Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
See detailProps of ribbon graphs, involutive Lie bialgebras and moduli spaces of curves M_g,n
Merkulov, Sergei UL; Willwacher, Thomas

E-print/Working paper (2015)

We establish a new and surprisingly strong link between two previously unrelated theories: the theory of moduli spaces of curves $\cM_{g,n}$ (which, according to Penner, is controlled by the ribbon graph ... [more ▼]

We establish a new and surprisingly strong link between two previously unrelated theories: the theory of moduli spaces of curves $\cM_{g,n}$ (which, according to Penner, is controlled by the ribbon graph complex) and the homotopy theory of $E_d$ operads (controlled by ordinary graph complexes with no ribbon structure, introduced first by Kontsevich). The link between the two goes through a new intermediate {\em stable}\, ribbon graph complex which has roots in the deformation theory of quantum $A_\infty$ algebras and the theory of Kontsevich compactifications of moduli spaces of curves $\overline{\cM}_{g,n}^K$. Using a new prop of ribbon graphs and the fact that it contains the prop of involutive Lie bialgebras as a subprop we find new algebraic structures on the classical ribbon graph complex computing $H^\bu(\cM_{g,n})$. We use them to prove Comparison Theorems, and in particular to construct a non-trivial map from the ordinary to the ribbon graph cohomology. On the technical side, we construct a functor $\f$ from the category of prop(erad)s to the category of operads. If a properad $\cP$ is in addition equipped with a map from the properad governing Lie bialgebras (or graded versions thereof), then we define a notion of $\cP$-``graph'' complex, of stable $\cP$-graph complex and a certain operad, that is in good cases an $E_d$ operad. In the ribbon case, this latter operad acts on the deformation complexes of any quantum $A_\infty$-algebra. We also prove that there is a highly non-trivial, in general, action of the Grothendieck-Teichm\"uller group $GRT_1$ on the space of so-called {\em non-commutative Poisson structures}\, on any vector space $W$ equipped with a degree $-1$ symplectic form (which interpolate between cyclic $A_\infty$ structures in $W$ and ordinary polynomial Poisson structures on $W$ as an affine space). [less ▲]

Detailed reference viewed: 78 (12 UL)
Full Text
Peer Reviewed
See detailProsaic state governance of community low carbon transitions
Taylor Aiken, Gerald UL

in Political Geography (2016), 55(November), 20-29

This paper unpacks the complex relations between community low carbon transitions, the prosaic state, neoliberal modes of governing, and the role of numbers therein. It aims to outline the ways in which ... [more ▼]

This paper unpacks the complex relations between community low carbon transitions, the prosaic state, neoliberal modes of governing, and the role of numbers therein. It aims to outline the ways in which the prosaic state can, through everyday tasks, decisions, measurements and demonstration requirements, force a calculative logic onto and into community based movements and groups in ways that can be counterproductive. It centrally argues that the will to quantify, in particular the accompanying demonstration requirements (most often a number), enacts three fundamental shifts in the collective subjectivity integral to community groups and movements. First, the preferred form of knowledge becomes abstract, disembodied and fungible (episteme) over and against relational ways to understand and conceive togetherness (me¯tis), including ecological relationships. Second, the vision of community shifts from a search to belong, an intrinsic end in itself, towards an instrumental means to achieve specific targets. Finally, third, the splitting of means from ends. These can all be traced from the demonstration requirements, and numbers, accompanying neoliberal prosaic state engagement with community groups. [less ▲]

Detailed reference viewed: 158 (11 UL)
Peer Reviewed
See detailprosoDB: Eine multimediale Datenbankumgebung für konversationelle und prosodische Analysen
Gilles, Peter UL

in Gesprächsforschung : Online-Zeitschrift zur verbalen Interaktion (2001), (2), 75-89

Detailed reference viewed: 119 (3 UL)
Full Text
Peer Reviewed
See detailA prosopography of Breton rulership, A.D. 818-952
Pettiau, Hérold UL

in Journal of Celtic Studies (The) (2004), 4

My aim in this article is to gather the contemporary sources dealing with Breton rulers and their relatives into a comprehensive and systematic prosopographical survey, dor it is striking to what extent ... [more ▼]

