Search results for "Cryptography"
showing 10 items of 657 documents
Regulating Minority Languages in Ukraine’s Educational System: Debate, Legal Framework and Implementation
2021
The chapter provides a comprehensive analysis of the development of policies on minority languages in Ukraine’s educational system, and in public debate, from 1991 to the present, combining legal analysis with the analysis of media discourses. Finding high politicization of the language-in-education issue in Ukraine, it maps key trajectories for the future course of Ukraine’s policies as to language in education.
The Five-Pillar Model of Parties’ Migration into the Digital
2021
Scholars have examined how political parties cope with web-based technologies for about 20 years. This body of literature on party digitalisation covers many different aspects of parties’ migration into the digital, yet usually, the term digitalisation is used equally for all kinds of web-related changes in party behaviour and routines. This contribution distinguishes five key dimensions (pillars) of parties’ migration into the digital, which resonate with classic approaches of party research. These pillars cover (A) membership, (B) leaders and candidates, (C) policy program, (D) public image, and (E) resources. Each pillar consists of three bricks addressing sub-dimensions. This enables a …
What’s Wrong with the Diffusion of Innovation Theory?
2001
This paper examines the usefulness of the diffusion of innovation research in developing theoretical accounts of the adoption of complex and networked IT solutions. We contrast six conjectures underlying DOI research with field data obtained from the study of the diffusion of EDI. Our analysis shows that DOI based analyses miss some important facets in the diffusion of complex technologies. We suggest that complex IT solutions should be understood as socially constructed and learning intensive artifacts, which can be adopted for varying reasons within volatile diffusion arenas. Therefore DOI researchers should carefully recognize the complex, networked, and learning intensive features of te…
Academics as Politicians and as Operators of Global Governance
2018
In this chapter, the author scrutinizes the links between politics and academe in global governance. He analyzes two cases, those of former president of the European Commission Jose Manuel Barroso and philosopher Michel Foucault, that exemplify different types of political engagement. Social scientists play a key but concealed part in the steering of global governance. Under and beyond global institutions, they partake in the development of influential transnational professional groups. By producing practical knowledge for everyday or ‘banal’ global governance, social scientists shape the politically imaginable at more institutional levels. Yet others provide at a higher level of abstractio…
Analysis of the road traffic-induced pollution in two areas of Sibiu, Romania
2017
The current paper details a computer-aided research of the emission levels in two areas of the city of Sibiu, Romania. The research started from the numbers of motor vehicles passing through key segments of those two areas, located at entry points into the city of Sibiu. Using the software package Synchro Studio 7 and SimTraffic 7, the targeted crossroad areas were modelled and key indicators for the road traffic efficiency and for the emission levels were determined. These emission levels were then compared to real measured pollution values, which allowed both to assess the accuracy of the modelling and the influence of other pollution sources on the emission levels in those areas.
Symbolic Worst Case Execution Times
2011
In immediate or hard real-time systems the correctness of an operation depends not only upon its logical correctness, but also on the time in which it is computed. In such systems, it is imperative that operations are performed within a given deadline because missing this deadline constitutes the failure of the complete system. Such systems include medical systems, flight control systems and other systems whose failure in responding punctually results in a high economical loss or even in the loss of human lives. These systems are usually analyzed in a sequence of steps in which first, a socalled control flow graph (CFG) is constructed that represents possible program flows. Furthermore, bou…
Characteristic time scale of auroral electrojet data
1994
The structure function of the AE time series shows that the AE time series is self-affine such that the scaling exponent changes at the time scale of approximately 113 (±9) minutes. Autocorrelation function is shown to have scaling properties similar to those of the structure function. From this result it can be deduced that the time scale at which the scaling properties of the AE data change should equal the typical autocorrelation time of these data. We find the typical autocorrelation time of the AE data is 118 (±9) minutes. The characteristic time scale of the AE data appears as a spectral break in their power spectrum at a period of about twice the autocorrelation time.
Conceptualising and contesting ‘fast policy’ in teacher learning: a comparative analysis of Sweden, Finland and Australia
2020
In this article, the authors refer to key national policies, and associated politics, in the Swedish, Finnish and Australian contexts, to reveal the key discourses that characterise how ongoing tea...
A Generalization of Girod's Bidirectional Decoding Method to Codes with a Finite Deciphering Delay
2012
Girod’s encoding method has been introduced in order to efficiently decode from both directions messages encoded by using finite prefix codes. In the present paper, we generalize this method to finite codes with a finite deciphering delay. In particular, we show that our decoding algorithm can be realized by a deterministic finite transducer. We also investigate some properties of the underlying unlabeled graph.
Hyplets - Multi Exception Level Kernel towards Linux RTOS
2018
This paper presents the concept of a Multi-Exception level operating system. We add a hypervisor awareness to the Linux kernel and execute code in hyp exception level. We do that through the use of Hyplets. Hyplets are an innovative way to code interrupt service routines under ARM. Hyplets provide high performance, security, running time predictability, an RPC mechanism and a possible solution for the priority inversion problem. Hyplets uses special features of ARM8va hypervisor memory architecture.