pred_label
stringclasses
2 values
pred_label_prob
float64
0.5
1
wiki_prob
float64
0.25
1
text
stringlengths
148
1.01M
source
stringlengths
39
45
__label__wiki
0.70645
0.70645
Current Issue Blog About Submissions Login International Affairs Political Science Business & Communications Psychology Economics All Topics - Call for Submissions - Political Science International Affairs Business & Communications Psychology Economics Education Sociology Anthropology Women's & Gender Studies Criminology & Criminal Justice African-American Studies Linguistics Literature History Philosophy Opinion Law & Justice Theology Book Reviews Film & Media Visual Arts Music Architecture Theatre Environmental Studies Health Science Biology Neuroscience Computer Science Russia Vladmir Putin Foreign Policy International Relations Kremlin Authoritarianism Natural Resources Orange Revolution From Cornell International Affairs Review VOL. 2 NO. 2 Aggressive Foreign Policy as an Instrument for the Legitimization of Putin's Regime: Georgia's Case By Vladimir Shlapentokh Cornell International Affairs Review 2009, Vol. 2 No. 2 | pg. 2/2 | « Cite References Print Russia's Greedy Elite: A Chance to Stop the Deterioration In using the imperial ideology and aggressive foreign policy, the Kremlin is concerned not only about public support. The loyalty of the elite is of special importance to the Kremlin. The absolute majority of the elite is politically passive and do not participate in the decision making process in the Kremlin. At best they can play the role of advisers. However, the Kremlin is deeply concerned about the loyalty of "the passive elite," because its members help to maintain the regime, control the army and the FSB, and run public propaganda. The elite includes most of the state apparatchiks at high levels, the FSB and military commanders, the members of the parliament, and leading media figures—a group that includes no more than 1,000 to 1,500 people. Most members of the elite clearly enjoy the patriotic ecstasy along with ordinary people. They are happy with the Kremlin's antidemocratic actions, since only the authoritarian regime is able to guarantee their privileges and preserve their illegal fortunes. At the same time, many members of the elite are rather critical of the rude confrontation with the West. We can speculate, following the view of the famous Moscow journalists Yulia Kalinina and Andrei Riabov, that the elite, given their close material ties to the West (a Russian journalist referred to them contemptuously as the "offshore elite"26) are sizzling with repressed anger against the Kremlin's policy. These people, as Kalinina writes, not without irony, are afraid to be cut off from their "honestly acquired villas in Spain, mountain ski resorts in France, yachts in the Mediterranean, and London boutiques."27 These people already, in various ways, feel the consequences of the West's animosity toward Moscow's policy. A pro-governmental journalist described in Izvestiia how unfriendly London became toward Russian travelers after the war.28 The ability of the critical members of the elite, who hide their views from the public and perhaps even from friends, to encourage the Kremlin to change its harsh anti-Western position without endangering their positions is very limited. Only under propitious circumstances can they persuade the Kremlin, using the personal interests of Putin and his circle as an argument, to move politics in a different direction. We can only guess what was going on behind the Kremlin walls in the last weeks of September and what persuaded Putin and his partner in power to relent, somewhat, in their aggressive tone against Europe. They continued, however, as Medvedev's speech in Evian (October 8) showed, to lambast the United States as the major villain, accountable for all evils in the world, economic and political.29 Both leaders started inviting foreign media experts for various meetings, during which they tried to soften their position and presented Russia as a pure victim of the crazy Georgian president.30 The Kremlin showed its delight as it hosted foreign dignitaries, including the Spanish and German prime ministers. With special fervor, the Kremlin tried to foment, as Brezhnev did in the 1970s, the discord between the United States and Europe, and demonstrated good relations with Sarkozy. The Kremlin does not miss an opportunity to declare that a new Cold War is impossible, which contrasts with what they said a few weeks before. Downgrading the shrill anti-Western tone in their propaganda, the Kremlin has not, however, retreated from its position of confrontation with the world, which is important for perpetuating its deeply antidemocratic regime. The big injection of anti-Americanism during the war will affect the minds of Russians for a long time. The Drop in Oil prices and Changes in Moscow In view of the crucial role of high oil prices in Putin's domestic and international policy, as discussed above, the sudden fall in prices, along with the economic and financial crisis, had an enormous impact on the Kremlin. The shift from complacency in the aftermath of the war with Georgia to apprehension occurred in October. The Kremlin felt the tremors of danger only when it discovered the negative impact of the war on its economy. The catastrophic decline in the value of its stock market and the flight of capital started before Russia began to feel the influence of the growing world financial crisis, which multiplied the troubles in the financial markets. By mid October, the value of Russian stocks fell by 70 percent in comparison with early May.31 However, it was the fall of oil prices and other raw materials that delivered the most painful blow to the regime. Indeed, oil prices fell from $145 to $34 per barrel at the end of December. Meanwhile, raw materials made up 80 percent of the export revenues and one third of the budget.32 The fall in the value of the ruble against the dollar was also very painful for millions of Russians who kept their savings in national currency. The Kremlin toned down somewhat its aggressive propaganda against the West and even against Georgia. For instance, Moscow resumed its issuing of entry visas to Georgian citizens.33 Even during the gas war with Ukraine, during which Russia tried to show its strength, Moscow behaved relatively calmly. However, only a few observers believe that the fall of oil prices could radically change Putin's aggressive foreign policy so important for him for ideological reasons. The West should be prepared to deal with an authoritarian regime that is ready to do anything to protect itself against its internal enemies. The Kremlin will continue to need foreign enemies. It will also remain prone to show the Russian public its success in confronting its neighbors and the United States. As a liberal journalist suggested, Russia became "an unpredictable state," which "can defy its own international obligations."34 The world can only hope that, with the lessons from the war against Georgia, the Kremlin will be more cautious when it looks for a new opportunity to show its imperial ambitions. Professor Vladimir Shlapentokh, Professor of Sociology, Michigan State University Matt Siegel, “Saakashvili denies ex-diplomat’s claims,” Associated Press, November 28, 2008. See the report of Human Rights Watch in The New York Times, January 24, 2009. Georgii Bovt, “Ofshornaia aristokratiia vse profukaiet?” Izvestiia, August 21, 2008. Fedor Luk’ianov, “Seven theses prompted by the Russia-Georgia conflict,” RFE/RL, August 26, 2008. See, for instance, the interview of Leonid Radzikhovskii with Ekho Moskvy on August 22, 2008. No Author, “Ne ochen’ “kholodnaia voina,” Rossiiskie Vesti, August 20, 2008. See Vladimir Putin’s interview in Lenta.ru, August 30, 2008. Maksim Bashkeev, “Prezidentskii otvet,” Tribuna, August 28, 2008. Anna Kaledina and Sergei Leskov, “Ot chego Rossiia mozhet izolirovat’ Zapad?” Izvestiia, August 26, 2008. Liliia Shevtsova, “Konets epokhi: Logika osazhdennoi kreposti,” Vedomosti, September 24, 2008. Vladislav Surkov, “Suverenitet – eto politicheskii sinonim konkurentosposobnosti,” Moskovskie Novosti, March 10, 2006. See the interview of Kungarkin, the editor of the pro-Kremlin Komsomol’skaia Pravda, with Ekho Moskvy, August 20, 2008. Iosif Stalin, Voprosy Leninizma, Moscow: Gospolitizdat, 1952, pp. 603-650. Yurii Andropov, Izbrannyie rechi i stat’i, Moscow: Politizdat, 1983, pp. 209-218. Vladimir Milov and Boris Nemtsov, “Putin i ‘Gazprom’,” Novaia Gazeta, August 31, 2008. Sergei Leskov, “Mozhet, my i vsiu Rossiiu sumeem vyvesti v sploshnoi “Zenit”?” Izvestiia, May 16, 2008. Natal’ia Malakhova, “Bilan v “zenite,” Novaia Gazeta, May 29, 2008. Artur Gasparian, “Russia, Hello!” Moskovskii Komsomolets, May 30, 2008. Stanislav Tarasov, “Natsional’nyi interes. Velikaia ‘vosmerka’,” Rossiiskie Vesti, July 19, 2006. See Putin’s speech at the Munich Conference on Security at http://www.securityconference.de/konferenzen/rede.php?sprache=en&id=179, accessed September 30, 2008. No author, “Moskva - Washingtonu: ne uchite nas s kem druzhit’ i s kem spat’,” Izvestiia, July 30, 2008. Dmitry Medvedev, “Zaiavlenie i otvety na voprosy zhurnalistov na press-konferentsii po itogam rossiisko-ispanskikh peregovorov, October 1, 2008 (available at http://kremlin.ru/appears/2008/10/01/2140_type63377type63380_207123.shtml, accessed October 3, 2008). Yuliia Kalinina, “Gruzinskaia mama protiv rossiiskogo papy,” Moskovskii Komsomolets, September 4, 2008. Alexander Lifshits, “Yesterday,” Izvestiia, August 6, 2008. See, for instance, Hugo Chavez’s speeches in Diario Vea, July 3, 2008, and in Diario Las Últimas Noticias, August 29, 2008. Yuliia Kalinina, “Chem otvetit Zapad,” Moskovskii Komsomolets, August 29, 2008; Andrei Riabov, “Pobeda ne prikhodit odna,” Novaia Gazeta, September 14, 2008. Mikhail Ozerov, “‘Medvedia’ – na golodnyi paek,” Izvestiia, September 16, 2008. Dmitry Medvedev, “Vystuplenie na konferentsii po mirovoi politike,” October 8, 2008 (available at http://www.kremlin.ru/appears/2008/10/08/1619_type63374type63377type82634_207422.shtml, accessed October 10, 2008). See Dmitry Medvedev’s press-conference speech, “Sovmestnaia press-konferentsiia s Federal’nym kantslerom Germanii Angeloi Merkel’ po itogam rossiisko-germanskikh mezhgosudarstvennykh konsul’tatsii,” October 2, 2008 (available at http:// www.kremlin.ru/appears/2008/10/02/2156_type63377type63380_207176.shtml, accessed October 10, 2008). Segei Kulikov, “Glubina padeniia. Pochemu birzhi v Rossii upali v dva-tri raza sil’nee, chem v drugikh stranakh,” Nezavisimaia Gazata, October 10, 2008; No author, “Rossiiskie aktsii padaiut vsled za vsem mirom,” IFX.RU, December 12, 2008, available at http://www.ifx.ru/txt.asp?rbr=1494&id=1031322, accessed December 10, 2008. Federal’naia Sluzhba Gosudarstvennoi Statistiki, Rossiiskii Statisticheskii Ezhegodnik, 2007, Moscow: Rosstat, 2007, p. 756; Dmitrii Polonskii, “Minekonomiki nedootsenilo obval,” Den’gi, December 15, 2008. Ol’ga Allenova, “Rossiia vozobnovliaet postavki viz v Gruziiu,” Kommersant. Daily, January 20, 2009. Dmitry Oreshkin’s interview with Moskovskii Komsomolets, September 2, 2008. Photos courtesy of: “Protest in Independence Square.” Wikipeadia. 