LEADER 02806nam 2200661 a 450 001 9910452229803321 005 20200520144314.0 010 $a0-8166-9303-X 035 $a(CKB)1000000000346842 035 $a(EBL)310634 035 $a(OCoLC)476095328 035 $a(SSID)ssj0000116826 035 $a(PQKBManifestationID)11140987 035 $a(PQKBTitleCode)TC0000116826 035 $a(PQKBWorkID)10035647 035 $a(PQKB)10114679 035 $a(MiAaPQ)EBC310634 035 $a(OCoLC)191930392 035 $a(MdBmJHUP)muse38933 035 $a(Au-PeEL)EBL310634 035 $a(CaPaEBR)ebr10151161 035 $a(CaONFJC)MIL522663 035 $a(EXLCZ)991000000000346842 100 $a20030203d2003 ub 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCalibrations$b[electronic resource] $ereading for the social /$fAto Quayson 210 $aMinneapolis $cUniversity of Minnesota Press$dc2003 215 $a1 online resource (221 p.) 225 1 $aPublic worlds ;$vv. 12 300 $aDescription based upon print version of record. 311 $a0-8166-3840-3 311 $a0-8166-3839-X 320 $aIncludes bibliographical references (p. 165-174) and index. 327 $a1. Literature, anthropology, and history in Ghosh's In an antique land -- 2. Social imaginaries in transition: culture heroism and the genres of everyday life -- 3. African postcolonial relations through a prism of tragedy -- 4. Symbolization compulsions: Freud, African literature, and South Africa's process of truth and reconciliation -- 5. Disability and contingency -- 6. Literature and the parables of time. 330 $aAto Quayson uses a method of reading he calls calibrations: a reading of literature with what lies beyond it as a way of understanding structures of transformation, process, and contradiction that inform both literature and society. He surveys texts ranging from Bob Marley lyrics, Toni Morrison's work, Walter Benjamin's Theses on the Philosophy of History, and Althusser's reflections on political economy. 410 0$aPublic worlds ;$vv. 12. 606 $aAfrican literature$y20th century$xHistory and criticism 606 $aMarxist criticism 606 $aMimesis in literature 606 $aPostcolonialism in literature 608 $aElectronic books. 615 0$aAfrican literature$xHistory and criticism. 615 0$aMarxist criticism. 615 0$aMimesis in literature. 615 0$aPostcolonialism in literature. 676 $a809/.896 700 $aQuayson$b Ato$0621183 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910452229803321 996 $aCalibrations$92063068 997 $aUNINA LEADER 02391nam 2200385 450 001 9910247456303321 005 20230627223707.0 010 $a1-5386-3462-7 035 $a(CKB)4100000001193064 035 $a(NjHacI)994100000001193064 035 $a(EXLCZ)994100000001193064 100 $a20230419d2017 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a2017 6th International Conference on Space Mission Challenges for Information Technology (SMC-IT) /$fInstitute of Electrical and Electronics Engineers (IEEE) Computer Society 210 1$aLos Alamitos, California :$cInstitute of Electrical and Electronics Engineers (IEEE),$d2017. 215 $a1 online resource (xi, 156 pages) $cillustrations some color 311 $a1-5386-3463-5 330 $aInformation technology (IT) has progressively grown in importance to space exploration efforts and today it often dominates the costs and schedules of space mission projects The International Conference on Space Mission Challenges for Information Technology (SMC IT) is the first forum to gather system and software engineers, scientists, and other practitioners with the objective of advancing information technology for space missions The forum provides an excellent opportunity for technical interchange for all aspects of IT used for space missions The conference will emphasize current and emerging IT practice and challenges for future space missions All aspects of the space mission will be explored, including flight systems, ground systems, science data processing, engineering and development tools, operations, and telecommunications The entire IT lifecycle of mission development will be considered. 