Search results for "Cryptography"

showing 10 items of 657 documents

Regulating Minority Languages in Ukraine’s Educational System: Debate, Legal Framework and Implementation

2021

The chapter provides a comprehensive analysis of the development of policies on minority languages in Ukraine’s educational system, and in public debate, from 1991 to the present, combining legal analysis with the analysis of media discourses. Finding high politicization of the language-in-education issue in Ukraine, it maps key trajectories for the future course of Ukraine’s policies as to language in education.

Political scienceLegal analysisPublic debateKey (cryptography)Public administrationEducational systems
researchProduct

The Five-Pillar Model of Parties’ Migration into the Digital

2021

Scholars have examined how political parties cope with web-based technologies for about 20 years. This body of literature on party digitalisation covers many different aspects of parties’ migration into the digital, yet usually, the term digitalisation is used equally for all kinds of web-related changes in party behaviour and routines. This contribution distinguishes five key dimensions (pillars) of parties’ migration into the digital, which resonate with classic approaches of party research. These pillars cover (A) membership, (B) leaders and candidates, (C) policy program, (D) public image, and (E) resources. Each pillar consists of three bricks addressing sub-dimensions. This enables a …

PoliticsCover (telecommunications)Policy programbusiness.industryPolitical sciencePillarKey (cryptography)Public relationsbusinessField (computer science)
researchProduct

What’s Wrong with the Diffusion of Innovation Theory?

2001

This paper examines the usefulness of the diffusion of innovation research in developing theoretical accounts of the adoption of complex and networked IT solutions. We contrast six conjectures underlying DOI research with field data obtained from the study of the diffusion of EDI. Our analysis shows that DOI based analyses miss some important facets in the diffusion of complex technologies. We suggest that complex IT solutions should be understood as socially constructed and learning intensive artifacts, which can be adopted for varying reasons within volatile diffusion arenas. Therefore DOI researchers should carefully recognize the complex, networked, and learning intensive features of te…

PoliticsDiffusion of innovation theoryComputer scienceProcess (engineering)Field dataKey (cryptography)Contrast (statistics)Social constructionismData scienceElectronic data interchange
researchProduct

Academics as Politicians and as Operators of Global Governance

2018

In this chapter, the author scrutinizes the links between politics and academe in global governance. He analyzes two cases, those of former president of the European Commission Jose Manuel Barroso and philosopher Michel Foucault, that exemplify different types of political engagement. Social scientists play a key but concealed part in the steering of global governance. Under and beyond global institutions, they partake in the development of influential transnational professional groups. By producing practical knowledge for everyday or ‘banal’ global governance, social scientists shape the politically imaginable at more institutional levels. Yet others provide at a higher level of abstractio…

PoliticsMichel foucaultPolitical scienceReflexivityKey (cryptography)European commissionPolitical engagementAbstractionPublic administrationGlobal governance
researchProduct

Analysis of the road traffic-induced pollution in two areas of Sibiu, Romania

2017

The current paper details a computer-aided research of the emission levels in two areas of the city of Sibiu, Romania. The research started from the numbers of motor vehicles passing through key segments of those two areas, located at entry points into the city of Sibiu. Using the software package Synchro Studio 7 and SimTraffic 7, the targeted crossroad areas were modelled and key indicators for the road traffic efficiency and for the emission levels were determined. These emission levels were then compared to real measured pollution values, which allowed both to assess the accuracy of the modelling and the influence of other pollution sources on the emission levels in those areas.