6 April 2009.<http://en.wikipedia.org/wiki/Orange_Revolution> “Natural Gas Pipeline Map.” Wikipeadia. 6 April 2009.<http://en.wikipedia.org/wiki/File:RUGasPipesMap.jpg> Save Citation » (Works with EndNote, ProCite, & Reference Manager) APA 6th Shlapentokh, V. (2009). "Aggressive Foreign Policy as an Instrument for the Legitimization of Putin's Regime: Georgia's Case." Cornell International Affairs Review, 2(2). Retrieved from http://www.inquiriesjournal.com/a?id=1306 Shlapentokh, Vladimir. "Aggressive Foreign Policy as an Instrument for the Legitimization of Putin's Regime: Georgia's Case." Cornell International Affairs Review 2.2 (2009). <http://www.inquiriesjournal.com/a?id=1306> Chicago 16th Shlapentokh, Vladimir. 2009. Aggressive Foreign Policy as an Instrument for the Legitimization of Putin's Regime: Georgia's Case. Cornell International Affairs Review 2 (2), http://www.inquiriesjournal.com/a?id=1306 SHLAPENTOKH, V. 2009. Aggressive Foreign Policy as an Instrument for the Legitimization of Putin's Regime: Georgia's Case. Cornell International Affairs Review [Online], 2. Available: http://www.inquiriesjournal.com/a?id=1306 This article was published in A publication of Cornell University From This Issue (Vol. 2 No. 2) Financial Crisis and Regulatory Challenges In Praise of Populism: The Coming Reconstruction of Financial Regulation The Case for America's Continued Superpower Status United States Policy and Latin America: An Interview with Former Secretary General of the Organization of American States Gaza in Crisis: Obama's Foreign Policy in the Aftermath of Renewed Conflict Can Kosovo be a Precedent for South Ossetia and Abkhazia: Recognizing Differences in Dynamics of Recognition A Solution for Africa: The Coexistence of Regionalism Human Rights in Indonesia: The Consequences of Discrepancies in Domestic Versus International Law From the Inquiries Journal Blog Political Science » Comparative Politics From Proto-State to Para-State Accountability: Russian Political Regimes Under Yeltsin, Putin, and... Political Science » Russia The Modern Foreign Policy of Russia Campaign of Devastation: Assessing Motives for the Russian Government's 1999-2000 Destruction of Chechnya... Disappearance and Death: The Fate of Chechen Human Rights Activists JournalQuest is a free program to help academic student publications increase online readership and distribution. If you are interested in enrolling a journal at your school, please visit the JournalQuest website. Monthly Newsletter Signup The newsletter highlights recent selections from the journal and useful tips from our blog. Follow us to get updates from Inquiries Journal in your daily feed. Follow @inquiriesjourn Suggested Reading from Inquiries Journal From Proto-State to Para-State Accountability: Russian Political Regimes Under Yeltsin, Putin, and Medvedev When on September 24th, 2011 Russian prime minister Vladimir Putin announced his bid to run for president in the presidential elections in March 2012, a supposition in Russia's political regime was confirmed that many... MORE» Over the two decades of post-Soviet history of modern Russia, its foreign policy has gone through several distinct periods and long-term trends. The periodization of the new Russia’s foreign policy includes a “romantic” or “Kozyrev’s” period, during which the leaders of a democratic Russia tried... MORE» Campaign of Devastation: Assessing Motives for the Russian Government's 1999-2000 Destruction of Chechnya In 1999, the Russian government all but razed Chechnya’s capital city of Groznyy. The Russian military devastated Chechnya, killing thousands of civilians and wiping out vital infrastructure, signifying the capstone... MORE» The Republic of Chechnya in Russia’s North Caucasus region has drawn significant attention for being host to remarkable instability, thriving terrorism, and a staggering display of human rights violations over the past two decades, including torture, illegal imprisonment, and extrajudicial execution. Perhaps even more disturbing... MORE» Inquiries Journal provides undergraduate and graduate students around the world a platform for the wide dissemination of academic work over a range of core disciplines. Representing the work of students from hundreds of institutions around the globe, Inquiries Journal's large database of academic articles is completely free. Learn more | Blog | Submit Follow SP Latest in Political Science 2019, Vol. 11 No. 03 Fringe Religion & the Far-Right: Dangerous Behavior Patterns Among Christian Millennialists By Naomi E. Pearson Radical thinking among the far-right is a growing security problem for modern western society. Over the past several decades anti-government ideologies have been gaining legitimacy due to controversial interactions between Millennialist fringe religious... Read Article » Religion Extremism White Supremacy Racism Counter Racism Security Radicalization Far-Right Climate Change as a Security Issue in the Indo-Pacific Region: Borders, Environmental Phenomena and Preexisting Vulnerabilities By Billie R. Trinder In recent years, climate change has been increasingly framed as a security issue, with some theorists going so far as to call it the most important security issue of the 21st century. This paper will examine the relationship between climate change... Read Article » Climate Change International Security Borders Human Migration Bangladesh India China Slavery to Self-Liberation: The Haitian Revolution in Marxist Theory By Alexander J. Clegg The Haitian Revolution of 1791 – 1804 was a successful slave rebellion in the French colony of Saint-Domingue that began in the wake of the French Revolution and went on to influence subsequent liberation movements for decades to come. The... Read Article » Haiti Revolution Slavery Marxism Rosa Luxemburg The Black Jacobins Rebellion Populist Mobocracy, Fear, and Lies: The Politics of American Populism By Anthony R. Brunello American politics today operates in an arena where truth and objective reality are bent to the designs of particular interests, powerful people and commercial profiteers. All facts are questioned; the truth has purposes. Populist and nationalist... Read Article » Populism Political Communication Tribal Politics Political Theory American Politics Donald Trump Women & Globalization: The Impact of Increased Women's Economic Rights on Globalization By Liam F. Kerr Globalization is generally studied as a process that extensively impacts nations and peoples across every aspect of society. Empirical and theoretical research largely focuses on this effect, seeking to discover the impact of an increasingly globalized... Read Article » Globalization Women's Rights Political Economy International Trade Foreign Direct Investment A State of Illegitimacy: The Dynamics of Criminal and State Legitimacy in Mexico By Benjamin J. Mackey The following paper seeks to elucidate the complex processes involved in the Mexican State’s loss of authority and the subsequent acquisition of this authority by armed criminal groups operating in that country. In theoretical terms, this... Read Article » Mexico Failed States Transnational Criminal Organizations State Authority Legitimacy Power Sovereignty Explaining the Rise of Populism in Poland: The Post-Communist Transition as a Critical Juncture and Origin of Political Decay in Poland By Phillip S. Swallow The Polish populist Law and Justice Party (PiS) overturned the mainstream consensus in Polish politics by returning to power in 2015 with a populist platform, decrying a selfish elite and advancing policies that critics saw as illiberal and authoritarian... Read Article » Comparative Politics Poland Institutions Governance Populism State Capture Political Decay European Politics Inquiries Journal Tweets by @inquiriesjourn Print Cite Share + References Page Top « Prev Page - Call for Submissions - + The copyright to this article and other articles from JournalQuest are maintained by the publishing journal and/or the individual authors according to agreements set forth by and between the publishing journal and the author. Other materials © 2020 Student Pulse, LLC. All rights reserved. ISSN: 2153-5760. Disclaimer: content on this website is for informational purposes only. It is not intended to provide medical or other professional advice. Moreover, the views expressed here do not necessarily represent the views of Inquiries Journal or Student Pulse, its owners, staff, contributors, or affiliates. Home | Current Issue | Blog | Archives | About The Journal | Submissions Terms of Use :: Privacy Policy :: Contact Before you can login, you need to create an account. It takes just a minute! Forgot password? Reset your password »
cc/2020-05/en_middle_0097.json.gz/line1418181
__label__cc
0.643299
0.356701