My aim in this article is to gather the contemporary sources dealing with Breton rulers and their relatives into a comprehensive and systematic prosopographical survey, dor it is striking to what extent received accounts rely on late texts. [less ▲]

Detailed reference viewed: 66 (2 UL)
Full Text
Peer Reviewed
See detailProsperity and peace: Economic interests and war legacy in Croatia’s EU referendum vote
Glaurdic, Josip UL; Vukovic, Vuk

in European Union Politics (2015), 16(4), 577-600

Studies of popular attitudes toward European integration have paid limited attention to the historical roots of voters’ security preferences. Using an original municipality-level data set, we test whether ... [more ▼]

Studies of popular attitudes toward European integration have paid limited attention to the historical roots of voters’ security preferences. Using an original municipality-level data set, we test whether the pattern of voting in Croatia’s 2012 referendum on European Union accession was affected by the legacy of the country’s 1991–1995 war for independence or rather by economic factors. While finding evidence for the impact of the communities’ level of prosperity and structure of economy, our analysis more notably demonstrates that the intensity of the communities’ experience of war had a positive effect on their level of support for European Union membership. This effect also had a strong interactive relationship with the communities’ political allegiances, highlighting the importance not only of historically rooted security issues but also of political actors who make those issues electorally salient. [less ▲]

Detailed reference viewed: 111 (10 UL)
Full Text
See detailProsthesis head
Kelm, Jens; Maas, Stefan UL; Collé, Claude UL

Patent (2014)

Detailed reference viewed: 302 (71 UL)
Full Text
Peer Reviewed
See detailLa prostitution à Bruxelles pendant la Grande Guerre: contrôle et pratique
Majerus, Benoît UL

in Crime, Histoire & Sociétés (2003), 7(1), 5--42

Detailed reference viewed: 343 (7 UL)
Full Text
Peer Reviewed
See detailProstitution in Brussels
Majerus, Benoît UL

in Chaumont, Jean-Michel; Rodriguez Garcia, Magaly; Servais, Paul (Eds.) Trafficking Women 1924-1926 (2017)

Detailed reference viewed: 133 (9 UL)
Peer Reviewed
See detailProtagonistinnen und Protagonisten in Übergangssituatio­nen: Dialoge über Frauenbildung und berufliche Bildung für Frauen
Glaser, Edith; Priem, Karin UL

in Jahrbuch für Historische Bildungsforschung, 8 (2002)

Detailed reference viewed: 33 (0 UL)
Full Text
See detailLa protección del medio ambiente en la industria lorenesa y sarrense.
Schulz, Christian UL

in GOZALVEZ PEREZ, Vicente (Ed.) Industria y medio ambiente. Actas de VII Jornadas de Geografía Industrial (2000)

Detailed reference viewed: 40 (1 UL)
Full Text
Peer Reviewed
See detailProtect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations
Pejo, Balazs UL; Tang, Qiang; Wang, Husen

Scientific Conference (2016, June 27)

In the cloud computing era, in order to avoid the computational burdens, many recommendation service providers tend to outsource their collaborative filtering computations to third-party cloud servers. In ... [more ▼]

In the cloud computing era, in order to avoid the computational burdens, many recommendation service providers tend to outsource their collaborative filtering computations to third-party cloud servers. In order to protect service quality, the integrity of computation results needs to be guaranteed. In this paper, we analyze two integrity verification approaches by Vaidya et al. and demonstrate their performances. In particular, we analyze the verification via auxiliary data approach which is only briefly mentioned in the original paper, and demonstrate the experimental results. We then propose a new solution to outsource all computations of the weighted Slope One algorithm in two-server setting and provide experimental results. [less ▲]

