choices that affect the plot. This has resulted in interactive stories in which the structure of the narrative can be altered by the reader of experimental fiction. The interest in this area of research is not surprising, as the interaction of readers with the fabric of the narrative provides a fertile ground for exploring, analysing, and discussing issues of plot consistency and continuity. I found in the literature several papers concerned with the effects of hyperlinking on literature, but none about how hyperlinked material and narrative could be integrated without compromising the narrative flow as designed by the author. It led me to think that the researchers had accepted hypertextuality and the linear organisation of fiction as being antithetical, thereby ignoring the possibility of exploiting the first while preserving the second. All the works I consulted were focussed on exploring the possibilities provided to authors (and readers) by hypertext or how hypertext literature affects literary criticism. This was true in earlier works by Landow and Harpold and remained true in later works by Bolter and Grusin. To quote another example, in his book Hypertext 3.0, Landow states: “Most who have speculated on the relation between hypertextuality and fiction concentrate [...] on the effects it will have on linear narrative”, and “hypertext opens major questions about story and plot by apparently doing away with linear organization” (Landow, 2006, pp. 220, 221). In other words, the authors have added narrative elements to Web pages, effectively placing their stories in a subordinate role. By focussing on “opening up” the plots, the researchers have missed the opportunity to maintain the integrity of their stories and use hyperlinked information to provide interactive access to backstory and factual bases. This would represent a missing link between the traditional way of reading, in which the readers have no influence on the path the author has laid out for them, and interactive narrative, in which the readers choose their way across alternatives, thereby, at least to a certain extent, creating their own path. It would be, to continue the metaphor, as if the readers could follow the main path created by the author while being able to get “sidetracked” into exploring hyperlinked material. In Hypertext 3.0, Landow refers to an “Axial structure [of hypertext] characteristic of electronic books and scholarly books with foot-and endnotes” versus a “Network structure of hypertext” (Landow, 2006, p. 70). My research aims at generalising the axial structure and extending it to fiction without losing the linearity at its core. In creative nonfiction, the introduction of places, scenes, and settings, together with characterisation, brings to life the facts without altering them; while much fiction draws on facts to provide a foundation, or narrative elements, for the work. But how can the reader distinguish between facts and representations? For example, to what extent do dialogues and perceptions present what was actually said and thought? Some authors of creative nonfiction use end-notes to provide comments and citations while minimising disruption the flow of the main text, but they are limited in scope and constrained in space. Each reader should be able to enjoy the narrative as if it were a novel but also to explore the facts at the level of detail s/he needs. For this to be possible, end-notes should provide a Web-like way of exploring in more detail what the author has already researched. My research aims to develop ways of integrating narrative prose and hyperlinked documents into a Hyperbook. Its goal is to create a new writing paradigm in which a story incorporates a gateway to detailed information. While creative nonfiction uses the techniques of fictional writing to provide reportage of actual events and fact-based fiction illuminates the affectual dimensions of what happened (e.g., Kate Grenville’s The Secret River and Hilary Mantel’s Wolf Hall), Hyperbooks go one step further and link narrative prose to the details of the events on which the narrative is based or, more in general, to information the reader might find of interest. My dissertation introduces and utilises Hyperbooks to engage in two parallel types of investigation Build knowledge about Italian WWII POWs held in Australia and present it as part of a novella in Hyperbook format. Develop a new piece of technology capable of extending the writing and reading process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Infants with fetal growth retardation (FGR) are prone to intestinal disorders. Objectives: Aim of the study was to determine the role of mucosal defense ability in formation of gut injury in infants with FGR. Materials and Methods: 44 premature infants who were admitted to the Neonatal Intensive Care Unit were divided into two groups: 20 infants with FGR (FGR group) and 24 appropriate-for-gestational age newborns (AGA group). Control group consisted of 22 premature infants who were delivered after uncomplicated pregnancy. Gut barrier function was evaluated by detecting serum intestinal trefoil factor (ITF) and intestinal fatty acid binding protein (IFABP). The level of serum IFABP and ITF was measured by using ELISA method. Results: FGR group showed significantly higher ITF concentration than AGA group on the first days of life (P ˂ 0.01). High level of ITF in the FGR group significantly declines up to 7th - 10th day of life (P ˂ 0.01). This reduction was accompanied by increase of IFABP which is a marker of ischemic intestinal mucosal injury. Correlation analyses showed that ITF had a negative correlation with IFABP. Conclusions: Infants with fetal growth retardation are characterized by a high level of ITF on the first days of life. This protects intestinal mucosa under hypoxic conditions. Its subsequent decline accompanied by an increase of IFABP reflects the depletion of Goblet cells to secret ITF causing damage to the integrity of intestinal mucosal barrier.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

‘Rubric’ is a term with a variety of meanings. As the use of rubrics has increased both in research and practice, the term has come to represent divergent practices. These range from secret scoring sheets held by teachers to holistic student-developed articulations of quality. Rubrics are evaluated, mandated, embraced and resisted based on often imprecise and inconsistent understandings of the term. This paper provides a synthesis of the diversity of rubrics, and a framework for researchers and practitioners to be clearer about what they mean when they say ‘rubric’. Fourteen design elements or decision points are identified that make one rubric different from another. This framework subsumes previous attempts to categorise rubrics, and should provide more precision to rubric discussions and debate, as well as supporting more replicable research and practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Conspiracy Theory (CT) endorsers believe in an omnipresent, malevolent, and highly coordinated group that wields secret influence for personal gain, and credit this group with the responsibility for many noteworthy events. Two explanations for the emergence of CTs are that they result from social marginalisation and a lack of agency, or that they are due to a need-to-explain-the-unexplained. Furthermore, representativeness heuristics may form reasoning biases that make such beliefs more likely. Two related studies (N = 107; N = 120) examined the relationships between these social marginalisation, intolerance of uncertainty, heuristics and CT belief using a correlational design. Overall, intolerance of uncertainty did not link strongly to CT belief, but worldview variables did - particularly a sense of the world as (socially) threatening, non-random, and with no fixed morality. The use of both representative heuristics that were examined was heightened in those participants more likely to endorse CTs. These factors seem to contribute to the likelihood of whether the individual will endorse CTs generally, relating similarly to common CTs, CTs generally historically accepted as "true", and to the endorsement of fictional CTs that the individual would find novel. Implications are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a novel rank-based method for image watermarking. In the watermark embedding process, the host image is divided into blocks, followed by the 2-D discrete cosine transform (DCT). For each image block, a secret key is employed to randomly select a set of DCT coefficients suitable for watermark embedding. Watermark bits are inserted into an image block by modifying the set of DCT coefficients using a rank-based embedding rule. In the watermark detection process, the corresponding detection matrices are formed from the received image using the secret key. Afterward, the watermark bits are extracted by checking the ranks of the detection matrices. Since the proposed watermarking method only uses two DCT coefficients to hide one watermark bit, it can achieve very high embedding capacity. Moreover, our method is free of host signal interference. This desired feature and the usage of an error buffer in watermark embedding result in high robustness against attacks. Theoretical analysis and experimental results demonstrate the effectiveness of the proposed method.