Page 4 of 27 < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 > Last » 21st April 2019, 06:09 AM #121 You have not been keeping up. They've held 53 of them in the 2½ years. 16 of them have been in stadiums. https://en.wikipedia.org/wiki/List_o..._Trump_rallies And this is why people who aren’t nazis are worried about what you’re willing to do to “nazis”. So is that what passes for nazis nowadays ? My, how times have changed. That must make the Democrats communists. No, it doesn’t work that way. Voting for an actual communist doesn’t make you a communist, but supporting Israel makes you a Nazi. To be fair, not all of those people are Neo Nazis. Most of them are just garden variety racists and assorted cretins. To show the large Nazi rallies it's better to go here. Or don't, if the aim is to minimize the danger of the extreme right, as seems to be the case of certain posters. Last edited by uke2se; 21st April 2019 at 07:57 AM. Oh, you were talking about Nazis? My bad!! I thought you were talking about racists, bigots and white supremacists. Originally Posted by uke2se It is quite disturbing to see how many of these vile groups of bastards there are in the USA.... and these are the people that some posters here would like to see given every opportunity to spread their vileness. Meanwhile, when a violent group at the other end of the political spectrum has their so-called free speech rights infringed, we get crickets! This speaks volumes! sadhatter Over the past 6 months how many muslims have racists in America killed? Now how many have extremist muslims in Muslim ran countries killed? Seems to me if we are worried about brown folks we are trying to flush the wrong end of the turd. Find More Posts by sadhatter Yep, I was talking about nazis, that's why I used the word "nazi" in post #104 Yes, not advocating violence is usually a fairly clear line (although would people advocating for the US entrance into WW2 against Germany cross that line?). Except almost all the discussion here justifying the banning is based on the identity of the people who were banned, and not the specific content of whatever they posted. In fact, I don't think I've seen a single reference to any posted content which violated Facebook's policies. So I don't really believe that that's actually the line which is being drawn. It smells a whole lot like "offensive speech is violence". Are there not terms and conditions for Facebook? That one ages to by clicking? Seems that if a bunch of people signed up for a gym membership for a year, then get told 6 months in that it is only a Christian gym, there would be some issues. Not saying there is legal ground, but it is morally dubious at best. The bar for who counts as a Nazi has been lowered considerably as of late. ETA: and does being a communist also mean you advocate violence? Last edited by Ziggurat; 21st April 2019 at 02:22 PM. 1. Nazis 2. White supremacists 3. Racists 4. Bigots 5. Antifa These all fall under the same bar IMO, but I have noticed that there are only ever "b-b-b-but what about their Free Speech rights" complaints when any of the first four are booted off a platform like Facebook or twitter or you-tube. It can do. Ever heard of the Red Brigades? Rote Zora? Earth Liberation Front? Action Directe? Black Liberation Army? Japanese Red Army? The Communist Party of India? FARC? For mine, this lot also fall under the bar and if they are on platforms like Facebook, ought to be removed. Last edited by smartcooky; 21st April 2019 at 02:44 PM. How is it morally dubious? As I've said before we rarely allow stupidity to be an excuse in regards to breaking the law, if someone who isn't a Nazi is stupid enough to claim to be a Nazi that is their problem not mine. Calling oneself "The Young Turks" certainly means you advocate for violence and genocide. Violence and genocide is part and parcel of the Young Turks. tyr_13 Whataboutism. False dichotomy. Leading statement. Do you think this policy of Facebook only applies in America? Do you think it is within Facebook's power to address killings in 'Muslim ran' countries? Do you think that Facebook taking this action in absolutely any way even hinders other actions in other countries? Do you think America should be held to a lesser, equal, or greater standard than other countries by Americans? My evaluation is that it is absolutely possible to care about both the rise and power of far right groups in the US and about religious governments (even specifically Muslim ones) at, get this, the same time. Your reasoning looks to be all over the place. Try refining your objection to the subject at hand. Circled nothing is still nothing. "Nothing will stop the U.S. from being a world leader, not even a handful of adults who want their kids to take science lessons from a book that mentions unicorns six times." -UNLoVedRebel Mumpsimus: a stubborn person who insists on making an error in spite of being shown that it is wrong Find More Posts by tyr_13 I'm talking about people who don't claim to be Nazis who are labeled as Nazis. And you didn't answer my question about Communists. Individual claims should be based on their merits, even if reality means one group is consistently more wrong than another. I'm talking about people who don't claim to be Nazis who are labeled as Nazis.. If you side with Nazis and/or attend protests alongside Nazis and/or spout the beliefs of Nazis such as - "Blut und Boden" and "The Jews will not replace us", and carry the regalia of Nazism... ... then you are calling yourself a Nazi, and you ARE a Nazi in every way that matters! https://upload.wikimedia.org/wikiped...14%29_crop.jpg Do you think that is an accurate representation of Trump’s rallies? And are you a communist if communists join your protest against, say, the Iraq war? How easy does this association rub off? Has FB banned all Trump supporters? It has banned people who didn’t violate their terms of service for apparently having conservative opinions. Well I wasnt. I find it hard to believe FB is banning people for right-wing views alone. Sure, there are other reasons: someone complained, and whoever Facebook has handling this stuff didn’t like them. That doesn’t apply to everyone with conservative opinions, but that doesn’t make it not a problem. I think is is a fair representation of the attitudes of a significant proportion of Trump supporters. Have you heard Trump, at one of his rallies, say how he condones violence; how he would punch out people who disagree with him, how he invited attendees to beat up hecklers and offered to pay their legal fees if they would? Did you hear how all his disciples cheered when he did that? Nothing wrong with being politically right-wing such as an ultra-conservative, but there is everything with being a right-wing proponent of violence. Nothing wrong with being politically left-wing such as a communist, but there is everything with being a left-wing proponent of violence. If I was participating in a protest against the Irag war, and I was joined by communists, that would not make me a communist, but if I was joined by Antifa, then I would expect them to leave, and if they didn't then I would leave, because by remaining, I would be showing solidarity with them, and associating myself with them and that would make me Antifa in all but name. Sure, there are other reasons: someone complained, and whoever Facebook has handling this stuff didn’t like them. .... ...and they were tied to a group pushing violence. Of course maybe you don't think someone bashing immigrants and Muslims counts as potential violence. Just as I suspected, you have a different view of some of these groups and issues, Zig. Facebook and Instagram are banning white nationalism and separatism - They will prohibit praise, support and representation of the ideologies. "We decided that the overlap between white nationalism, separatism, and white supremacy is so extensive we really can't make a meaningful distinction between them," Brian Fishman, Facebook's counterterrorism policy director, told Motherboard. "And that's because the language and the rhetoric that is used and the ideology that it represents overlaps to a degree that it is not a meaningful distinction." I can see why you think that's just about ideology. But others (including me) think you can't segregate the ideology from the violence they support, 2nd Amendment solutions and all that. Are you going down that speech-is-violence road ? That somebody voicing their opposition to illegal immigration has the potential for actual violence and should be banned ? Not just communists: Full on secret police having, gulag running, kulak killing, mass murdering Stalinists. That's not quite true - it's actually even worse. So-called "free speech advocates" often are silent even when explicitly *nonviolent* views on the left are targeted by government officials (eg. Black Lives Matter, UC Berkley, Refuse Fascism), and such groups are often smeared as "terrorists" or "hate groups" by the same people. We've also seen multiple people assault protestors or journalists at Dolt 45's hate rallies, after the idiot repeatedly suggested violence as an appropriate response. Cheeto Benito has also embraced a congressman that attacked a reporter in response to a rather mild question. Last edited by Mumbles; 21st April 2019 at 06:27 PM. Find More Posts by Mumbles Where are you going to draw the line? A bunch of idiots marching with Tiki torches chanting blood and soil? Free speech. One of them driving into a crowd killing a woman? Ban that guy from FB. Then you are essentially giving fringe groups a veto over your causes. And most people aren’t going to do that. And how is communism ultimately any different? Because it isn’t. Darat claims you can’t separate Nazism from violence. Why is communism any different?.... Based on current events the difference is clear. Back in the 60s when the Weather Underground was bombing various targets, then you might have a case. Also, currently I would have no issue with FB banning PETA. First, they came for the Alt-right, then they came for the far-right, next they got the Klan....... That was actually a direct question. Can speech that doesn't specifically call for violence be classed as violence ?
