3,518 Hits in 3.6 sec

Speculative computation in multilisp

Randy B. Osborne
1990 Proceedings of the 1990 ACM conference on LISP and functional programming - LFP '90  
Furthermore, the priorities lack transitivity, leading to priority subversion.  ...  Thus Burton's work suffers from the priority subversion described in Section 2.1.  ...  We can extend this denotation of "first" to n expressions E, by using an "arb" tree.  ... 
doi:10.1145/91556.91644 dblp:conf/lfp/Osborne90 fatcat:6mu4zcbzrvgq3ghnuftl7mjcjq

Multilevel Secure Transaction Processing: Status and Prospects [chapter]

Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine McCollum, Ravi Mukkamala
1997 IFIP Advances in Information and Communication Technology  
Transaction processing in these systems requires modi cation of conventional scheduling algorithms and commit protocols.  ...  This could happen as a result of the system being broken into by outsiders, the subversion of another system with which it cooperates, or simply misbehavior on the part of its own legitimate users.  ...  A method of avoiding this problem is to determine the order using timestamps generated when the transaction commits for the rst time.  ... 
doi:10.1007/978-0-387-35167-4_6 fatcat:nyo7e66qifgwfcikmmdvnbofhe

Caste Confusion and Census Enumeration in Colonial India, 1871–1921

Kevin Walby, Michael Haan
2012 Histoire sociale / Social History  
The introduction of these measures in the census schedule and in enumeration furnished caste with a biological and racial connotation.  ...  Local subversions continued into the 1930s, despite continual refinement of the census schedule.  ...  There certainly was no "uniform 'colonial' consensus on caste." 5 Accounting for the role of administrators, but also for local subversions, leads us to argue that the massive census projects in India  ... 
doi:10.1353/his.2012.0026 fatcat:wwnwvvlponcozbpomwywgp4kxy

Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems

Antonio Lima, Francisco Rocha, Marcus Völp, Paulo Esteves-Veríssimo
2016 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy - CPS-SPC '16  
a holistic analysis, under the perspective of fully-fledged ecosystems of autonomous and cooperative vehicles.  ...  We survey paradigms and mechanisms that may be used to overcome or at least mitigate the potential risks that may arise through the several threat vectors analyzed.  ...  Therefore, a possible approach in this area, is to counteract subversion ex-post, by using redundancy and diversity techniques.  ... 
doi:10.1145/2994487.2994489 dblp:conf/ccs/LimaRVV16 fatcat:kcpquhekv5a55dfscuusxh433y

Simulation data sharing to foster teamwork collaboration

Claudio Gargiulo, Delfina Malandrino, Donato Pirozzi, Vittorio Scarano
2015 Scalable Computing : Practice and Experience  
., fostering and stimulating sharing, re-use and aggregation of models, simulation results and engineers annotations.  ...  Therefore, the requirement to avoid data lock-in leads to a cost-saving feature. Simulation Data Centralisation, Version Control and Data Indexing.  ...  In addition the aim is to avoid Vendor Lock-In adopting open format data. Many other platforms proposed to manage simulations on HPC resources but they do not focus on collaboration among engineers.  ... 
doi:10.12694/scpe.v15i4.1053 fatcat:tvep62mmrzdmdgfc3moqwvrzti

E-Breaker: Flexible, distributed environment for collaborative authoring

Nelson Baloian, Francisco Claude, Roberto Konow, Sebastian Kreft
2009 2009 13th International Conference on Computer Supported Cooperative Work in Design  
It allows fine-grained locking of documents' content.  ...  This may be used to assign responsibilities to certain members of the team which they will not able to avoid by granting rights to another member.  ...  Today, there is a whole family of CVS-like tools: GNU-Arch, Subversion, CSSC, PVCS, etc. These applications are frequently used in the Open Source community and also in large business environments.  ... 
doi:10.1109/cscwd.2009.4968054 dblp:conf/cscwd/BaloianCKK09 fatcat:khgoldnstfgl3c2ova5gghmdpa

Britain's Approach to Balancing Counter-Terrorism Laws with Human Rights

Christian Honeywood
2016 Journal of Strategic Security  
Firstly, if the use of Schedule 7 to apprehend Miranda was appropriate given the provision's intended use as an anti-terrorism apparatus; secondly, if law enforcement personnel carried out Schedule 7 in  ...  " of the officer, the authority to stop based on the definition of terrorism under TA 2000 Section 1. 9(c), the sanctioned use of Schedule 7 at ports of entry, and the time limitation of 9 hours. 33 The  ... 
doi:10.5038/1944-0472.9.3.1546 fatcat:zbfcqyudtzdixejptmuxo3n5mm

Conceptual Model of Partnering and Alliancing

Aaron M. Anvuur, Mohan M. Kumaraswamy
2007 Journal of construction engineering and management  
Demonstrating a close fit with the published literature on partnering provides useful support for the proposed model.  ...  The model can clearly help project managers to focus their attention on the necessary aspects of workgroup processes that lead to high cooperation and performance.  ...  But even this limited measure of cooperation explained about 28% of the variability in the dependent variable 'project success', defined in terms of meeting budget, schedule and quality performance targets  ... 
doi:10.1061/(asce)0733-9364(2007)133:3(225) fatcat:irulrqrdarbufeyvp6727k7si4

