184 resultados para Hiding


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we continue our investigation into the development of computational-science software based on the identification and formal specification of Abstract Data Types (ADTs) and their implementation in Fortran 90. In particular, we consider the consequences of using pointers when implementing a formally specified ADT in Fortran 90. Our aim is to highlight the resulting conflict between the goal of information hiding, which is central to the ADT methodology, and the space efficiency of the implementation. We show that the issue of storage recovery cannot be avoided by the ADT user, and present a range of implementations of a simple ADT to illustrate various approaches towards satisfactory storage management. Finally, we propose a set of guidelines for implementing ADTs using pointers in Fortran 90. These guidelines offer a way gracefully to provide disposal operations in Fortran 90. Such an approach is desirable since Fortran 90 does not provide automatic garbage collection which is offered by many object-oriented languages including Eiffel, Java, Smalltalk, and Simula.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Muslim Brotherhood is the most significant and enduring Sunni Islamist organization of the contemporary era. Its roots lie in the Middle East but it has grown into both a local and global movement, with its well-placed branches reacting effectively to take the opportunities for power and electoral competition offered by the Arab Spring.

Regarded by some as a force of moderation among Islamists, and by others as a façade hiding a terrorist fundamentalist threat, the potential influence of the Muslim Brotherhood on Middle Eastern politics remains ambiguous.The Muslim Brotherhood: The Arab Spring and its Future Face provides an essential insight into the organisation, with chapters devoted to specific cases where the Brotherhood has important impacts on society, the state and politics. Key themes associated with the Brotherhood, such as democracy, equality, pan-Islamism, radicalism, reform, the Palestine issue and gender, are assessed to reveal an evolutionary trend within the movement since its founding in Egypt in 1928 to its manifestation as the largest Sunni Islamist movement in the Middle East in the 21st century. The book addresses the possible future of the Muslim Brotherhood; whether it can surprise sceptics and effectively accommodate democracy and secular trends, and how its ascension to power through the ballot box might influence Western policy debates on their engagement with this manifestation of political Islam.

Drawing on a wide range of sources, this book presents a comprehensive study of a newly resurgent movement and is a valuable resource for students, scholars and policy makers focused on Middle Eastern Politics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In forensic investigations, it is common for forensic investigators to obtain a photograph of evidence left at the scene of crimes to aid them catch the culprit(s). Although, fingerprints are the most popular evidence that can be used, scene of crime officers claim that more than 30% of the evidence recovered from crime scenes originate from palms. Usually, palmprints evidence left at crime scenes are partial since very rarely full palmprints are obtained. In particular, partial palmprints do not exhibit a structured shape and often do not contain a reference point that can be used for their alignment to achieve efficient matching. This makes conventional matching methods based on alignment and minutiae pairing, as used in fingerprint recognition, to fail in partial palmprint recognition problems. In this paper a new partial-to-full palmprint recognition based on invariant minutiae descriptors is proposed where the partial palmprint’s minutiae are extracted and considered as the distinctive and discriminating features for each palmprint image. This is achieved by assigning to each minutiae a feature descriptor formed using the values of all the orientation histograms of the minutiae at hand. This allows for the descriptors to be rotation invariant and as such do not require any image alignment at the matching stage. The results obtained show that the proposed technique yields a recognition rate of 99.2%. The solution does give a high confidence to the judicial jury in their deliberations and decision.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most cryptographic devices should inevitably have a resistance against the threat of side channel attacks. For this, masking and hiding schemes have been proposed since 1999. The security validation of these countermeasures is an ongoing research topic, as a wider range of new and existing attack techniques are tested against these countermeasures. This paper examines the side channel security of the balanced encoding countermeasure, whose aim is to process the secret key-related data under a constant Hamming weight and/or Hamming distance leakage. Unlike previous works, we assume that the leakage model coefficients conform to a normal distribution, producing a model with closer fidelity to real-world implementations. We perform analysis on the balanced encoded PRINCE block cipher with simulated leakage model and also an implementation on an AVR board. We consider both standard correlation power analysis (CPA) and bit-wise CPA. We confirm the resistance of the countermeasure against standard CPA, however, we find with a bit-wise CPA that we can reveal the key with only a few thousands traces.