cc/2020-05/en_middle_0097.json.gz/line1418182
__label__cc
0.716356
0.283644
KIERON MOORE FREELANCE WRITER. JOURNALIST, AND SCRIPT READER – FAN OF SCI-FI AND CHOCOLATE DIGESTIVES – YSTV'S BEST DRESSED MEMBER 2013 The Crow Scarer Book Review: The Black Archive - Rose On 24.3.16 by KieronMoore in doctor who, Russell T Davies, Starburst No comments Longer review on Starburst. With over fifty years of history, and as many bumps in the road as there have been changes in style, Doctor Who is a fascinating series to analyse – and certain stories are more intriguing than others. It’s with this in mind that Obverse Books have begun their series The Black Archive, in which each publication will spend twenty to forty thousand words picking apart a single televised story. And what better story to start on than that which brought Doctor Who back to TV screens after a sixteen-year hiatus, and set the groundwork for the popular phenomenon it would soon become? This hundred-page volume from Jon Arnold comprises of four essays analysing Russell T Davies’ 2005 series opener Rose and its place within Who history. First, Arnold explores Rose as a starting point for new viewers, comparing it to the successful simplicity of An Unearthly Child and the not-so-successful 1996 TV movie. Next, he analyses Davies’ take on the character of the Doctor, and the decision to give him some proper character development, perhaps inevitable given the changes in genre TV since 1989. Third, Arnold talks about the character of Rose Tyler and Davies’ success in making the companion an equal to the Doctor in terms of dramatic possibilities. And in the final chapter, he discusses Davies himself, and how the writer’s crossing of populist sensibilities and artistic ambition crafted Doctor Who into the massive success it became. Though it’s not a long book, and can be read in one easy afternoon, the first Black Archives instalment has a lot of interesting things to say about its episode of choice and what made it so successful. For those not so keen on Eccleston’s Doctor, Obverse are releasing three other titles this month, covering The Massacre, The Ambassadors of Death, and Dark Water/Death in Heaven – all the way from Hartnell to Capaldi! There are so many more Who stories worthy of this kind of quality criticism, so we’ll be looking out for what’s next. Star Wars: The Rise of Skywalker - Review [This review contains spoilers. If you want a spoiler-free review, there are enough out there.] In 2015, when the popular opinion o... DVD Review: The Spring River Flows East Full review on Starburst. “How much sorrow can one man have to bear? As much as a river of spring water flowing east” goes the poe... Spectre - Spoiler-Filled Notes There are a lot of non-spoiler reviews out there already for new Bond film Spectre , so I thought it’d be more interesting to go straight i... Doctor Who: It Takes You Away - Review I’ll put my cards on the table right away and say I love it when Doctor Who goes full-on ‘frog universe’ level weird. This was especia... Reviews Round-Up - May 2019 I haven't posted on here for a while, as life has been pulling me in all its many directions, but I thought it time to round up the l... Daredevil - Spoiler-Filled Season Two Review DVD Review: Tangerine Audio Review: Doctor Who - The Paradox Planet Starburst 423 - Out Now! Blu-ray Review: The City of Lost Children Film Review: Spotlight Audio Review: Doctor Who - The Labyrinth of Buda C... Doctor Who Adventures 12 - out now! KieronMoore Hi there. I'm Kieron. I write some things, including some about Doctor Who and some about films. Graphic novel about the Buddha out now. Copyright © KIERON MOORE
cc/2020-05/en_middle_0097.json.gz/line1418184
__label__wiki
0.687031
0.687031
"Bart Prank Calls Moe - Al-Coholic" Posted by Clint Teeters at 5:56 PM No comments: Labels: Alcohol Machinery Row Dear Racine County Supervisors, In case you missed the Event where Talking Racine addressed the Machinery Row debacle - Cindy and I covered it here; https://arrestrecordsofracinewipublicofficials.wordpress.com/2018/02/24/bureaucrats-gone-wild-in-racine-wi/ The Authority of government officials is statutorily LIMITED. When they act outside of those bounds – they act ILLEGALLY – under the Color of Law – and in the City/County of Racine – it appears that the level of acceptable and tolerated abuse is OUTRAGEOUS! City of Racine doesn’t suffer from “Poor Leadership” – it suffers from CRIMINAL BUREAUCRATS and a total lack of LEADERSHIP- in collusion with Racine County DA Tricia Hanson! When will it be contained? Tim & Cindy Posted by Clint Teeters at 5:14 AM No comments: "San Francisco’s ‘Diseased Streets’ Are Being Compared to Some of Worst Slums in the World" By Joe Setyon February 21, 2018 at 6:37am A combination of discarded needles and piles of feces on the streets of San Francisco has caused least one expert to say that the city’s slums are comparable to those in developing countries. Reporters with KNTV investigated what they referred to as the “diseased streets” of the city, and found that each of the 153 downtown blocks they surveyed — an area that encompasses playgrounds, hotels and government buildings — is littered with garbage. Included in this trash were at least 100 drug needles and 300 piles of feces. Dr. Lee Riley, an infectious disease expert at the University of California, Berkeley, warned that not only do the needles cause viral diseases such as HIV and Hepatitis, but dried fecal matter can release airborne viruses like the rotavirus. “If you happen to inhale that, it can also go into your intestine,” he said, leading to potentially fatal results. Riley, who has researched and written about conditions in slums across the world, believes that some parts of San Francisco may be worse than the world’s dirtiest slums. The Western Journal Daily Email Breaking news updates and daily headlines from a news source you can trust. “The contamination is … much greater than communities in Brazil or Kenya or India,” he said, while pointing out that in those countries, slums often serve as long-term housing, and thus, their residents work to maintain them. But in San Francisco, he suggested that the homeless do not make an effort to keep the streets clean because they are forced to move around frequently. The situation on the streets of San Francisco is particularly dangerous for children. “We see poop, we see pee, we see needles, and we see trash,” said Adelita Orellana, a preschool teacher. “Sometimes they ask what is it, and that’s a conversation that’s a little difficult to have with a 2-year old, but we just let them know that those things are full of germs, that they are dangerous, and they should never be touched.” Do you think spending more money on the homeless will solve this issue? Completing this poll entitles you to The Western Journal news updates free of charge. You may opt out at anytime. You also agree to our Privacy Policy and Terms of Use. A’Nylah Reed, a 3-year-old preschooler, explained that “the floor is dirty,” making her walk to school difficult. “There is poop in there,” she said. “That makes me angry.” Reed’s mother, meanwhile, noted that she often has to physically intervene to ensure that her daughter doesn’t step on needles or human feces. Some city officials are convinced that the solution is to provide short-term housing for the city’s homeless population. “Unacceptable. Absolutely unacceptable,” said city Supervisor Hillary Ronen. “We’re losing tourists. We’re losing conventions in San Francisco. All of this is happening because we aren’t addressing the root cause, which is we need more temporary beds for street homelessness.” The city currently has about 2,000 temporary beds, but Rosen believes about 1,000 more are needed, KNTV reported. This would likely cost roughly $25 million. “We need to find a source of revenue,” she said. “Whether that’s putting something on the ballot to raise business taxes or taking a look at our general fund and re-allocating money towards that purpose and taking it away from something else in the city.” Regardless, Ronen said the situation in San Francisco is a human “tragedy.” “We’re not going to make a huge dent in this problem unless we deal with some underlying major social problems and issues,” she stated. “There’s a human tragedy happening in San Francisco.” Until a permanent solution is decided upon, all the city can do is remove feces and needles from the streets, an effort that cost about $30 million in the 2016-2017 fiscal year, according to Public Works Director Mohammed Nuru. Removing just one pile of human waste takes a half an hour, Nuru said. “The steamer has to come. He has to park the steamer. He’s got to come out with his steamer, disinfect, steam clean, roll up and go,” he explained. The dirty streets in San Francisco haven’t stopped it from being ranked among the most beautiful in the world. But the city is also one of the most expensive in the U.S., with Fox News noting that this accentuates a large “gap between the haves and have-nots.” What do you think? Scroll down to comment below. Posted by Clint Teeters at 5:08 AM 1 comment: '"He Never Went In' Officer On Duty Filmed "Doing Nothing" During Florida Shooting Video evidence reveals that an armed Broward County resource deputy stationed at Stoneman Douglas High School during the Valentine's day massacre did "nothing" during the shooting - instead waiting outside as a gunman opened fire on students and teachers, killing 17. Speaking at a press conference, Broward Sheriff Scott Israel said the on duty officer at Stoneman "never went in." Israel said he was "devastated" after watching the video showing the deputy taking a position outside the Western side of Building 12 while shots rang out, "and he never went in" despite having a clear view of the entrance. "I think he remained outside upwards of four minutes," Israel said. The uniformed officer, identified as Scot Peterson, was been suspended without pay pending an investigation, according to Broward County Sheriff Scott Israel - however he has since resigned and retired from the department. "As is his right, Scot Peterson chose to resign, because he has the necessary time with the agency and meets the requirements of retirement, he resigned and retired." "We're not going to disclose the video at this time, and we may never disclose the video depending on the prosecution and the criminal case." "These families lost their children, we lost coaches. I've been to the funerals. I've been to the homes where they're sitting shiva. I've been to the vigils. It's just, there are no words." When asked by a reporter what the deputy should have done, the Sheriff replied "Went in. Address the killer. Kill the killer." Josh Caplan @joshdcaplan Broward Sheriff Israel says armed school resource deputy at Stoneman Douglas "never went in." The deputy was suspended without pay pending investigation. In other words, where previously we learned that on Feb. 5, 2016 Broward Sheriff's were warned by a neighbor's son that Nikolas Cruz "Planned to shoot up the school on Instagram", we now find out that during the shooting, a deputy could have saved lives but he hid instead as teenagers were killed. The shooting lasted approximately six minutes before the suspected gunman, Nikolas Cruz, dropped his rifle and exited the school - blending in with fleeing students. The Sheriff also noted that his office was involved in 23 calls regarding suspect Nikolas Cruz and his brother, and has placed BSO Col. Jack Dale and deputies Edward