Pollutionmedia_common.quotation_subject0211 other engineering and technologies02 engineering and technologySoftware packageTransport engineeringSynchro020303 mechanical engineering & transports0203 mechanical engineeringlcsh:TA1-2040021105 building & constructionKey (cryptography)lcsh:Engineering (General). Civil engineering (General)Road trafficmedia_commonMATEC Web of Conferences
researchProduct

Symbolic Worst Case Execution Times

2011

In immediate or hard real-time systems the correctness of an operation depends not only upon its logical correctness, but also on the time in which it is computed. In such systems, it is imperative that operations are performed within a given deadline because missing this deadline constitutes the failure of the complete system. Such systems include medical systems, flight control systems and other systems whose failure in responding punctually results in a high economical loss or even in the loss of human lives. These systems are usually analyzed in a sequence of steps in which first, a socalled control flow graph (CFG) is constructed that represents possible program flows. Furthermore, bou…

PolynomialSequenceCorrectnessWorst-case execution timeComputer scienceCode (cryptography)Control flow graphInteger programmingAlgorithmLongest path problem
researchProduct

Characteristic time scale of auroral electrojet data

1994

The structure function of the AE time series shows that the AE time series is self-affine such that the scaling exponent changes at the time scale of approximately 113 (±9) minutes. Autocorrelation function is shown to have scaling properties similar to those of the structure function. From this result it can be deduced that the time scale at which the scaling properties of the AE data change should equal the typical autocorrelation time of these data. We find the typical autocorrelation time of the AE data is 118 (±9) minutes. The characteristic time scale of the AE data appears as a spectral break in their power spectrum at a period of about twice the autocorrelation time.

Power seriesPhysicsSeries (mathematics)MeteorologyScale (ratio)AutocorrelationSpectral densityElectrojetComputational physicsComputer Science::Hardware ArchitectureGeophysicsGeneral Earth and Planetary SciencesTime seriesScalingComputer Science::Cryptography and SecurityGeophysical Research Letters
researchProduct

Conceptualising and contesting ‘fast policy’ in teacher learning: a comparative analysis of Sweden, Finland and Australia

2020

In this article, the authors refer to key national policies, and associated politics, in the Swedish, Finnish and Australian contexts, to reveal the key discourses that characterise how ongoing tea...

Praxismedia_common.quotation_subjectDiscourse analysis05 social sciences050401 social sciences methods050301 educationTeacher learningEducationPolitics0504 sociologyPedagogyKey (cryptography)SociologyComparative educationFaculty development0503 educationmedia_commonTeacher Development
researchProduct

A Generalization of Girod's Bidirectional Decoding Method to Codes with a Finite Deciphering Delay

2012

Girod’s encoding method has been introduced in order to efficiently decode from both directions messages encoded by using finite prefix codes. In the present paper, we generalize this method to finite codes with a finite deciphering delay. In particular, we show that our decoding algorithm can be realized by a deterministic finite transducer. We also investigate some properties of the underlying unlabeled graph.

Prefix codeStrongly connected componentTheoretical computer scienceGeneralizationdeciphering delayData_CODINGANDINFORMATIONTHEORY0102 computer and information sciences02 engineering and technology01 natural sciences[INFO.INFO-FL]Computer Science [cs]/Formal Languages and Automata Theory [cs.FL]Encoding (memory)0202 electrical engineering electronic engineering information engineeringCode (cryptography)Computer Science (miscellaneous)prefix (free) codeunlabeled graphMathematicsCode[MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]020206 networking & telecommunicationsCode; deciphering delay; prefix (free) code; strongly connected component; transducer; unlabeled graph; Computer Science (miscellaneous)Prefixtransducer[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT]010201 computation theory & mathematicsGraph (abstract data type)strongly connected componentAlgorithmDecoding methods
researchProduct

Hyplets - Multi Exception Level Kernel towards Linux RTOS

2018

This paper presents the concept of a Multi-Exception level operating system. We add a hypervisor awareness to the Linux kernel and execute code in hyp exception level. We do that through the use of Hyplets. Hyplets are an innovative way to code interrupt service routines under ARM. Hyplets provide high performance, security, running time predictability, an RPC mechanism and a possible solution for the priority inversion problem. Hyplets uses special features of ARM8va hypervisor memory architecture.

Priority inversionSoftware_OPERATINGSYSTEMSComputer scienceKernel (statistics)Memory architectureCode (cryptography)Operating systemHypervisorLinux kernelInterruptcomputer.software_genreReal-time operating systemcomputerProceedings of the 11th ACM International Systems and Storage Conference
researchProduct