A New 'Normal': Political Complicity, Exclusionary Violence and the Delegation of Argentine Jewish Associations during the Argentine Dirty War

P. Katz
2011 International Journal of Transitional Justice  
' locked in a life-and-death struggle with 'good Argentines' for the very survival of 'Western and Christian civilization,' the regime's organized terror created an ambiguous but theoretically restricted  ...  Unwilling to confront the Proceso, DAIA faced a quandary: it was cooperating closely with a regime it knew to be disappearing hundreds of Jews.  ... 
doi:10.1093/ijtj/ijr021 fatcat:c5yntn2xera5jjzw4yhnimxb7q

Virtual Organization Clusters: Self-provisioned clouds on the grid

Michael A. Murphy, Sebastien Goasguen
2010 Future generations computer systems  
Users may access these resources using relatively low-power devices, allowing the bulk of energy and infrastructure costs to be centralized in less expensive locations. lock-in, since the remote provider  ...  Grid sites using the Condor scheduler were modeled using an interval scheduler optimized for High-Throughput Computing (HTC) applications, whereas sites specifying other schedulers were modeled using a  ...  management application, in Python source form • A copy of the SimVOC simulation system, in Python source form • Pre-processed trace data sets for the Enabling Grids for E-sciencE (EGEE) production system, for use  ... 
doi:10.1016/j.future.2010.02.011 fatcat:x6nwjn3c5jhnbfcuzeexdkz22a

Killer Apps: Vanishing Messages, Encrypted Communications, and Challenges to Freedom of Information Laws When Public Officials Go Darkk

Daxton Stewart
2017 Social Science Research Network  
By using these apps, government officials are "going dark" by avoiding detection of their communications in a way that undercuts freedom of information laws.  ...  This article explores the challenges presented by government employee use of encrypted and ephemeral messaging apps by examining three policy approaches: (1) banning use of the apps, (2) enhancing existing  ...  Locke, Struggling with Sunshine: Analyzing the Impact of Technology on Compliance with Open Government Laws Using Florida as a Case Study, 21 FORDHAM INTELL. PROP. MEDIA & ENT. L.  ... 
doi:10.2139/ssrn.2952542 fatcat:vnbzko2oundudhwjg4633bu63i

Comedy's time spell

Nuno Amaral Jerónimo, José Carlos Alexandre
2019 Revista Comunicação e Sociedade  
As a subversive time out, comedy takes the risk of becoming repetitive and of colonising the public sphere, and thus create a permanent condition of interruption, caused by an artificial humour locked  ...  Humour interpretation is regarded as a form of social contract or a form of cooperation within a conversation between the two parts involved.  ... 
doi:10.17231/comsoc.35(2019).3132 fatcat:kmzvkxqnz5cuppb3maauy7p7hi

The Mobile and Mobility: Information, Organisations and Systems [chapter]

John Traxler
2011 Information Systems Development  
The consequences for information systems, for the development of information systems, and for the organisations that use them are still unfolding.  ...  Thus according to this logic, the mobile would be one more technique by which the world became unsurprising" (Cooper 2002, p. 26) .  ...  The obvious example is "text-speak" and its original subversive association with teenagers but another is the evolution of the "missed call" around the world (Donner 2008) .  ... 
doi:10.1007/978-1-4419-9790-6_2 dblp:conf/isdevel/Traxler10 fatcat:fav7vth6erbkblktvnqxppyfui

Using Formal Game Design Methods to Embed Learning Outcomes into Game Mechanics and Avoid Emergent Behaviour

Simon Grey, David Grey, Neil Gordon, Jon Purdy
2017 International Journal of Games Based Learning  
mechanics and avoid emergent behaviour;  ...  11 Playing digital security: youth Voices on their digital rights; 51 We are the game changers: an open gaming literacy Programme; 63 using formal game design methods to embed learning outcomes into game  ...  When students attend scheduled practical programming activities they are required to sign in through an IP-locked web based system, with persistent failure to register attendance resulting in remedial  ... 
doi:10.4018/ijgbl.2017070106 fatcat:y7v6is3leratlmrejnygbwxeva

MPI for Python

Lisandro Dalcín, Rodrigo Paz, Mario Storti
2005 Journal of Parallel and Distributed Computing  
representation from one architecture to another in the case of heterogeneous computing environments; additionally, it allows the representation of non-contiguous data layouts and user-defined datatypes, thus avoiding  ...  Its completion can be managed using the MPI.Request.Test(), MPI.Request.Wait() and MPI.Request.Cancel() methods.  ...  Lock() and MPI.Win.Unlock() methods. Locks are used to protect remote accesses to the locked remote window and to protect local load/store accesses to a locked local window.  ... 
doi:10.1016/j.jpdc.2005.03.010 fatcat:zfvy5lz4rze75bjdowuro6sque
« Previous Showing results 1 — 15 out of 3,518 results