LEADER 04530nam 2200709 a 450 001 9910463148603321 005 20200520144314.0 010 $a0-8135-5742-9 024 7 $a10.36019/9780813557427 035 $a(CKB)2670000000325686 035 $a(EBL)1117235 035 $a(OCoLC)827208534 035 $a(SSID)ssj0000826784 035 $a(PQKBManifestationID)11525742 035 $a(PQKBTitleCode)TC0000826784 035 $a(PQKBWorkID)10819768 035 $a(PQKB)11746483 035 $a(MiAaPQ)EBC1117235 035 $a(OCoLC)826685286 035 $a(MdBmJHUP)muse25508 035 $a(DE-B1597)529835 035 $a(DE-B1597)9780813557427 035 $a(Au-PeEL)EBL1117235 035 $a(CaPaEBR)ebr10652014 035 $a(CaONFJC)MIL430218 035 $a(EXLCZ)992670000000325686 100 $a20120405d2013 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 04$aThe globalization of supermax prisons$b[electronic resource] /$fedited by Jeffrey Ian Ross ; foreword by Loi?c Wacquant 210 $aNew Brunswick, N.J. $cRutgers University Press$dc2013 215 $a1 online resource (240 p.) 225 0 $aCritical Issues in Crime and Society 225 0$aCritical issues in crime and society 300 $aDescription based upon print version of record. 311 $a0-8135-5740-2 320 $aIncludes bibliographical references. 327 $tFront matter --$tContents --$tForeword: Probing the Meta-Prison --$tAcknowledgments --$tChapter 1. The Globalization of Supermax Prisons --$tChapter 2. The Invention of the American Supermax Prison --$tChapter 3. How Canada Built Its Supermax Prison --$tChapter 4. Supermaxes South of the Border --$tChapter 5. The Growth of the Supermax Option in Britain --$tChapter 6. Analyzing the Supermax Prisons in the Netherlands --$tChapter 7. Super maximum Prisons in South Africa --$tChapter 8. From ?Secondary Punishment? to ?Supermax? --$tChapter 9. The Emergence of the Supermax in New Zealand --$tChapter 10. The Rise of the Supermax in Brazil --$tChapter 11. Guantánamo --$tChapter 12. A Globalized Militarized Prison Juggernaut --$tChapter 13. Conclusion --$tNotes --$tReferences --$tNotes on Contributors 330 $a?Supermax? prisons, conceived by the United States in the early 1980's, are typically reserved for convicted political criminals such as terrorists and spies and for other inmates who are considered to pose a serious ongoing threat to the wider community, to the security of correctional institutions, or to the safety of other inmates. Prisoners are usually restricted to their cells for up to twenty-three hours a day and typically have minimal contact with other inmates and correctional staff. Not only does the Federal Bureau of Prisons operate one of these facilities, but almost every state has either a supermax wing or stand-alone supermax prison. The Globalization of Supermax Prisons examines why nine advanced industrialized countries have adopted the supermax prototype, paying particular attention to the economic, social, and political processes that have affected each state. Featuring essays that look at the U.S.-run prisons of Abu Ghraib and Guantanemo, this collection seeks to determine if the American model is the basis for the establishment of these facilities and considers such issues as the support or opposition to the building of a supermax and why opposition efforts failed; the allegation of human rights abuses within these prisons; and the extent to which the decision to build a supermax was influenced by developments in the United States. Additionally, contributors address such domestic matters as the role of crime rates, media sensationalism, and terrorism in each country?s decision to build a supermax prison. 410 0$aCritical Issues in Crime and Society 606 $aPrisons 606 $aPrison administration 606 $aPrisons$zUnited States 606 $aPrison administration$zUnited States 608 $aElectronic books. 615 0$aPrisons. 615 0$aPrison administration. 615 0$aPrisons 615 0$aPrison administration 676 $a365/.33 701 $aRoss$b Jeffrey Ian$0559729 701 $aWacquant$b Loi?c J. D$0382036 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910463148603321 996 $aThe globalization of supermax prisons$92473883 997 $aUNINA LEADER 06082nam 22007335 450 001 9910586580503321 005 20251225213440.0 010 $a9783031131882 010 $a3031131886 024 7 $a10.1007/978-3-031-13188-2 035 $a(CKB)5850000000052586 035 $a(MiAaPQ)EBC7070165 035 $a(Au-PeEL)EBL7070165 035 $a(OCoLC)1340956904 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/91279 035 $a(PPN)264191188 035 $a(oapen)doab91279 035 $a(DE-He213)978-3-031-13188-2 035 $a(EXLCZ)995850000000052586 100 $a20220805d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Aided Verification $e34th International Conference, CAV 2022, Haifa, Israel, August 7?10, 2022, Proceedings, Part II /$fedited by Sharon Shoham, Yakir Vizel 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (560 pages) $cillustrations (black and white) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13372 311 08$a9783031131875 311 08$a3031131878 327 $aA Billion SMT Queries a Day -- Program Verification with Constrained Horn Clauses -- Formal Methods for Probabilistic Programs Data-Driven Invariant Learning for Probabilistic Programs -- Sound and Complete Certificates for Quantitative Termination Analysis of Probabilistic Programs.