Easton and Guntis Treijis on restrictive duty as investigators look into whether more could have been done to prevent the shooting. "Some of the calls we responded out and met with his mother," said Israel. “I’ve restricted two of our deputies as we dig deeper into this, take statements and make a decision to see whether or not they could have done more, should’ve done more,” said Israel. Last week, the FBI agent in charge of the Florida shooting probe admitted that the Bureau had investigated a school shooting threat made on YouTube last year but could not identify person behind it - despite Nikolas Cruz using his real name to sign the threat. The man who reported Cruz, Ben Bennight, spoke with the FBI last year for about 20 minutes, and there was no follow-up from the FBI after that initial conversation. Then, Bennight told CBS that he again spoke with the FBI on Wednesday night for about 20 minutes. They wanted to know if he knew anything more after first reporting the YouTube video last year. He said the same agent/agents he spoke with last year came to his home Wednesday. And last month, the FBI was warned a second time about Cruz: “A person close to” Cruz called the agency’s tipline on Jan. 5 and reported the 19-year-old had a “desire to kill people, erratic behavior, and disturbing social media posts” and there was “potential of him conducting a school shooting,” the FBI said in a statement. -NY Post Furthermore, as we reported earlier today, CNN's FOIA of Broward County 911 records has produced a steady stream of scoops about Parkland, Fla. school shooter Nikolas Cruz fleshing out much of what is publicly known about Cruz's background and the various reports made warning the FBI and other authorities about his threatening behavior. The police were warned about Cruz's violent past - that he'd "used a gun against people before" and had "put the gun to others' heads in the past" - but still they did nothing. No wonder Sheriff Israel is beside himself - both the FBI, the Broward County Sheriff's office, and the armed school resource officer did absolutely nothing to prevent the deaths of 17 students. And now, back to blaming guns. "'Shocked And Outraged': Four Broward Deputies Waited Outside School As Children Were Massacred" Coral Springs police officers were "stunned and upset" to learn that four Broward County Sheriff's Deputies were stationed outside the Marjory Stoneman Douglas High School and had not entered to face an active shooter, sources with the Coral Springs, FL police department told CNN. Coral Springs Police Chief Tony Pustizzi As the details behind the Police response to the Valentines Day massacre emerge, it appears that the Coral Springs Police department - which sent 130 officers to the scene - put their lives on the line while Broward County officers simply waited for backup as the scene unfolded, in what some Coral Springs officials perceived to be a derilection of duty. Some Coral Springs police were stunned and upset that the four original Broward County Sheriff's deputies who were first on the scene did not appear to join them as they entered the school, Coral Springs sources tell CNN. It's unclear whether the shooter was still in the building when they arrived. The four Broward Sheriff's deputies, including fired High School Resource Officer Scot Peterson, had their pistols drawn from behind the safety of their vehicles, and "not one of them had gone into the school," according to shocked Coral Springs police. The Coral Springs officers, meanwhile, entered the building soon after they arrived on scene to confront the shooter, while the four Broward County Sheriff's deputies remained outside until two more officers arrived on scene along with an officer from neighboring Sunrise city. What these Coral Springs officers observed -- though not their feelings about it -- will be released in a report, likely next week. Sources cautioned that tapes are currently being reviewed and official accounts could ultimately differ from recollections of officers on the scene. According to the Coral Springs Chief of Police, Anthony Pustizzi, roughly 40 of the 130 officers rushed into the building after the initial officers responded, where they carried 23 victims were carried out to medics, 20 of whom survived. Two days after the shooting, Putstizzi sent an internal email to his officers obtained by CNN which reads "I understand that another agency has given the impression that it had provided the majority of the rescue efforts, and that the tremendous work of the Coral Springs Police and Fire Departments has not been recognized. Please know that this issue will be addressed, and the truth will come out in time." The resentment among Coral Springs officials toward Broward County officials about what they perceived to be a dereliction of duty may have reached a boiling point at a vigil the night of February 15, where, in front of dozens of others, Coral Springs City Manager Mike Goodrum confronted Broward County Sheriff Scott Israel. Meanwhile, the Coral Springs Sheriff has publicly commented on the shooting. "I've been a police officer for 30 years," Pustizzi said at a press conference. "You know, humans aren't meant to see this kind of tragedy, but the officers that went in there, the dispatchers that heard it, the firemen that treated the people -- you know, there's obviously a lot of support that needs to be given to them, as well." "I'm thinking, you know, this is a real one. You train for this day. You hope it never happens, but you only have one way and that's straight in, and you hope that a bullet doesn't find you, as well, but that's a possibility," said Pustizzi. Meanwhile, Broward County Sheriff Scott Israel gave a heartfelt press conference yesterday in which he condemned the one fired resource officer caught on camera waiting outside the high school, Scot Peterson. "What I saw was a deputy arrive ... take up a position and he never went in," Israel said adding Peterson should have "went in. Addressed the killer. Killed the killer." Peterson was suspended without pay, after which he resigned. County Superintendent Robert Runcie said, "I'm in shock and I'm outraged to no end that he could have made a difference in all this. It's really disturbing that we had a law enforcement individual there specifically for this reason, and he did not engage. He did not do his job. It's one of the most unbelievable things I've ever heard." Speaking at CPAC, President Trump called the sheriff's deputy a "coward" for not going in and facing the active shooter. "But he certainly did a poor job. There's no question about that. He was there for five minutes, for five minutes. That was during the entire shooting. He heard it right from the beginning. So he certainly did a poor job. But that's a case where somebody was outside, they're trained, they didn't act properly or under pressure or they were a coward. It was a real shock to the police department." Meanwhile, Sheriff Israel also went on a CNN town hall and blamed the NRA for promoting firearms... ... even though just a few months earlier, the same sheriff said that "if you have a lone wolf assassin that's committed to commit great carnage and killing people, there's nothing you can do about it." Watch 1 minute into the clip below Labels: Police Blue Light Special My bedroom. That stuff growing around the light is kitty grass for Charlie to chew on. The blue light is always on. I don't always agree with what law enforcement does, but they're the thin blue line between us and criminal chaos. Thank you men and women in Law Enforcement. Thank you very much! Make it a good one. "Black men speak: 10 honest conversations (TRAILER)" "Racine was named the 4th worst place for black people to live in the United States. With its high unemployment, infant mortality, school suspensions and incarceration rates for black people, we asked a number of black men if racism exists here. Racine County Eye is kicking off a series of videos on the topic." Posted by OrbsCorbs at 2:33 PM 1 comment: Labels: Racine County Eye, Racism "Trump administration levels 'heaviest sanctions ever imposed' against North Korea" Treasury Secretary Steven Mnuchin speaks during a press briefing at the White House Friday. The Trump administration announced new sanctions on more than 50 vessels, shipping companies and trade businesses in its latest bid to pressure North Korea over its nuclear program. (AP Photo/Pablo Martinez Monsivais) ORG XMIT: DCPM104(Photo: Pablo Martinez Monsivais, AP) https://www.usatoday.com/story/news/politics/2018/02/23/trump-administration-announce-new-sanctions-north-korea/366290002/ How long have we been imposing "sanctions" on North Korea? Decades. You'd think by this time things would be so tight that they couldn't fart. "The new sanctions target 56 vessels, shipping companies, and trade businesses that the U.S. believes are assisting North Korea in evading sanctions" 56 vessels after decades of sanctions? They're just blowing smoke up our asses. By now, North Korea should be a dried up patch of black on the map. The only other sanctions I can think of is telling North Koreans that they may no longer breathe. Posted by OrbsCorbs at 1:52 PM No comments: "Miller, Leinies and Coors Light themed bars coming to new Milwaukee Bucks arena" From JSOnline: https://www.jsonline.com/story/sports/nba/bucks/2018/02/22/miller-leinies-and-coors-light-themed-bars-coming-new-milwaukee-bucks-arena/355227002/ Are there any public dollars in this? This is the way to build an arena: they have commitments from numerous vendors, most notably Miller beer and its "friends." You build the arena AFTER you get commitments, not the other way around, Racine. I've come to believe that there is a huge financial drain on our city that is not publicly acknowledged. Milwaukee builds an arena and there's no parking meters in downtown Kenosha, but Racine can't duplicate either of these feats. Why? Ask the guys at the very top of the downtown building that houses Dewey's Restaurant And Sports Bar, at the southwest corner of 6th and Main Streets. They're the pigs that run the city. They're the ones pocketing the money made from our tax dollars.. They want nothing to change. I KID YOU NOT! A mass shooting up there would create an entire new world of opportunities in Racine. Posted by OrbsCorbs at 9:27 AM No comments: Baby Raper Takes Lead in "Jaw Up" Mugshot Challenge Our current leader in the Jaw Up Challenge is a sex fiend from Kentucky: "Vincent V. Judd-Rapp, 25, whose last known address is in the 8700 block of the Sharon Grove Road in Lewisburg, Kentucky, was found guilty by a jury in December of felony counts of first-degree sexual assault of a children under age 12 and failure to register to the sex offender registry." I hope that Bubba and his "girlfriends" lower that jaw by about 6 inches. Arrogant piece of shit. Here's another example of "jaw dropping:" Isaiah DeGroot is the piece of shit who handed over $3K bond money to get out and fuck up big time. He stole a vehicle. He had a stolen gun. He crashed near Festival Foods He took off the leg of a male pedestrian, and a leg and arm of his female companion, who remains in a coma. DeGroot, of course, ran from the crash. Look at his mug shit above. In an act of defiance, DeGroot pointed his chin at the booking camera. He is such a tough guy after destroying the lives of others and then running away. Below is DeGroot's photo after he's been processed: That defiant chin has dropped considerably. I think judges should be allowed to consider mug shots in sentencing. Just look at the mug shots of local "bad asses:" their chins are all held high, too high, as of they're proud of what they've done. You can read about the developing story of Isaiah DeGroot in Racine County Corruption http://racinecountycorruption.blogspot.com/ I suggest that we amputate all of his limbs, without anesthetic, and throw him in the gutter. Labels: Chin Up, Crime Hello everyone I hope you are making it through this crazy weather we have been having. I hear we are suppose to have warm temps this weekend but Saturday night does not look to good that is just over night. Here are your questions. 