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Os problemas de visibilidade têm diversas aplicações a situações reais. Entre os mais conhecidos, e exaustivamente estudados, estão os que envolvem os conceitos de vigilância e ocultação em estruturas geométricas (problemas de vigilância e ocultação). Neste trabalho são estudados problemas de visibilidade em estruturas geométricas conhecidas como polígonos, uma vez que estes podem representar, de forma apropriada, muitos dos objectos reais e são de fácil manipulação computacional. O objectivo dos problemas de vigilância é a determinação do número mínimo de posições para a colocação de dispositivos num dado polígono, de modo a que estes dispositivos consigam “ver” a totalidade do polígono. Por outro lado, o objectivo dos problemas de ocultação é a determinação do número máximo de posições num dado polígono, de modo a que quaisquer duas posições não se consigam “ver”. Infelizmente, a maior parte dos problemas de visibilidade em polígonos são NP-difíceis, o que dá origem a duas linhas de investigação: o desenvolvimento de algoritmos que estabelecem soluções aproximadas e a determinação de soluções exactas para classes especiais de polígonos. Atendendo a estas duas linhas de investigação, o trabalho é dividido em duas partes. Na primeira parte são propostos algoritmos aproximados, baseados essencialmente em metaheurísticas e metaheurísticas híbridas, para resolver alguns problemas de visibilidade, tanto em polígonos arbitrários como ortogonais. Os problemas estudados são os seguintes: “Maximum Hidden Vertex Set problem”, “Minimum Vertex Guard Set problem”, “Minimum Vertex Floodlight Set problem” e “Minimum Vertex k-Modem Set problem”. São também desenvolvidos métodos que permitem determinar a razão de aproximação dos algoritmos propostos. Para cada problema são implementados os algoritmos apresentados e é realizado um estudo estatístico para estabelecer qual o algoritmo que obtém as melhores soluções num tempo razoável. Este estudo permite concluir que as metaheurísticas híbridas são, em geral, as melhores estratégias para resolver os problemas de visibilidade estudados. Na segunda parte desta dissertação são abordados os problemas “Minimum Vertex Guard Set”, “Maximum Hidden Set” e “Maximum Hidden Vertex Set”, onde são identificadas e estudadas algumas classes de polígonos para as quais são determinadas soluções exactas e/ou limites combinatórios.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The primary purpose of this study was to develop a questionnaire that assesses both forgiveness-seeking motives and behaviours. This questionnaire was based on the premise that, following the commitment of an offense in the context of a relationship, a perpetrator will be motivated to reduce the damage that has taken place. The . ' questionnaire examined several motives that a perpetrator might have for seeking forgiveness. These motives were divided into five proposed domains of posttransgression concerns: God, Self, Victim, Others/Society, and Relationship. Within these domains, the following more specific types of concern were explored: Avoidance of punishment, concern about public image, emotional well-being, self-image, sense of fairness/justice, loss of relationship, loss or gain of power, and loss of ability to trust. The questionnaire also assessed which behaviours (approach and avoidance) a perpetrator might use in order to address these concerns. In addition, this study explored whether or not the severity of the situation and the personality of the perpetrator influenced post transgression motives and behaviours. Participants were 221 individuals from the community and Brock University. They filled out a questionnaire package that assessed personality traits, social desirability, and forgiveness-seeking motives and behaviours. In order to answer items assessing motives and behaviours, participants were asked to imagine themselves as perpetrators in three hypothetical transgression scenarios. These scenarios ranged in severity fi^om low to high. Participants were asked to rate their motives and behaviours both in an immediate time frame (immediately following the transgression) and in the long-term (in order to move on from the situation). Results indicated that the motivation items could be classified into the following subscales:Concern about God, Damaged Self-worth Concerns, Justice Concerns, Impression Management Concerns, Victim and Others Concerns, and Relationship Concerns. The behaviour items formed the following subscales: Approach, Avoidance, Denial and Hiding, and Groveling. Results also indicated differences in motivations and behaviours based on the severity of the situation as well as the personality (assessed using the HEXACO inventory) of the perpetrator.