Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

University of Pennsylvania

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 51

Full-Text Articles in Entire DC Network

Holistic Resource Allocation For Multicore Real-Time Systems, Meng Xu, Linh T.X. Phan Feb 2018

Holistic Resource Allocation For Multicore Real-Time Systems, Meng Xu, Linh T.X. Phan

Technical Reports (CIS)

This paper presents CaM, a holistic cache and memory bandwidth resource allocation strategy for multicore real-time systems. CaM is designed for partitioned scheduling, where tasks are mapped onto cores, and the shared cache and memory bandwidth resources are partitioned among cores to reduce resource interferences due to concurrent accesses. Based on our extension of LITMUSRT with Intel’s Cache Allocation Technology and MemGuard, we present an experimental evaluation of the relationship between the allocation of cache and memory bandwidth resources and a task’s WCET. Our resource allocation strategy exploits this relationship to map tasks onto cores, and to compute the resource …


The Dynamic Ecology Of The Writing Process And Agency: A Corpus-Based Comparative Case Study Of Stancetaking Among Native Speakers And Non-Native Speakers Of English In First-Year Composition Conferences, Kirk Marshall Wilkins Jan 2015

The Dynamic Ecology Of The Writing Process And Agency: A Corpus-Based Comparative Case Study Of Stancetaking Among Native Speakers And Non-Native Speakers Of English In First-Year Composition Conferences, Kirk Marshall Wilkins

Kirk Marshall Wilkins

While previous research into writing conferences and tutorials has found that sessions with non-native speakers of English (NNSs) differ from those with native speakers of English (NSs), these studies using conversation analysis have tended to approach conferences through more qualitative methodologies. This thesis builds upon and enriches these previous studies by incorporating more of a quantitative analysis through the use of corpus linguistics to systematically analyze the frequency with which particular grammatical devices that express the attitude of the speaker, otherwise known as stance, and power are used and how these frequencies may vary within a specific set of NS …


Registration And Recognition In 3d, Alexander Evans Patterson Iv Jan 2014

Registration And Recognition In 3d, Alexander Evans Patterson Iv

Publicly Accessible Penn Dissertations

The simplest Computer Vision algorithm can tell you what color it sees when you point it at an object, but asking that computer what it is looking at is a much harder problem. Camera and LiDAR (Light Detection And Ranging) sensors generally provide streams pixel of values and sophisticated algorithms must be engineered to recognize objects or the environment. There has been significant effort expended by the computer vision community on recognizing objects in color images; however, LiDAR sensors, which sense depth values for pixels instead of color, have been studied less. Recently we have seen a renewed interest in …


Regulating Gene Expression With Light-Activated Oligonucleotides, Julianne C. Griepenburg Jan 2014

Regulating Gene Expression With Light-Activated Oligonucleotides, Julianne C. Griepenburg

Publicly Accessible Penn Dissertations

The work in this thesis identifies new photochemical approaches to gain high spatiotemporal control over molecular structure and function, for broad applications in materials and biological science. "Caged" compounds provide a method for temporarily blocking function until acted upon by an external trigger, typically near-UV light. To enable multiplexing studies, three new biomolecular caging strategies were developed that can be activated with various wavelengths of near-UV or visible light. The first method, an oligonucleotide hairpin structure incorporating one or two nitrobenzyl photolinkers, was applied to a miRNA antagomir and used to "turn off" let-7 miRNA in zebrafish embryos with 365 …


Mechanisms Of Non-Canonical Nf-Kappab Regulation, Carolyn Margaret Gray Jan 2014

Mechanisms Of Non-Canonical Nf-Kappab Regulation, Carolyn Margaret Gray

Publicly Accessible Penn Dissertations

NF-kappaB is activated through two signaling cascades: the classical and non-canonical pathways, which are distinguished based on the Inhibitor of kappaB Kinase (IKK) components required to activate each pathway. Whereas classical NF-kappaB requires NF-kappaB Essential Modulator (NEMO) and IKKbeta, non-canonical NF-kappaB requires IKKalpha and upstream stabilization of NF-kappaB Inducing Kinase (NIK), but not NEMO. However, we have previously shown that IKKalpha contains a functional NEMO binding domain and associates with NEMO and IKKbeta as part of the heterotrimeric IKK complex. The overarching goal of the work described in this thesis was to determine whether the interaction between NEMO and IKKalpha …


Systemic Incongruity: Bringing Down The Risks Of Conformity And Deviation Biases, Shefali V. Patil Jan 2014