517 $a2017 6th International Conference on Space Mission Challenges for Information Technology 606 $aAstronautics$xData processing$vCongresses 606 $aInformation technology$vCongresses 607 $aOuter space$xExploration$vCongresses 615 0$aAstronautics$xData processing 615 0$aInformation technology 676 $a629.4 801 0$bNjHacI 801 1$bNjHacl 906 $aPROCEEDING 912 $a9910247456303321 996 $a2017 6th International Conference on Space Mission Challenges for Information Technology (SMC-IT)$92535661 997 $aUNINA LEADER 05289nam 22009135 450 001 9910484329303321 005 20251226195253.0 010 $a3-642-05445-5 024 7 $a10.1007/978-3-642-05445-7 035 $a(CKB)1000000000804452 035 $a(SSID)ssj0000355614 035 $a(PQKBManifestationID)11925336 035 $a(PQKBTitleCode)TC0000355614 035 $a(PQKBWorkID)10340757 035 $a(PQKB)10136366 035 $a(DE-He213)978-3-642-05445-7 035 $a(MiAaPQ)EBC3064753 035 $a(PPN)139962522 035 $a(EXLCZ)991000000000804452 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSelected Areas in Cryptography $e16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers /$fedited by Michael J. Jacobson, Vincent Rijmen, Rei Safavi-Naini 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XIII, 467 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5867 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-05443-9 320 $aIncludes bibliographical references and index. 327 $aHash Functions I -- Practical Collisions for SHAMATA-256 -- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher -- Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function -- Miscellaneous Techniques -- More on Key Wrapping -- Information Theoretically Secure Multi Party Set Intersection Re-visited -- Real Traceable Signatures -- Hash Functions II -- Cryptanalysis of Hash Functions with Structures -- Cryptanalysis of the LANE Hash Function -- Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 -- Hardware Implementation and Cryptanalysis -- A More Compact AES -- Optimization Strategies for Hardware-Based Cofactorization -- More on the Security of Linear RFID Authentication Protocols -- Differential Fault Analysis of Rabbit -- An Improved Recovery Algorithm for Decayed AES Key Schedule Images -- Block Ciphers -- Cryptanalysis of the Full MMB Block Cipher -- Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis -- Improved Integral Attacks on MISTY1 -- New Results on Impossible Differential Cryptanalysis of Reduced?Round Camellia?128 -- Modes of Operation -- Format-Preserving Encryption -- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption -- Implementation of Public Key Cryptography -- On Repeated Squarings in Binary Fields -- Highly Regular m-Ary Powering Ladders -- An Efficient Residue Group Multiplication for the ? T Pairing over -- Compact McEliece Keys from Goppa Codes -- Hash Functions and Stream Ciphers -- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård -- Cryptanalysis of Dynamic SHA(2) -- A New Approach for FCSRs -- New Cryptanalysis of Irregularly Decimated Stream Ciphers. 330 $aThis volume constitutes the selected papers of the 16th Annual International Workshop on Selected Areas in Cryptography, SAC 2009, held in Calgary, Alberta, Canada, in August 13-14 2009. From a total of 99 technical papers, 27 papers were accepted for presentation at the workshop. They cover the following topics: hash functions, on block and stream ciphers, public key schemes, implementation, and privacy-enhancing cryptographic systems. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5867 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer programming 606 $aData protection 606 $aData structures (Computer science) 606 $aInformation theory 606 $aCoding theory 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCryptology 606 $aProgramming Techniques 606 $aData and Information Security 606 $aData Structures and Information Theory 606 $aCoding and Information Theory 606 $aDiscrete Mathematics in Computer Science 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer programming. 615 0$aData protection. 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aCoding theory. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aCryptology. 615 24$aProgramming Techniques. 615 24$aData and Information Security. 615 24$aData Structures and Information Theory. 615 24$aCoding and Information Theory. 615 24$aDiscrete Mathematics in Computer Science. 676 $a004n/a 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 701 $aJacobson$b Michael J$0472335 701 $aRijmen$b Vincent$f1970-$01726354 701 $aSafavi-Naini$b Reihanah$01220957 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484329303321 996 $aSelected areas in cryptography$94198204 997 $aUNINA