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The National Seaman’s Association was a labour recruiter hiding behind a union-like name. It was run by H.N. McMaster who collected fees from companies and dues from workers. With McMaster in charge, shipping interests could claim that their seamen had a union, but ship-owners were free to push their vessels and their workers to the breaking point. In 1935, the members on the Great Lakes decided to strike. One year later, they created their own union and amalgamated with a Montreal-based independent body to create the Canadian Seamen’s Union headed by a ship’s cook who became a union leader, John Allan Patrick “Pat” Sullivan. By the late 1940s, almost all sailors on Canadian ships were CSU members. Right from its inception in 1936, Communists were prominent among the leaders of the union. Sullivan had been recruited to the Communist party that year and the union had a close rapport with the party. On June 8, 1940, Pat Sullivan was arrested because of his affiliation with the Communist party. He was incarcerated until March 20, 1942. No charges were laid, no bail was set and there was no trial. After his release, Sullivan was elected second vice-president of the Trades and Labour Congress of Canada. In 1943, Percy Bengough was elected as president and Sullivan was elected as secretary treasurer of the TLC while maintaining his role as president of the CSU. On March 14, 1947 Sullivan made a shocking announcement that he was resigning from the CSU and the Labor-Progressive Party. He claimed that the CSU was under the full control of the Communists. Within a month of this announcement, he emerged as the president of the Canadian Lake Seamen’s Union. Ship-owners never really reconciled themselves to having their industry unionized, and in 1946 there was a seamen’s strike in which the union won the eight-hour day. In 1949, the shipping companies had a plan to get rid of the union and were negotiating behind their back with the Seafarers International Union (SIU). In a brutal confrontation, led by Hal Banks, an American ex-convict, the SIU was able to roust the CSU and take over the bargaining rights of Canadian seamen. On July 15, 1948, Robert Lindsay, who was Sullivan’s Welland business agent said that to the best of his knowledge, Sullivan’s outfit, the CLSU, was under the control of some of the Steamship Companies. Lindsay had heard that there was a movement to get rid of Bengough of the Trades and Labour Congress as well as elements of the CSU. He also had heard that the CLSU wanted to affiliate with the American Federation of Labor. Lindsay’s allegations raised the questions: Were the ship-owners powerful enough to oust Percy Bengough because he supported the seamen? Could the CLSU get an affiliation with the American Federation of Labor? and Would the American Federation of Labor actually affiliate with a union that was siding with employers against a locked-out union?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A collective decision problem is described by a set of agents, a profile of single-peaked preferences over the real line and a number k of public facilities to be located. We consider public facilities that do not su¤er from congestion and are non-excludable. We provide a characterization of the class of rules satisfying Pareto-efficiency, object-population monotonicity and sovereignty. Each rule in the class is a priority rule that selects locations according to a predetermined priority ordering among interest groups. We characterize each of the subclasses of priority rules that respectively satisfy anonymity, hiding-proofness and strategy-proofness. In particular, we prove that a priority rule is strategy-proof if and only if it partitions the set of agents into a fixed hierarchy. Alternatively, any such rule can be viewed as a collection of fixed-populations generalized peak-selection median rules (Moulin, 1980), that are linked across populations, in a way that we describe.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Le phénomène de la création dans le cadre d’un discours sur la création – la production littéraire et artistique – ne va pas de soi. La tâche de le circonscrire comme un objet est antinomique : l’expérience du discours est en soi une création. Alors que le langage écrit semble au plus souvent «supprimer» l’auteur, le processus de création implique un «Je» créateur qui pense, qui se transforme, qui vit et dont la pensée s’imbrique à son objet qui, quant à lui, est «supprimé»; car il n’est pas extérieur à la pensée mais en relation avec elle. Ce travail, qui démontre le rapport complexe entre l’objet, la critique, le sujet et le commentaire, se penche donc sur l’«avant», le «pendant» et l’«après» de la création, dans un acte de mémoire, qui découle d’une performance littéraire sur la création. Des forces motrices informes et inconscientes, à la mise en forme jusqu’à la transmission, qui lui redonne un caractère d’informe, la création est en mouvement, comme le savoir est toujours prisonnier d’un «work in progress». Tributaire d’Antonin Artaud, le texte s’inscrit à partir de l’artiste en guise d’archétype existentiel, et s’y réfère constamment pour témoigner de la création sans la détacher de la vie et de ses expériences. Pour accéder au