Systemic Incongruity: Bringing Down The Risks Of Conformity And Deviation Biases, Shefali V. Patil

Publicly Accessible Penn Dissertations

Employees often have to decide whether to conform to or deviate from the status quo. Exhibiting consistent preferences for either preserving or maintaining the status quo (i.e., conformity biases) or for challenging or rejecting the status quo (i.e., deviation biases) can be costly. Conformity biases prevent employees from adapting to changing task demands and deviation biases hamper the predictability and reliability of decisions. It is therefore important for scholars and practitioners to understand how to engineer work environments that, to the degree possible, enable employees to bring down both types of risks. However, our understanding of this issue is limited …


Bellwether 80, Fall 2013 Oct 2013

Bellwether 80, Fall 2013

Bellwether Magazine

No abstract provided.


江戸時代女性の噂話 第二部:農村あるいは地方の女性, Cecilia (淑子) Seigle (瀬川) Jan 2012

江戸時代女性の噂話 第二部:農村あるいは地方の女性, Cecilia (淑子) Seigle (瀬川)

Cecilia S Seigle Ph.D.

No abstract provided.


Some Observations On The Weddings Of Tokugawa Shogun’S Daughters – Part 2, Cecilia Seigle Jan 2012

Some Observations On The Weddings Of Tokugawa Shogun’S Daughters – Part 2, Cecilia Seigle

Cecilia S Seigle Ph.D.

This section discusses the complex psychological and philosophical reason for Shogun Yoshimune’s contrasting handlings of his two adopted daughters’ and his favorite son’s weddings. In my thinking, Yoshimune lived up to his philosophical principles by the illogical, puzzling treatment of the three weddings. We can witness the manifestation of his modest and frugal personality inherited from his ancestor Ieyasu, cohabiting with his strong but unconventional sense of obligation and respect for his benefactor Tsunayoshi.


Grieving In The Internet Age, Kimberly Falconer, K. Gibson, H. Norman, Mieke Sachsenweger Apr 2011

Grieving In The Internet Age, Kimberly Falconer, K. Gibson, H. Norman, Mieke Sachsenweger


Grief is one of the most ubiquitous traumatic human experiences. Although in recent years online expressions of grief and attempts to cope with bereavement have grown significantly in scale, little is known about the extent to which such activities may aid in the clinical and non-clinical management of grief. This article discusses developments in this field from a psychological perspective and suggests ways in which online developments create tools to further the management of grief. Suggestions for future research are given and the impact of such tools on professional practice is discussed.


Manual For Working With Arcgis 10, Amy Hillier Jan 2011

Manual For Working With Arcgis 10, Amy Hillier

Amy Hillier

No abstract provided.


Playbooks, Zachary Lesser Jan 2011

Playbooks, Zachary Lesser

Zachary Lesser

The history of playbooks in early modern England, for a general readership.


Off The Hook, Kevin Werbach Jan 2010

Off The Hook, Kevin Werbach

Kevin Werbach

Communications networks are the basic infrastructure of the digital age. The future of news, business, interaction, entertainment, health care, education, and many other areas will be built on top of these platforms. Network infrastructure is the dividing line between the old physical economy of scarcity and the new information economy of abundance. The legal framework for networks will therefore shape not only the telecommunications businesses that provide connectivity, but also the applications, services, content, and user activities that depend on it.

Unfortunately, communications networks are entering a vast legal grey area. As telecommunications and media converge into the Internet, they …


Giving Every Child A Chance: The Need For Reform And Infrastructure In Intercountry Adoption Policy, Rachel J. Wechsler Mar 2009

Giving Every Child A Chance: The Need For Reform And Infrastructure In Intercountry Adoption Policy, Rachel J. Wechsler

Rachel J. Wechsler

This essay is both descriptive and normative in nature. Its purpose is to describe the current intercountry adoption regime along with its problems, and to propose a much-needed solution. At the outset, the paper explains the great need for intercountry adoption, highlighting empirical research on child development. Secondly, it gives an overview of past and present international adoption policy. Thirdly, the essay describes the problems in the current policy regime. Finally, it proposes an international agency and Family Court as a new approach to intercountry adoption that will solve many of the failures of the current system.


Open Records, Open Possibilities, John Mark Ockerbloom Jan 2009

Open Records, Open Possibilities, John Mark Ockerbloom

John Mark Ockerbloom

Slides and prepared remarks for an ALA panel discussion on sharing bibliographic records and OCLC's proposed WorldCat policy.