1) Have you been watching the Olympics? 2) Which Olympics do you prefer to watch the summer or the winter? 3) Do you have a favorite event that you like to watch? 4) Have you ever tried to do any of the Olympic events yourself? Believe in spring. Just keep believing, no matter what. "The conspiracy theory about Florida shooting survivors that won't end: 'Enough is enough'" Christal Hayes, USA TODAY Published 7:05 p.m. CT Feb. 21, 2018 | Updated 6:46 a.m. CT Feb. 22, 2018 Emma MacDonald, center, cries during a vigil for the victims of the Boston Marathon explosions at Boston Common, Tuesday, April 16, 2013.(Photo: Julio Cortez, AP) When Emma MacDonald saw the tragedy unfolding at a high school in Florida, she felt a sense of dread. She knew what would come next: the same lie that's been spreading for years. It's like clockwork. New life is given to the hurtful conspiracy with each tragedy. Each time MacDonald, of Boston, feels to blame because it's her face that is used to promote one of the more popular conspiracy theories over the last few years. "Enough is enough," said MacDonald, 25. "This needs to go away." It started with a photo of MacDonald breaking down in tears during a vigil after the 2013 Boston marathon bombing. Conspiracy theorists took the image and pasted it alongside other crying women after mass shootings in Newtown, Conn., Aurora, Co. — and the latest addition in Parkland, Fla. All are white, thin and brunette. Most are crying. The aim is to try to prove those grieving after the tragedies were actually the same person and a staged actress paid to respond to crisis around the county. The collage has been used after the Manchester Arena bombing and a 2015 shooting at a college in Roseburg, Oregon that left 10, including the gunman, dead. "When you're short on crisis actors," the photo is labeled, which quickly went viral on social media after last week's shooting at Marjory Stoneman Douglas High School. The post didn't include that the woman added from Parkland, Fla. wasn't a student at all but actually CBS producer Gisela Margarita Perez, who was posing for a photo with student survivors before an interview. Emma MacDonald (Photo: Courtesy of Emma MacDonald) Studies have shown people tend to believe even far-flung theories in situations that are out of their beliefs. Conspiracy theories are nothing new. But the internet and social media has made them even more accessible. Conspiracy theories:Here's what drives people to them, no matter how out there The madness started within months after the photo was taken, MacDonald said. She didn't know anyone who died in the Boston bombings but attended a vigil a day after the April, 15, 2013 attack. She got emotional after seeing a young boy place a flower down during the vigil and started crying. An Associated Press photographer captured the moment and it ended up in newspapers across the country, making her a target of conspiracy theorists. "I feel like I was very vulnerable in that image. I was sobbing uncontrollably and every time I see it, I'm right back there and relieve those moments," MacDonald said. "I just feel awful for the victims and families of the other women because they lost loved ones and still have to deal with this madness. It's just exploiting a tragedy." Friends, bosses and acquaintances have all reached out to her over the years after seeing the theories online. At first, she said, she tried to report those who were posting the false narratives but it became more of an uphill battle after each tragedy. "Every time it's like what do I do? Do I report every single blog post and try to debunk every theory?" she said. "Part of me genuinely didn't even want to call attention to it because that's just feeding the trolls." She reported one of the incidents Tuesday and hopes changes to Facebook and other social media platforms will help prevent against the fake stories from spreading as quickly as they have in the past. But social media companies have continued to take heat in the aftermath of tragedies as critics call for filters to stop the spread of conspiracies that mislead the public and compound the pain for victims of violent attacks. YouTube apologized Wednesday after a video attacking a survivor of the Florida high school shooting was at the top of its "trending" tab. The video has since been deleted. MacDonald says there has to be some way of stopping the flow of misinformation and hopes people will verify information before sharing it. "I'm just some random girl in some random photo and I hate it," she said. "My face is used as a tool to these people. It's used as a distraction to what's really happening — the grief these people are feeling and the solutions that can help prevent against this from happening again." Follow Christal Hayes on Twitter : Journo_Christal https://www.jsonline.com/story/news/2018/02/21/conspiracy-theory-wont-end-enough-enough/360521002/ [Editor's note: space below provided for your children to draw and color.] "NOT REAL NEWS: Correcting the record with a look at what DID NOT happen this week" From Wisconsin Gazette.com: The AP Feb 19, 2018 A roundup of some of the most popular but completely untrue headlines of the week. None of these stories is legit, even though they were shared widely on social media. The Associated Press checked these out; here are the real facts: NOT REAL: Trump refuses to let Jesus into his heart after learning he’s from Nazareth THE FACTS: A Christian satire site falsely quoted President Donald Trump as calling Nazareth a “hole” and included an unrelated photo of the president from a year-old interview. The Babylon Bee, drawing a comparison between Trump’s reported remarks earlier this year about African countries, alleged that Trump said he wouldn’t accept Christianity anymore because he thought the town where Jesus came from was poor and undesirable. An accompanying image of Trump is from a January 2017 White House interview. NOT REAL: BREAKING: Second Parkland Shooter in custody THE FACTS: Reports about a second shooter at a high school in Parkland, Florida, this week started with a tweet from an account falsely purporting to be former Fox News host Bill O’Reilly. The account was later suspended and police say that suspect Nikolas Cruz acted alone in the massacre that killed 17 people. Also, Florida elections officials refuted a report that Cruz was a Democrat, saying that he was not a registered voter. And some social media posts this week wrongly identified Cruz as a man seen wearing a T-shirt with Communist leaders’ images. The man’s attorney said his name is Marcel Fontaine and he “suffered a lot of harassment” over the misused photo. NOT REAL: BREAKING: 4 million Democrat votes were just declared fraudulent THE FACTS: A voting machine company didn’t produce 4 million fraudulent Democratic votes; the company doesn’t even exist. The story posted by the site thepoliticonews claimed that Novus Ordo Sectorum Inc., owned by the Obamas and other wealthy Democrats, made machines that disrupted elections in 11 states. The U.S. Election Assistance Commission says that no voting machine maker by that name exists. Novo Ordo Sectorum, Latin for “New Order of the Ages,” appears on the $1 bill on a seal frequently cited by conspiracy theorists as a sign the U.S. is taking over the world with an authoritarian government. NOT REAL: CDC Funded Study Shows the Vaccinated Shed 6.3 Times More Flu Virus, Just by Breathing THE FACTS: The doctor who headed this University of Maryland study dismissed a chiropractor’s conclusion that the study says getting the flu vaccination makes a patient spread the virus more. Dr. Donald Milton says people who are not vaccinated for the flu are much more likely to transmit the virus than those who are. His study in January did conclude that patients who get vaccinated shed six times more aerosols, but said it was based on just 11 cases and does not imply that these patients would spread more flu. NOT REAL: Philip Morris Marlboro ‘M’ brand marijuana brand cigarettes now for sale in Four U.S. States THE FACTS: Pot may be easy to find in at least nine states, but don’t hold your breath waiting for the Marlboro marijuana cigarettes to hit stores. Philip Morris said the company is not marketing marijuana products, despite a widely shared false story fearing a doctored, green-colored photo of a Marlboro pack of cigarettes, with packaging reading ‘Marlboro CANNABIS.’ The false story has circulated for years, with the latest iteration saying the ‘M’ brand is for sale in Colorado, Washington, Oregon and Alaska. http://www.wisconsingazette.com/blogs/not-real-news-correcting-the-record-with-a-look-at/article_2391ba40-1592-11e8-84e9-af80f4ab43bc.html Labels: Wisconsin Gazette.com Who is Donte Perry? Donte Petty is a convicted felon who put up the surety bond for Isaiah Degroot.With Isaiah DeGroot being sprung out of jail by Mr. Petty, Mr. DeGroot was left unsupervised to continue his crime spree, but the question begs on whose behalf? Is there no investigation or follow up on Donte Petty? How is Petty related - or come to know and provide shelter to Isaiah Degroot? Father? Step father? Cousin? Uncle? Neighbor? Concerned citizen? Fencer? Drug Kingpin? If Petty is a fencer or drug kingpin, how many more the likes of DeGroot are out there terrorizing the streets on his behalf ? As you may be aware, Donte Petty was exposed on racinecountycorruption.blogspot.com , Petty's address and phone number are conveniently posted on the site should any of you decide to further investigate. There are a lot of unanswered questions regarding the relationship between Degroot and Petty that warrant further exploration and investigation. Are any of you up to this task? Labels: Racine County Corruption "10 Old Wives' Tales Proven True By Science" Labels: Alltime10s Thursdays It's George Washington's birthday. Party on! "News of the Weird: Feb. 22, 2018" From The Shepherd Express: by Editors at Andrews McMeel Syndication Accent on Weird Michelle Myers of Buckeye, Ariz., suffers from blinding headaches, but it’s what happens afterward that until recently had doctors stumped. Myers, who has never been out of the U.S., has awakened from her headaches three times in the last seven years with a different foreign accent. The first time it was Irish, the second time it was Australian, and both lasted only about a week. But Myers’ most recent event, which was two years ago, left her with a British accent that she still has. Doctors have diagnosed her with Foreign Accent Syndrome, a rare condition that usually accompanies a neurological event such as a stroke. Myers told ABC-15 that the loss of her normal accent makes her sad: “I feel like a different person. Everybody only sees or hears Mary Poppins.” Get Your Goat A new golf course at The Retreat & Links at Silvies Valley Ranch in Seneca, Ore., will take “the golf experience to a new