mystère du processus de création, lié à la pensée subjective, inobjectivable et irréductible au discours linéaire, ce travail met l’accent sur les associations de la pensée qui procède, exprimées par un «Je» exemplaire omniprésent, tatoué par l’expérience, mais à la position ambiguë à titre d’auteur. Processus de vie, de pensée et de création sont non seulement entremêlés, mais traversés par le champ du tout autre, historique, mondial et social, en perpétuelle évolution. Le rôle du créateur n’est pas de ne créer qu’à partir des connaissances extérieures à lui, mais à partir de lui-même – de son moi multiple et de sa pensée imprégnée de lectures et de ce qui le traverse et l’habite dans un temps donné – pour aboutir à la mise en forme d’un texte cohérent, d’une gravure particulière de l’esprit en marche vers le savoir, qui se situe toujours dans le devenir.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Streptococcus suis de type 2 est un microorganisme pathogène d’importance chez le porc. Il est la cause de différentes pathologies ayant comme caractéristique commune la méningite. C’est également un agent émergeant de zoonose : des cas cliniques humains ont récemment été rapportés en Asie. Cependant, la pathogénèse de S. suis n’est pas encore complètement élucidée. Jusqu’à présent, la réponse pro-inflammatoire initiée par S. suis n’a été étudiée qu’in vitro. L’étude du choc septique et de la méningite requiert toujours des modèles expérimentaux appropriés. Au cours de cette étude, nous avons développé un modèle in vivo d’infection chez la souris qui utilise la voie d’inoculation intra-péritonéale. Ce modèle a servi à l’étude de la réponse pro-inflammatoire associée à ce pathogène, tant au niveau systémique qu’au niveau du système nerveux central (SNC). Il nous a également permis de déterminer si la sensibilité aux infections à S. suis pouvait être influencée par des prédispositions génétiques de l’hôte. Le modèle d’infection par S. suis a été mis au point sur des souris de lignée CD1. Les résultats ont démontré une bactériémie élevée pendant les trois jours suivant l’infection. Celle-ci était accompagnée d’une libération rapide et importante de différentes cytokines pro-inflammatoires (TNF-α, IL-6, IL-12p40/p70, IFN-ɣ) et de chémokines (KC, MCP-1 and RANTES), qui ont entraîné un choc septique et la mort de 20 % des animaux. Ensuite, pour confirmer le rôle de l’inflammation sur la mortalité et pour déterminer si les caractéristiques génétiques de l’hôte pouvaient influencer la réponse inflammatoire et l’issue de la maladie, le modèle d’infection a été étendu à deux lignées murines consanguines différentes considérées comme résistante : la lignée C57BL/6 (B6), et sensible : la lignée A/J. Les résultats ont démontré une importante différence de sensibilité entre les souris A/J et les souris B6, avec un taux de mortalité atteignant 100 % à 20 h post-infection (p.i.) pour la première lignée et de seulement 16 % à 36 h p.i. pour la seconde. La quantité de bactéries dans le sang et dans les organes internes était similaire pour les deux lignées. Donc, tout comme dans la lignée CD1, la bactériémie ne semblait pas être liée à la mort des souris. La différence entre les taux de mortalité a été attribuée à un choc septique non contrôlé chez les souris A/J infectées par S. suis. Les souris A/J présentaient des taux exceptionnellement élevés de TNF-α, IL-12p40/p70, IL-1β and IFN- γ, significativement supérieurs à ceux retrouvés dans la lignée B6. Par contre, les niveaux de chémokines étaient similaires entre les lignées, ce qui suggère que leur influence est limitée dans le développement du choc septique dû à S. suis. Les souris B6 avaient une production plus élevée d’IL-10, une cytokine anti-inflammatoire, ce qui suppose que la cascade cytokinaire pro-inflammatoire était mieux contrôlée, entraînant un meilleur taux de survie. Le rôle bénéfique potentiel de l’IL-10 chez les souris infectées par S. suis a été confirmé par deux approches : d’une part en bloquant chez les souris B6 le récepteur cellulaire à l’IL-10 (IL-10R) par un anticorps monoclonal anti-IL-10R de souris et d’autre part en complémentant les souris A/J avec de l’IL-10 de souris recombinante. Les souris B6 ayant reçu le anticorps monoclonal anti-IL-10R avant d’être infectées par S. suis ont développé des signes cliniques aigus similaires à ceux observés chez les souris A/J, avec une mortalité rapide et élevée et des taux de TNF-α plus élevés que les souris infectées non traitées. Chez les souris A/J infectées par S. suis, le traitement avec l’IL-10 de souris recombinante a significativement retardé l’apparition du choc septique. Ces résultats montrent que la survie au choc septique dû à S. suis implique un contrôle très précis des mécanismes pro- et anti-inflammatoires et que la réponse anti-inflammatoire doit être activée simultanément ou très rapidement après le début de la réponse pro-inflammatoire. Grâce à ces expériences, nous avons donc fait un premier pas dans l’identification de gènes associés à la résistance envers S. suis chez l’hôte. Une des réussites les plus importantes du modèle d’infection de la souris décrit dans ce projet est le fait que les souris CD1 ayant survécu à la septicémie