996 resultados para Toman, Justin


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper has two parts. In Part I, it consists of a letter written by the subject of the ‘case study’ that forms the basis of Part II. Part I demonstrates how the writer Aliki Pavlou discovered that, in attempting to help a friend face uncomfortable truths in relation to his perception of his mother, she inadvertently was able to voice her own dilemma in relation to her mother that hitherto had been elusive.
This paper forms a part of a larger project being researched by Aliki Pavlou, Justin Clemens and me. The study, to be entitled, "In the Heart of Hell: Depression and its Expression," is one that contends that Literature expresses the ineffable nature of depression in its symbolic mode; that, indeed, literary texts reveal in their concealment. The work therefore argues that ‘depression’ is expressible.
Part II of this paper analyses the response of a depressive to Jean-Paul Sartre’s novel Nausea (1964). Beginning with a brief discussion of the role of the ‘mother’ as psychologically pivotal in some depressives’ struggle towards well-being, this section analyses a reading of Nausea by a depressive. The objective of this study was to ascertain the extent to which the condition of nausea, as represented in Sartre’s novel, expresses the experience of depression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent research efforts of parallel processing on non-dedicated clusters have focused on high execution performance, parallelism management, transparent access to resources, and making clusters easy to use. However, as a collection of independent computers used by multiple users, clusters are susceptible to failure. This paper shows the development of a coordinated checkpointing facility for the GENESIS cluster operating system. This facility was developed by exploiting existing operating system services. High performance and low overheads are achieved by allowing the processes of a parallel application to continue executing during the creation of checkpoints, while maintaining low demands on cluster resources by using coordinated checkpointing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: This study investigated associations of overweight status and changes in overweight status over time with life satisfaction and future aspirations among a community sample of young women.
Research Methods and Procedures: A total of 7865 young women, initially 18 to 23 years of age, completed two surveys that were 4 years apart. These women provided data on their future life aspirations in the areas of further education, work/career, marital status, and children, as well as their satisfaction with achievements to date in a number of life domains. Women reported their height and weight and their sociodemographic characteristics, including current socioeconomic status (occupation).
Results: Young women's aspirations were cross-sectionally related to BMI category, such that obese women were less likely to aspire to further education, although this relationship seemed explained largely by current occupation. Even after adjusting for current occupation, young women who were obese were more dissatisfied with work/career/study, family relationships, partner relationships, and social activities. Weight status was also longitudinally associated with aspirations and life satisfaction. Women who were overweight or obese at both surveys were more likely than other women to aspire to "other" types of employment (including self-employed and unpaid work in the home) as opposed to full-time employment. They were also less likely to be satisfied with study or partner relationships. Women who resolved their overweight/obesity status were more likely to aspire to being childless than other women.
Discussion: These results suggest that being overweight/obese may have a lasting effect on young women's life satisfaction and their future life aspirations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anycast and multicast are two important Internet services. Combining the two protocols can provide new and practical services. In this paper we propose a new Internet service, Minicast: in the scenario of n replicated or similar servers, deliver a message to at least m members, 1 m n. Such a service has potential applications in information retrieval, parallel computing, cache queries, etc. The service can provide the same Internet service with an optimal cost, reducing bandwidth consumption, network delay, and so on. We design a multi-core tree based architecture for the Minicast service and present the criteria for calculating the subcores among a subset of Minicast members. Simulation shows that the proposed architecture can even the Minicast traffic, and the Minicast application can save the consumptions of network resource.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Information Technology (IT) changes very quickly and influences business, industry and the public in an enormous manner. Outsourcing of IT jobs to cheaper overseas labor and globalization of IT companies become a common practice. Graduates of IT university courses must be well prepared to address the needs and expectations of business, industry and every day life. Many factors in an Information Technology curriculum influence graduates’ professional preparation and image. The most important of them is to reflect technology change, the current state of knowledge of computing, business and industry demands and students’ expectations. The aim of our project was to develop a new Bachelor of IT curriculum that satisfies these requirements. In this report we concentrate our attention on two critical aspects of IT curriculum content, the modern technologies to be used to illustrate basic concepts and principles of computing, and the generic skills that each graduate is expected to acquire to get a job in Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this article, I discuss how things go with the "Nothing" in the work of Alain Badiou, a topic which is evidently central to his thought, and which has received a great deal of attention in the commentary to date. As this problem is inaccessible outside of Badiou’s deployment of mathematics, I will suggest how accounts of Badiou’s work remain flawed insofar as they evade his mathematical demonstrations, and I attempt to clarify how mathematics operates in his system. I then examine the consequences that such a use of mathematics has for Badiou’s doctrine of the nothing. I conclude with a discussion of some of the difficulties that the nothing continues to pose to Badiou, which have not (yet) been satisfactorily resolved. These difficulties devolve from the problematic of the incessantly doubling void.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