I give some examples of useful innovations that can advance the mission of libraries when records are openly shared, and argue that more restrictive policies like OCLC's proposal can cost the library community dearly in lost opportunities. I show how the open source community has alternative ways to license work openly, and to cover costs. Finally, I argue that, even if WorldCat is not prepared to open access to all its bibliographic records, the members of the cooperative should be empowered to …


Opening The Ils For Discovery: The Digital Library Federation’S Ils-Discovery Interface Recommendations, John Mark Ockerbloom Jan 2009

Opening The Ils For Discovery: The Digital Library Federation’S Ils-Discovery Interface Recommendations, John Mark Ockerbloom

John Mark Ockerbloom

Slides for my ALA talk, giving an overview of the DLF's ILD-discovery interface recommendations, and how they are and can be used to enable a richer environment of information discovery applications across a wide variety of ILS's and other library information bases.


Clustering Of Unhealthy Advertisements Around Child-Serving Institutions: A Three‐City, Amy Hillier Jan 2009

Clustering Of Unhealthy Advertisements Around Child-Serving Institutions: A Three‐City, Amy Hillier

Amy Hillier

No abstract provided.


Watching Our Backs: Community Verification Of Digital Preservation Systems, John Mark Ockerbloom Nov 2008

Watching Our Backs: Community Verification Of Digital Preservation Systems, John Mark Ockerbloom

John Mark Ockerbloom

Librarians and faculty agree that information preservation is one of the essential roles of libraries. Yet, as the information we manage increasingly becomes digital, we have to rely on new methods of preserving this information that have not been fully tested. While developing and auditing for best practices is important, we must also verify that preservation systems actually perform as we hope they will, preferably long before we have to fall back on them.

In this talk, I will show ways in which this verification can be done now, by the community, with reasonable cost and demonstrable efficacy. Specifically, I …


Polar Bear Population Forecasts: A Public-Policy Forecasting Audit, J. Scott Armstrong, Kesten C. Green, Willie Soon Jun 2008

Polar Bear Population Forecasts: A Public-Policy Forecasting Audit, J. Scott Armstrong, Kesten C. Green, Willie Soon

J. Scott Armstrong

Calls to list polar bears as a threatened species under the United States Endangered Species Act are based on forecasts of substantial long-term declines in their population. Nine government reports were written to help U.S. Fish and Wildlife Service managers decide whether or not to list polar bears as a threatened species. We assessed these reports based on evidence-based (scientific) forecasting principles. None of the reports referred to sources of scientific forecasting methodology. Of the nine, Amstrup, Marcot, and Douglas (2007) and Hunter et al. (2007) were the most relevant to the listing decision, and we devoted our attention to …


High Quality Discovery In A Web 2.0 World: Architectures For Next Generation Catalogs, John Mark Ockerbloom May 2008

High Quality Discovery In A Web 2.0 World: Architectures For Next Generation Catalogs, John Mark Ockerbloom

John Mark Ockerbloom

Issues of information and systems architecture underly many of the current debates over the future of cataloging. This talk discusses some ways in which the architecture of the catalog is being redesigned to combine the rich information architecture of library metadata with the robust systems architecture of many Web-based discovery systems. I will show "subject map" discovery systems that better exploit the relationships in complex ontologies like LCSH, and discuss a Digital Library Federation initiative to promote standards supporting interoperability between discovery systems and ILS data and services. I will also touch on the role of networked architectures in improving …


Integrated Sovereignty, Philip M. Nichols Apr 2008

Integrated Sovereignty, Philip M. Nichols

Philip M. Nichols

Sovereignty confounds legal scholarship. The doctrinal definition of sovereignty does not describe the real world, yet that definition dominates both the application of law and scholarly debate. Robert Dahl’s empirical methodology, never before applied to sovereignty, yields at least two insights. First, sovereignty does not consist of absolute control of everything, instead sovereignty is the final control of some things. Second, many different entities possess sovereignty; thus the sovereignty described in doctrinal international law is actually integrated. Accepting the notion of integrated sovereignty allows international law to better describe the empirical world, and positions international law to accommodate the needs …


Against Financial Literacy Education, Lauren E. Willis Mar 2008

Against Financial Literacy Education, Lauren E. Willis

Lauren E Willis

The dominant model of regulation in the United States for consumer credit, insurance, and investment products is disclosure and unfettered choice. As these products have become increasingly complex, consumers’ inability to understand them has become increasingly apparent, and the consequences of this inability more dire. In response, policymakers have embraced financial literacy education as a necessary corollary to the disclosure model of regulation. This education is widely believed to turn consumers into “responsible” and “empowered” market players, motivated and competent to make financial decisions that increase their own welfare. The vision is of educated consumers handling their own credit, insurance, …


Only Connect, Kevin Werbach Jan 2008

Only Connect, Kevin Werbach

Kevin Werbach

There are two kinds of legal rules for communications networks, such as the Internet and the telephone system. Interconnection rules define how and when networks must exchange traffic with each other, and non-discrimination rules prevent networks from favoring some customers’ traffic over others. Each approach has unique strengths and weaknesses. The distinction has never been fully appreciated, even though regulators have imposed both requirements many times.