présentaient dès 4 jours p.i. des signes cliniques neurologiques clairs et un syndrome vestibulaire relativement similaires à ceux observés lors de méningite à S. suis chez le porc et chez l’homme. L’analyse par hybridation in situ combinée à de l’immunohistochimie des cerveaux des souris CD1 infectées a montré que la réponse inflammatoire du SNC débutait avec une augmentation significative de la transcription du Toll-like receptor (TLR)2 et du CD14 dans les microvaisseaux cérébraux et dans les plexus choroïdes, ce qui suggère que S. suis pourrait se servir de ces structures comme portes d’entrée vers le cerveau. Aussi, le NF-κB (suivi par le système rapporteur de l’activation transcriptionnelle de IκBα), le TNF-α, l’IL-1β et le MCP-1 ont été activés, principalement dans des cellules identifiées comme de la microglie et dans une moindre mesure comme des astrocytes. Cette activation a également été observée dans différentes structures du cerveau, principalement le cortex cérébral, le corps calleux, l’hippocampe, les plexus choroïdes, le thalamus, l’hypothalamus et les méninges. Partout, cette réaction pro-inflammatoire était accompagnée de zones extensives d’inflammation et de nécrose, de démyélinisation sévère et de la présence d’antigènes de S. suis dans la microglie. Nous avons mené ensuite des études in vitro pour mieux comprendre l’interaction entre S. suis et la microglie. Pour cela, nous avons infecté des cellules microgliales de souris avec la souche sauvage virulente (WT) de S. suis, ainsi qu’avec deux mutants isogéniques, un pour la capsule (CPS) et un autre pour la production d’hémolysine (suilysine). Nos résultats ont montré que la capsule était un important mécanisme de résistance à la phagocytose pour S. suis et qu’elle modulait la réponse inflammatoire, en dissimulant les composants pro-inflammatoires de la paroi bactérienne. Par contre, l’absence d’hémolysine, qui est un facteur cytotoxique potentiel, n’a pas eu d’impact majeur sur l’interaction de S. suis avec la microglie. Ces études sur les cellules microgliales ont permis de confirmer les résultats obtenus précédemment in vivo. La souche WT a induit une régulation à la hausse du TLR2 ainsi que la production de plusieurs médiateurs pro-inflammatoires, dont le TNF-α et le MCP-1. S. suis a induit la translocation du NF-kB. Cet effet était plus rapide dans les cellules stimulées par le mutant déficient en CPS, ce qui suggère que les composants de la paroi cellulaire représentent de puissants inducteurs du NF-kB. De plus, la souche S. suis WT a stimulé l’expression de la phosphotyrosine, de la PKC et de différentes cascades liées à l’enzyme mitogen-activated protein kinase (MAPK). Cependant, les cellules microgliales infectées par le mutant déficient en CPS ont montré des profils de phosphorylation plus forts et plus soutenus que celles infectées par le WT. Finalement, la capsule a aussi modulé l’expression de l’oxyde nitrique synthétase inductible (iNOS) induite par S. suis et par la production subséquente d’oxyde nitrique par la microglie. Ceci pourrait être lié in vivo à la neurotoxicité et à la vasodilatation. Nous pensons que ces résultats contribueront à une meilleure compréhension des mécanismes sous-tendant l’induction de l’inflammation par S. suis, ce qui devrait permettre, d’établir éventuellement des stratégies plus efficaces de lutte contre la septicémie et la méningite. Enfin, nous pensons que ce modèle expérimental d’infection chez la souris pourra être utilisé dans l’étude de la pathogénèse d’autres bactéries ayant le SNC pour cible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Les trois paradigmes majeurs à partir desquels s’oriente l’analyse du voile dans Sordidissimes de Pascal Quignard sont les vêtements et la nudité, les « sordes » et le linceul, la toile et le regard. C’est à l’aide de l’analyse thématique et de la psychanalyse que la relation du voile au corps, à la mort et à l’art, est interprétée. Ce que l’on souhaite mettre en évidence est que le voile tient lieu de l’ambivalence. Il se trouve perpétuellement tendu par la volonté du sujet qui l’utilise tour à tour pour recouvrir ou révéler l’objet de ses désirs ou de ses peurs. Le voile incarne ainsi la frontière d’où s’origine la fascination, qu’elle soit morbide ou sexuelle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis Entitled Application of Biofloc technology (BFT) In the Nursery Rearing and Farming of Giant Freshwater Prawn,Macrobrachium Rosenbergii(De Man). Aquaculture, rearing plants and animals under controlled conditions is growing with an annual growth rate of 8.3% in the period 1970-2008 (FAO, 2010). This trend of growth is essential for the supply of protein-rich food for ever increasing world population. But growth and development of aquaculture should be in sustainable manner, preferably without jeopardizing the aquatic environment.In the present study, the application of BFT in the nursery rearing and farming ofgiant freshwater prawn, M. rosenbergii, is attempted. The result of the study is organised into eight chapters. In the first chapter, the subject is adequately introduced. Various types of aquaculture practices followed, development and status of Indian aquaculture, present status