Detailed reference viewed: 131 (14 UL)
Full Text
Peer Reviewed
See detailProtected Areas and Regional Development: Conflicts and Opportunities – Presented on the Example of the UNESCO Biosphere Reserve Bliesgau.
Frys, Wioletta; Nienaber, Birte UL

in European countryside (2011), (3), 208-226

All over the world, UNESCO biosphere reserves are designated in order to protect regionally distinctive landscapes. This designation represents a significant up-valuation of nature reserves and landscape ... [more ▼]

All over the world, UNESCO biosphere reserves are designated in order to protect regionally distinctive landscapes. This designation represents a significant up-valuation of nature reserves and landscape conservation areas, forests and other mostly rural landscapes. In cases where biosphere reserves include urban areas, additional objectives are established such as the development of urban-rural-relationships. The Biosphere Reserve Bliesgau which is a sustainable model region responds to this challenge. Located in a rural part of Saarland, the biosphere Bliesgau is still facing further challenges which are connected to the designation as a UNESCO biosphere reserve. This designation entails many obligations that are conditions and restrictions for the actors on the one hand and that provide opportunities for key personalities to make progress in achieving their aims concerning nature conservation on the other hand. Hence, not only prospects but potential for conflict emerged which complicates regional development in rural Saarland. A primary survey in the biosphere reserve allowed for the identification of the presented conflicts. [less ▲]

Detailed reference viewed: 98 (1 UL)
Full Text
Peer Reviewed
See detailProtecting Elliptic Curve Cryptography Against Memory Disclosure Attacks
Yang, Yang; Guan, Zhi; Liu, Zhe UL et al

in Shi, Elaine; Yiu, S.M. (Eds.) Information and Communications Security (2014, December)

Detailed reference viewed: 112 (4 UL)
Full Text
Peer Reviewed
See detailProtecting Privacy in a Digital Age
Cole, Mark UL

in Dörr, Dieter; Weaver, Russ (Eds.) The Right to Privacy in the Light of Media Convergence – Perspectives from Three Continents (2012)

Detailed reference viewed: 83 (5 UL)
Full Text
Peer Reviewed
See detailProtecting query privacy in location-based services
Chen, Xihui UL; Pang, Jun UL

in GeoInformatica (2014), 18(1), 95-133

The popularity of location-based services (LBSs) leads to severe concerns on users’ privacy. With the fast growth of Internet applications such as online social networks, more user information becomes ... [more ▼]

The popularity of location-based services (LBSs) leads to severe concerns on users’ privacy. With the fast growth of Internet applications such as online social networks, more user information becomes available to the attackers, which allows them to construct new contextual information. This gives rise to new challenges for user privacy protection and often requires improvements on the existing privacy-preserving methods. In this paper, we classify contextual information related to LBS query privacy and focus on two types of contexts – user profiles and query dependency: user profiles have not been deeply studied in LBS query privacy protection, while we are the first to show the impact of query dependency on users’ query privacy. More specifically, we present a general framework to enable the attackers to compute a distribution on users with respect to issuing an observed request. The framework can model attackers with different contextual information. We take user profiles and query dependency as examples to illustrate the implementation of the framework and their impact on users’ query privacy. Our framework subsequently allows us to show the insufficiency of existing query privacy metrics, e.g., k-anonymity, and propose several new metrics. In the end, we develop new generalisation algorithms to compute regions satisfying users’ privacy requirements expressed in these metrics. By experiments, our metrics and algorithms are shown to be effective and efficient for practical usage. [less ▲]

Detailed reference viewed: 150 (9 UL)
See detail“Protecting Victims’ Rights in the EU: the theory and practice of diversity of treatment during the criminal trial. National Report: France”
Tricot, Juliette; Binard, Clément; Iliadou, Rita et al

Report (2014)

Detailed reference viewed: 115 (3 UL)
Peer Reviewed
See detailLa Protection de la Victime Contre la Haine Raciale: Le Point de Vue de la Victime
Silga, Janine UL

in Bentouhami, Hourya; Möschel, Mathias (Eds.) Critical Race Theory : une introduction aux grands textes fondateurs (2017)

Detailed reference viewed: 26 (2 UL)