Non-discrimination questions predominate in communications and Internet policy today, thanks to the high-profile battle over “network neutrality” rules for broadband networks. Yet both sides in the network neutrality debate are mistaken. The central challenge …


Language Socialization And The Linguistic Anthropology Of Education, Betsy R. Rymes Jan 2008

Language Socialization And The Linguistic Anthropology Of Education, Betsy R. Rymes

Betsy Rymes

To understand how the field of Language Socialization has developed with respect to the Linguistic Anthropology of Education, this entry traces the connections between these categorizations of research from their current coinage to their roots in linguistic anthropology as a whole.


The Relationship Between Mass Media And Classroom Discourse, Betsy R. Rymes Jan 2008

The Relationship Between Mass Media And Classroom Discourse, Betsy R. Rymes

Betsy Rymes

In this paper, I illustrate the cyclical proliferation of mass-mediated communicative repertoires through small-scale mechanisms of classroom discourse. I draw on examples of current advertising, classroom discourse data from diverse studies, my own study of an elementary ESL group’s interaction, and mass mediated representations of classroom discourse on websites and TV shows about school to illustrate the relationship between mass media and classroom discourse. I analyze how mass-mediated metadiscourse creates new participation frameworks in classrooms that propel small-scale changes in classroom discourse and potentially facilitate the integration of new voices. Finally I discuss the implications of this analysis for how …


Web Du Bois And The "Negro Problem": Thoughts On Violence In Philadelphia, Amy Hillier Jul 2007

Web Du Bois And The "Negro Problem": Thoughts On Violence In Philadelphia, Amy Hillier

Amy Hillier

This sermon, delivered at First Unitarian Church of Philadelphia, might also be called "Why a white girl from New Hampshire is studying The Philadelphia Negro." This essay/sermon connects Du Bois's 1896 survey of Philadelphia to the violence currently plaguing Philadelphia.


United States V. Lazarenko: Filling In Gaps In Support And Regulation Of Transnational Relationships, Philip M. Nichols Mar 2007

United States V. Lazarenko: Filling In Gaps In Support And Regulation Of Transnational Relationships, Philip M. Nichols

Philip M. Nichols

The prosecution in the United States of Pavlo Lazarenko for corruption merits study for two reasons. First, it provides case study of the use of local laws to deal with a transnational act. Law should support and regulates interaction within communities; local laws that stop at the borders do little to support transnational communities and international law, which does not recognize most transnational persons as legitimate subjects of international law, does even less. The court that tried Lazarenko could not therefore rely solely on its local law nor could it turn to nonexistent transnational law; instead it cobbled together local …


Review Of Alan Wald's "Trinity Of Passion: The Literary Left And The Antifascist Crusade", Alan Filreis Jan 2007

Review Of Alan Wald's "Trinity Of Passion: The Literary Left And The Antifascist Crusade", Alan Filreis

Alan Filreis

A review of one book in Alan Wald's three-volume study of the American literary left.


Arcgis 9.3 Manual, Amy Hillier Jan 2007

Arcgis 9.3 Manual, Amy Hillier

Amy Hillier

No abstract provided.


The Ftc And Consumer Privacy In The Coming Decade, Joseph Turow, Chris Jay Hoofnagle, Deirdre K. Mulligan, Nathaniel Good, Jens Grossklags Nov 2006

The Ftc And Consumer Privacy In The Coming Decade, Joseph Turow, Chris Jay Hoofnagle, Deirdre K. Mulligan, Nathaniel Good, Jens Grossklags

Joseph Turow

Large majorities of consumers believe that the term "privacy policy" conveys a baseline level of information practices that protect their privacy. In short, "privacy," like "free" before it, has taken on normative meaning in the marketplace. When consumers see the term "privacy policy," they believe that their privacy will be protected in specific ways. In particular, when consumers see the "privacy policy" they assume that a web site will not share their personal information. Of course, this is not the case. Privacy policies today come in all different flavors. Some …