of freshwater pravm culture, BF T and its use for the sustainable aquaculture systems, theory of BFT based aquaculture practices, hypothesis, objective and outline of the thesis are described. An extensive review of literature on studies carried out so far on biofloc based aquaculture are given in chapter 2. The third chapter deals with the application of BFT in the primary nursery phase of freshwater prawn. Several workers suggested the need for an intermediate nursery phase in the culture system of freshwater prawn for the successful production. Thirty day experiment was conducted to study the effect of BFT on the water quality, and animal welfare under the various stocking densities. The study concluded that stocking finfishes in biofloc-based monoculture system of freshwater prawns has the potential of increasing total yield. Prawns having a higher commercial value than finfishes besides ensuring economic sustainability. Results showed that prawn yield and survival was better in catla dominated tanks. Based on the results of the study, it is recommended to incorporate 25% rohu and 75% catla in the biofloc-based culture system of giant freshwater prawns. The results of the present study also recommend to stock relatively larger catla for biofloc-based culture system. Fish production was also higher in the 100% catla tank. When catla was added in higher percentages it should ensured that the hiding objects in the culture ponds shall be used in order to reduce the chance of cannibalism among prawns. rohu and catla equally have the ability to harvest the biofloc, catla consumes the planktonic contributes in the floc whereas rohu grazed on the bacterial consortium suspended in the water column. In Chapter 8, recommendations and future research perspectives in the field of biofloc based aquaculture is presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The furious pace of Moore's Law is driving computer architecture into a realm where the the speed of light is the dominant factor in system latencies. The number of clock cycles to span a chip are increasing, while the number of bits that can be accessed within a clock cycle is decreasing. Hence, it is becoming more difficult to hide latency. One alternative solution is to reduce latency by migrating threads and data, but the overhead of existing implementations has previously made migration an unserviceable solution so far. I present an architecture, implementation, and mechanisms that reduces the overhead of migration to the point where migration is a viable supplement to other latency hiding mechanisms, such as multithreading. The architecture is abstract, and presents programmers with a simple, uniform fine-grained multithreaded parallel programming model with implicit memory management. In other words, the spatial nature and implementation details (such as the number of processors) of a parallel machine are entirely hidden from the programmer. Compiler writers are encouraged to devise programming languages for the machine that guide a programmer to express their ideas in terms of objects, since objects exhibit an inherent physical locality of data and code. The machine implementation can then leverage this locality to automatically distribute data and threads across the physical machine by using a set of high performance migration mechanisms. An implementation of this architecture could migrate a null thread in 66 cycles -- over a factor of 1000 improvement over previous work. Performance also scales well; the time required to move a typical thread is only 4 to 5 times that of a null thread. Data migration performance is similar, and scales linearly with data block size. Since the performance of the migration mechanism is on par with that of an L2 cache, the implementation simulated in my work has no data caches and relies instead on multithreading and the migration mechanism to hide and reduce access latencies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sudán afronta una grave crisis humanitaria, en la que actores internacionales han intervenido por una mejora en la situación de la seguridad humana. Sin embargo, esta intención altruista esconde los intereses reales de Estados como Chad, Estados Unidos y China, quienes a través de la Unión Africana y las Naciones Unidas buscaron legitimar sus actuaciones en búsqueda de intereses políticos, económicos o geoestratégicos.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Los secretos familiares son informaciones ocultas. Estas se pueden dar dentro de la misma generación, ocultando la información entre los miembros de la familia o esta se puede ocultar a personas externas a esta. Estos secretos también pueden ser heredados de los antepasados. Además los secretos presentan características tales como la fuente, el tipo, quienes lo comparten y la duración. Esta información oculta genera una dinámica específica en las familias, estableciendo formas de comunicación que favorecen o afectan las relaciones de los individuos. Y todo esto sucede dentro de la intimidad de la familia y de cada uno de sus miembros. La dinámica y el funcionamiento de los secretos familiares se examinan mediante dos obras literarias y dos películas relacionadas con el tema.