MyGrid is an e-Science Grid project that aims to help biologists and bioinformaticians to perform workflow-based in silico experiments, and help them to automate the management of such workflows through personalisation, notification of change and publication of experiments. In this paper, we describe the architecture of myGrid and how it will be used by the scientist. We then show how myGrid can benefit from agents technologies. We have identified three key uses of agent technologies in myGrid: user agents, able to customize and personalise data, agent communication languages offering a generic and portable communication medium, and negotiation allowing multiple distributed entities to reach service level agreements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Torture and the legitimate powers of the state - why are psychoanalysts involved - torture can be seen as an information gathering device - psychoanalysis may play a role in the creation of information gathering coercion techniques.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Exercise dependence (EXD) is a psychological condition associated with physical, emotional, social and performance consequences. Despite growing awareness of the prevalence of EXD within the athletic population, the symptoms or dimensions that comprise the condition largely remain unclear. The aim of the present study was to examine the perceptions of coaches relating to the symptoms or dimensions that define EXD among athletes. Participants were 90 coaches of elite athletes employed by the Australian Institute of Sport and State Institutes of Sport in Australia. Coaches completed an EXD checklist and a separate checklist of characteristics of committed exercisers. Both checklists contained 31 dimensions. The results supported a constellation of cognitive, emotional, behavioral, physical, social and performance dimensions. The results are discussed in terms of the consequences of EXD for elite athletes. Implications for coaches and teammates of elite athletes who experience EXD are also highlighted.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In an environment where commercial software is continually patched to correct security flaws, penetration testing can provide organisations with a realistic assessment of their security posture. Penetration testing uses the same principles as criminal hackers to penetrate corporate networks and thereby verify the presence of software vulnerabilities. Network administrators can use the results of a penetration test to correct flaws and improve overall security. The use of hacking techniques, however, raises several ethical questions that centre on the integrity of the tester to maintain professional distance and uphold the profession. This paper discusses the ethics of penetration testing and presents our conceptual model and revised taxonomy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent research efforts of parallel processing on non-dedicated clusters have focused on high execution performance, parallelism management, transparent access to resources, and making clusters easy to use. However, as a collection of independent computers used by multiple users, clusters are susceptible to failure. This paper shows the development of a coordinated checkpointing facility for the GENESIS cluster operating system. This facility was developed by exploiting existing operating system services. High performance and low overheads are achieved by allowing the processes of a parallel application to continue executing during the creation of checkpoints, while maintaining low demands on cluster resources by using coordinated checkpointing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Reasons for the adoption of smart cards and biometric authentication mechanisms have been discussed in the past, yet many organisations are still resorting to traditional methods of authentication. Passwords possess several encumbrances not the least of which includes the difficulty some users have in remembering them. Often users inadvertently write difficult passwords down near the workstation, which negates any security password authentication, may provide and opens the floodgates to identity theft. In the current mainstream authentication paradigm, system administrators must ensure all users are educated on the need for a password policy, and implement it strictly. This paper discusses a conceptual framework for an alternative authentication paradigm. The framework attempts to reduce complexity for the user as well as increase security at the network and application levels.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The paper responds to the release of both the AusCERT and CSI/FBI computer crime and security surveys with a comparison of the results between the two countries' respondents. Overall both surveys show the trend that most organisations employ security technologies but half of them still experience incidents which compromise their security. These incidents have significant quantifiable losses but despite these organisations are still loathed to report to law enforcement agencies for various reasons. These include the impression that law enforcement agencies are not interested, and the negative publicity such incidents can cause in their aftermath.