level” in 2018, owner Scott Campbell announced in early February to the website Golf WRX. This summer, golfers will be offered goat caddies to carry clubs, drinks, balls and tees on the resort’s short seven-hole challenge course, McVeigh’s Gauntlet. “We’ve been developing an unprecedented caddie training program with our head caddie, Bruce LeGoat,” Campbell went on, adding that the professionally trained American Range goats will “work for peanuts.” Fatberg, Dead Ahead! News of the Weird reported last September on the giant “fatberg” lodged in the sewer system beneath the streets of London. The huge glob of oil, fat, diapers and baby wipes was finally blasted out after nine weeks of work. On Feb. 8, the Museum of London put on display a shoebox-sized chunk of the fatberg, the consistency of which is described by curator Vyki Sparkes as being something like “Parmesan cheese crossed with moon rock. It’s disgusting and fascinating.” The mini-fatberg is enclosed within three nested transparent boxes to protect visitors from potentially deadly bacteria, the terrible smell and the tiny flies that swarm around it. The museum is also selling fatberg fudge and T-shirts in conjunction with the exhibit, which continues until July 1. Least Competent Criminals n Kenneth R. Shutes Jr. of New Richmond, Wis., bolted from a midnight traffic stop on Feb. 6, but he didn’t make it far before having to call 911 for help. The Twin Cities Pioneer Press reported that Shutes got stuck in a frozen swamp in rural Star Prairie and, after about an hour, became unable to walk as temperatures dipped to 8 below zero. Fire and rescue workers removed Shutes from the wooded area, and he was later charged in St. Croix County Circuit Court for failing to obey an officer, marijuana possession and obstructing an officer. n Marion County, Fla., sheriff’s officials were surprised to get a text from David W. Romig, 52, on Jan. 30 about a murder scene at his home in Dunnellon. The Ocala Star Banner reported that detectives were called to the home after Romig reported an intruder had killed his girlfriend, 64-year-old Sally Kaufmann-Ruff. Some of the evidence they found didn’t match Romig’s story, and their suspicions were confirmed later in the day when Romig texted a detective, saying, “I think they are going to arrest me”—a text he had intended for his wife. On Feb. 12, Romig admitted he may have killed Kaufmann-Ruff. He was charged with homicide, making a false report and tampering with evidence. Evolution in Action Frank Lyko is a biologist at the German Cancer Research Center in Heidelberg with a narrow field of study: the marbled crayfish. But as Dr. Lyko and his colleagues reported in a study published Feb. 5, there’s more to the six-inch crustacean than meets the eye. Until about 25 years ago, this species didn’t exist, The New York Times explains. One single, drastic mutation created a whole new species of crayfish—one that can clone itself. Since then, it has spread across Europe and other continents, threatening native varieties. The eggs of the crayfish all produce females, which do not need to mate to produce more eggs. Dr. Lyko’s DNA research offers new insights into why most animals have sex, because there are so few examples of sex-free species (they don’t last long). He admits that the marbled crayfish “may last only 100,000 years. That would be a long time for me personally, but in evolution it would just be a blip on the radar.” © 2018 ANDREWS MCMEEL SYNDICATION https://shepherdexpress.com/news/news-of-the-weird/weird-feb-8-2018/#/questions Labels: News of the Weird Well, hello my rocket men and rocket women! How are you? Let's blast off for the Zoltar zone. Here I'm on equal footing with just about everyone. I hate to admit it, but I'm bored with our city government. Without lying John's panache, it's just not the same. What has Mr. Mayor Cory Mason done? He's held listening sessions. Zzzz..... I believe that a large part of the listening sessions is the sense of deflation of some pretty raw emotions. It allows some commentary and some soothing to take place. The purpose is to inform and learn, not cut down. I guess that as long as people have some place to vent, the less likely that they will riot in the streets. Then I saw this: http://journaltimes.com/news/local/mothers-of-dontre-hamilton-sandra-bland-rally-for-donte-shannon/article_2d32ed9c-d4fa-5ab4-8005-11a17e31368f.html Maybe she could get that bullhorn surgically attached to her face. Go back to your home and demand to know why your shit sometimes goes directly into the Lake. Go solve some murders in Milwaukee. Why do you teach that the police are your enemy? How many lives has that BS culled? I'm surprised at times when interacting with children of color how much hatred they harbor for whitey. Little kids. They then seem amazed when I do something nice for them. Ugh, this Donte Shannon crap will dominate the local news for awhile. If he had been white, there would be little noise. I was thinking recently of ways to "spruce up" the JT Irregulars. And ways to attract more people. Without getting arrested. If you have and suggestions, you can send them to: madamezoltar@jtirregulars.com Mr. OrbsCorbs accuses me of trying to "girly up" the site. Huh, it's not that. It is cleaning the cobwebs out of the least used areas. We're in our ninth year. Some junk has to accumulate. It's too bad we can't toss out the lies along with the rest of the garbage Like Mr. OrbsCorbs' dirty picture magazines. (That will wake him up.) [EDITOR'S NOTE: In his defense, Mr. OrbsCorbs says, "Magazines? That's so last century. If I had shit like that, it would be in digital form."] The weather has been pretty nice for February. We even had a couple of spring jacket days. I don't mess around with changing my outerwear much. I wear my winter coat until June. Nothing can get it off before then. After that, nothing can get it put back on until December. Happy holidays. I understand that the Downtown Racine Corp. has declared the ice skating rink on Monument Square to be a success. Hooray! Too bad there's no zoo bushes you can jump off the rink and hide behind with your boyfriend at the time. I always came back out proudly displaying my new hickeys. I hid them from my mom, After I left the house, my turtleneck dickey came off to reveal my hickeys. Dickeys/hickeys, oh my. I don't want to discuss politics on the national level until we get a real president. I fear that Trump may destroy the presidency as we understand it. Hell, I fear that he'll turn the world into a nuclear crisp. He would probably market them: New! Nuclear Crisps! For that glow-in-the-dark feeling! OK. I'm getting out there a bit. Time to call it a column. I hope that you can enjoy your favorite winter activities. Better yet, I hope you can enjoy your spring ones. I love you all. Please donate: paypal.me/jgmazelis If you don't like PayPal, send me a note at madamezoltar@jtirregulars.com and I'll send you my street address so you can send a check or money order. Thank you. Posted by Madame Zoltar at 6:26 AM No comments: "Suspect in Festival Foods hit-and-run pleads not guilty" RACINE — The Racine teenager accused of maiming a Union Grove couple in a Jan. 14 crash outside Festival Foods has pleaded not guilty to charges related to the incident. In court on Tuesday, 17-year-old Isaiah Degroot pleaded not guilty to 19 charges stemming from the hit-and-run crash that resulted in critical injuries to Jeff and Cheryl Coopman. He was originally charged with 27 felony counts, but eight counts of bail jumping were dropped Tuesday. Jeff Coopman, whose left leg was amputated as a result of the crash, sat in a wheelchair in the back of the courtroom as Degroot made his plea. Coopman’s wife, Cheryl, remains in critical condition at Froedtert Hospital in Wauwatosa. She has lost both her left leg and arm as a result of the crash, family and doctors have confirmed. The crash occurred just after 10:40 a.m. on Jan. 14. A Racine County sheriff’s deputy identified a vehicle traveling north on Highway 31 at Newman Road in Mount Pleasant with a license plate that did not match the vehicle. Degroot is alleged to be the driver. The vehicle turned north onto Newman Road. The deputy followed and activated the lights and sirens on her unmarked squad to attempt a traffic stop. The vehicle then abruptly turned left into the parking lot of the Village Center shopping center, near Kohl’s department store, 5740 Washington Ave. The vehicle continued past the stores west of Kohl’s at a high rate of speed before Degroot allegedly lost control of the vehicle and crashed, striking the Coopmans. Based on the not-guilty plea, the case is now set to go to trial; a tentative trial date is set for April 30 at 1:30 p.m. at the county Law Enforcement Center, although there is a hearing scheduled for April 16 that could affect the trial date. Racine County Assistant District Attorney Jennifer Tanck-Adams said that it is “a clear case. It’s all on video.” The defense doesn’t see it that way and is willing to proceed to trial before Racine County Circuit Court Judge Mark Nielsen. In the end, Coopman said, “I just want to see justice instead of slaps on the wrist.” “He is lucky he is not facing murder charges,” Coopman said about the seriousness of the crash. In preparation for the sentencing, Coopman said his family is going to write a letter to the judge, and they are expecting many more letters from family and friends who have supported them and witnessed the struggles they have gone through since the crash. Why out on bond? Coopman said he remains concerned about why Degroot, of the 2000 block of Hickory Grove Avenue, was out on bond the day of the crash. According to online records, Degroot was charged with felony charges of discharging a firearm from a vehicle (driver), two counts of first-degree recklessly endangering safety as a party to a crime and a misdemeanor charge for carrying a concealed weapon in connection with a shots-fired incident that took place in the 1600 block of Albert Street at about 1:20 p.m. on Oct. 30. In addition to the April 30 hit-and-run trial date, Degroot has a June 19 trial date for charges connected to the Oct. 30 incident. http://journaltimes.com/news/local/crime-and-courts/suspect-in-festival-foods-hit-and-run-pleads-not-guilty/article_3244378d-9628-533c-89e3-b6b94888c6d1.html Unfiltered coverage here: http://racinecountycorruption.blogspot.com/ You wouldn't believe the contempt I hold this asshole in. "Half-Looped Compulsory" Home Advice Art for Art's Sake I’m Art Kumbalek and man oh manischewitz what a world, ain’a? So listen, no essay this week. For me right now it’s Tuesday, Feb. 20 and I’m meeting up with my gang up over by the Uptowner tavern/charm school situated at the corner by Center & Humboldt there, like we always do after a hard day’s voting the day after Presidents’ Day. Come along if you like, but you cover the first round. Let’s get going. Emil: I always wondered what did Ebenezer Scrooge think about Valentine’s Day. I don’t think it’s ever mentioned in any of his books. But I suppose a good “bah, humbug” can get a guy through any kind of focking holiday. Julius: The hell with Valentine’s Day. It’s Lent now, and I still can’t decide what to give up for the damn season yet. One thing I know, I sure don’t have the personal constitution to ape the Lord and do something like fast for 40 days out in the wilderness. Cripes, how ’bout that, ain’a? No way could I pull that off; although, to be fair and balanced to