-Does a Program Yield the Right Distribution? Verifying Probabilistic Programs via Generating Functions -- Abstraction-Renement for Hierarchical Probabilistic Models -- Formal Methods for Neural Networks Shared Certificates for Neural Network Verification -- Example Guided Synthesis of Linear Approximations for Neural Network Verification -- Verifying Neural Networks Against Backdoor Attacks -- Trainify: A CEGAR-Driven Training and Verification Framework for Safe Deep Reinforcement Learning -- Neural Network Robustness as a Verication Property: A Principled Case Study -- Software Verication and Model Checking The Lattice-Theoretic Essence of Property Directed Reachability Analysis -- A?ne Loop Invariant Generation via Matrix Algebra -- Data-driven Numerical Invariant Synthesis with Automatic Generation of Attributes -- Proof-guided Underapproximation Widening for Bounded Model Checking -- SolCMC: Solidity Compiler's Model Checker -- Sharygina Hyperproperties and Security Software Verication of Hyperproperties Beyond k-Safety -- Abstraction Modulo Stability for Reverse Engineering -- A Modular and Highly Extensible API Fuzzer for SMT Solvers -- Automata and Logic FORQ-based Language Inclusion Formal Testing -- Sound Automation of Magic Wands -- Divide-and-Conquer Determinization of Büchi Automata based on SCC Decomposition -- Complementing Büchi Automata with Ranker -- Deductive Verication and Decision Procedures Even Faster Conicts and Lazier Reductions for String Solvers -- Local Search For SMT on Linear Integer Arithmetic -- Reasoning about Data Trees using CHCs -- Veried Erasure Correction in Coq with MathComp and VST -- Appel End-to-end Mechanised Proof of an eBPF Virtual Machine for Microcontrollers -- A DSL and Verication Tools to Guide Design and Proof of Hierarchical Cache-Coherence Protocols -- Machine Learning Specication-Guided Learning of Nash Equilibria with High Social Welfare -- Synthesizing Fair Decision Trees via Iterative Constraint Solving -- SMT-based Translation Validation for Machine Learning Compiler -- Lee Verifying Fairness in Quantum Machine Learning -- MoGym: Using Formal Models for Training and Verifying Decision-making Agents -- Synthesis and Concurrency Synthesis and Analysis of Petri Nets from Causal Specications -- Verifying generalised and structural soundness of workow netsvia relaxations -- Capture, Analyze, Diagnose: Realizability Checking of Requirements in FRET -- Information Flow Guided Synthesis -- Randomized Synthesis for Diversity and Cost Constraints with Control Improvisation. 330 $aThis open access two-volume set LNCS 13371 and 13372 constitutes the refereed proceedings of the 34rd International Conference on Computer Aided Verification, CAV 2022, which was held in Haifa, Israel, in August 2022. The 40 full papers presented together with 9 tool papers and 2 case studies were carefully reviewed and selected from 209 submissions. The papers were organized in the following topical sections: Part I: Invited papers; formal methods for probabilistic programs; formal methods for neural networks; software Verification and model checking; hyperproperties and security; formal methods for hardware, cyber-physical, and hybrid systems. Part II: Probabilistic techniques; automata and logic; deductive verification and decision procedures; machine learning; synthesis and concurrency. This is an open access book. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13372 606 $aSoftware engineering 606 $aArtificial intelligence 606 $aComputer engineering 606 $aComputer networks 606 $aComputer science 606 $aSoftware Engineering 606 $aArtificial Intelligence 606 $aComputer Engineering and Networks 606 $aTheory of Computation 615 0$aSoftware engineering. 615 0$aArtificial intelligence. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aComputer science. 615 14$aSoftware Engineering. 615 24$aArtificial Intelligence. 615 24$aComputer Engineering and Networks. 615 24$aTheory of Computation. 676 $a005.1 700 $aShoham$b Sharon$4edt$01354848 701 $aVizel$b Yakir$01255148 702 $aShoham$b Sharon 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910586580503321 996 $aComputer aided verification$93358454 997 $aUNINA