myself, that was probably a little easier for him to do than it would be me, after all, from the pictures I’ve seen of the Lord, he really didn’t look like a very big eater to begin with, what the fock. Little Jimmy Iodine: Anybody been watching Olympics? Emil: I know I won’t watch Olympics ’til they have goddamn ice fishing in it. Fock ’em. Herbie: If they don’t add competitive ice fishing for the next Winter Games, forget about it. They could stand to add an extra event or two ’cause, jeez louise, it seems every time I think to tune in it’s the goddamn curling they show, what the fock. Could watching an Olympian angler pull up a nice 13-ounce crappie through the ice be any less interesting? I think not. Ernie: I didn’t see any Olympics last Sunday. I was watching the NASCAR at Daytona. Danica Patrick’s final race—our quarterback’s new girlfriend. Julius: Didn’t I hear Richard Petty once say the only way the Danica Patrick would win a NASCAR race was “if everybody else stayed home”? Little Jimmy Iodine: Hey, Artie! Over here. Put a load on your keister. Art: Hey gents. What do you hear, what do you know. Ernie: I hear the Olympics are still going on. Art: I don’t watch much of the snowy Olympics. What the heck do I know from winter sports? If they had events like Hot Toddy Mixing and the Thermostat Crank I’d tune in, ’cause those are two events I participate in on a daily basis during the wintertime so I’d have some interest, I kid you not. The best thing about them is that every four years I get to ask: What the fock, Dick Button? You got to be jerking my beefaroni. Is that the name of an announcer or a name for some kind of protective genitalia device that hockey players gird their nut cups with, ain’a? Julius: And I hope some of those skaters who don’t win a medal are prepared to spend their Sunday afternoons for the next 10 years wearing a 20-pound Snoopy head for the kids at the ice show. Ray: How some of those halfpipers and skeletoneers don’t die pulling off their stunts, I’ll never know. Little Jimmy: I always wondered about who the first guy was, like back in the days of the early, early cavemen ’round about the time they first discovered they could notice something; the first guy who discovered death to the point of actually being able to think like something wasn’t exactly kosher going down around him. You always hear about the guy who invented fire or discovered the wheel, but what about the guy who discovered croaking? Herbie: What the fock are you talking about? Little Jimmy: Just wondering what went through the mind of the first guy, when one of the other guys croaked, and he went over and nudged him and thought, “Hey, this dude’s not moving and even if I come back tomorrow, I’ll bet you a buck two-eighty he still won’t be.” To actually realize something wasn’t regular, you know? Ray: And then what about the guy who had the advanced intelligence to rifle the dead guy’s pockets, or pouch, or whatever the fock they had back then. Laws about that didn’t come in ’til at least the ancient Greeks I seem to recall. Herbie: Correct. Laws were not bandied about until government was discovered. Ernie: Cavemen didn’t have crime, then. They must’ve called it survival. (It’s getting late and I know you got to go, but thanks for letting us bend your ear, ’cause I’m Art Kumbalek and I told you so.) "Foxconn land acquisition hearing set" From The Journal Times.com: MICHAEL BURKE mick.burke@journaltimes.com 13 hrs ago MOUNT PLEASANT — A public hearing next month will help determine whether the Village of Mount Pleasant can acquire all the land needed for the $10 billion Foxconn Technology Group project — even from property owners who refuse to sell all of their land. On Monday the Mount Pleasant Community Development Authority set a hearing for 5 p.m. March 20 at the Village Hall, 8811 Campus Drive. That hearing could lead to village acquisitions of any remaining pieces of property needed for the massive Foxconn project. Before the CDA meeting, Mount Pleasant’s property acquisition attorney and expert, Alan Marcuvitz, gave an update on Foxconn-related property acquisitions so far and what the process will be for the village to seek the rest of what will be needed. As of Monday, Marcuvitz said, between $82 million and $85 million in total land purchase options were in hand in the three Foxconn areas combined. The village exercised all of those options and now owns those roughly 1,700 acres. Most purchases of large tracts of land are being made for $50,000 per acre. Read more: http://journaltimes.com/business/local/foxconn-land-acquisition-hearing-set/article_d059c5e6-152d-5d15-982d-d486063aa33e.html#tracking-source=home-top-story I keep thinking of the house in the middle of Western Publishing's parking lot on Mound Ave. Labels: Foxconn! "WILL Press Release | WILL Sues Rep. Brostoff in E-mail Dispute" By Cameron Sholty Posted February 16, 2018 In Press Releases, Roth v. Brostoff, WILL News Rep. wants over $3,200 to print e-mails that were requested electronically February 16, 2018 – Milwaukee, WI – The Wisconsin Institute for Law & Liberty (“WILL”) has sued State Representative Jonathan Brostoff (D-Milwaukee) in Dane County Circuit Court for violating the State’s Open Records Law. Brostoff is refusing to turn over electronic records, instead insisting on printing them and charging unnecessary fees. The complaint can be found here. On July 10, 2017, WILL Research Fellow Collin Roth made a record request to Brostoff for emails relating to occupational licensing reform, specifically asking for the emails in electronic format. Instead, Brostoff printed off thousands of pages of documents and sent Roth an invoice for $3,239.76. WILL attorneys wrote back pointing out that the law requires custodians to provide electronic records when requested and does not allow charging for paper copies of electronic files, but Brostoff would not relent. In a very similar case, on January 22, 2018, a Dane County Circuit Court judge ruled that State Rep. Scott Krug (R-Nekoosa) needed to provide electronic files when requested. When informed of this case, Rep. Brostoff still refused to comply. Legally, custodians are required to provide electronic records when requested. The law explicitly defines records to include electronic files, and a printout of the text of an email doesn’t reproduce everything in the actual electronic file. Just like a transcript captures only one facet of a video recording, a printout is no substitute for an original email file. According to WILL President Rick Esenberg, “This is not about ideological differences. Unfortunately, both Republicans and Democrats occasionally fail to meet their obligations under our open records and open meetings laws. We’ve worked with advocates across the political spectrum to fix that. This is just the latest fight.” In addition to a requirement under the law, providing records electronically is the smart thing to do. Why would a public servant waste taxpayer resources printing out copies of electronic files? That method is slower, more expensive, and less convenient for everybody than just copying the files onto a CD or flash drive (or even just emailing the files directly to the requester if the request is small). “I see this all too frequently,” said Tom Kamenick, Deputy Counsel and open government specialist at WILL. “Instead of doing things the easy way, custodians intentionally make the process difficult and expensive, discouraging people from even making records requests. We shouldn’t put up with that.” “For more than a year, WILL has been on the frontlines of an effort to reform Wisconsin’s occupational licensing laws and promote economic freedom,” said Collin Roth. “We believe citizens have a right to earn a living and that burdensome and unreasonable regulations often stand in the way of meaningful work. As with any public policy debate, government transparency is critical.” http://www.will-law.org/will-sues-rep-brostoff-e-mail-dispute/ Labels: WILL "Talking Racine Episode 59 Community Forum on Machinery Row" "Talking Racine holds a community forum on Machinery Row about misdeeds and corruption in city government. Held at Gateway Technical College on 2-17-2018. We bring the perspective down to the local level to discuss issues that affect our own city of Racine, WI." Labels: Machinery Row, Talking Racine Use it, or lose it. Labels: Open Blog, Vote "Scientists create first human-sheep hybrids — what that means for the future of organ transplants" Fiza Pirani 4:17 p.m Monday, Feb. 19, 2018 National/World News Scientists say they’ve grown sheep embryos with human cells, an achievement that could one day supply organs for human transplants and offer a cure for Type 1 diabetes. Researchers from Stanford University and the University of California presented their new work at the annual American Association for the Advancement of Science in Austin, Texas, on Sunday, the Guardian reported. The scientists’ research builds on a controversial breakthrough made in 2017 in which they described similar experiments with human-pig chimeras. A chimera is an organism that has a mixture of genetically different tissues typically formed by embryo fusion, mutation or grafting. This time, by fusing human stem cells into sheep embryos, the scientists were able to grow chimeras into fetal animals over 28 days. “Even today, the best matched organs, except if they come from identical twins, don’t last very long because with time, the immune system continuously is attacking them,” researcher Dr. Pablo Ross of the University of California, Davis, said in a press briefing. If it’s possible to grow human organs inside other species, such transplants could be useful beyond critical conditions. However, the sheep embryos created are only 0.01 percent human by cell count. While it’s better than the 0.001 percent of the human-pig embryos, Ross noted that in order to grow human organs, the proportion needs to be closer to 1 percent. “It could take five years or it could take 10 years, but I think eventually we will be able to do this,” researcher Hiro Nakauchi said. In addition, the scientists believe their strategy may lead to a cure for Type 1 diabetes, which occurs when the body fails to produce enough insulin to regulate blood sugar levels. This insulin, Newsweek reported, is typically secreted by pancreatic islet cells. While the process is often used experimentally, human islet cell transplants have had limited long-term success because the body typically rejects it. “In theory, scientists could use a recipient’s own cells to tailor-make organs that are compatible with their bodies. This could reduce the chance of immune system rejection,” Newsweek reported. In 2017, researchers used this method to successfully grow mouse pancreases in rats, which showed that transplants using the pancreas could cure diabetes in diabetic mice. The researchers know how controversial their work is, but said that with funding, the research could be accelerated. Currently, the U.S. National Institutes of Health forbids public funding of human-animal hybrids. But in 2016, according to National Geographic, the agency signaled that the moratorium could be lifted. “All of these approaches are controversial, and none of them are perfect, but they offer hope to people who are dying on a daily basis,” Ross told National Geographic. “We need to explore all possible alternatives to provide organs to ailing people.” Every hour, six people in the United States are added to the national waiting list for organ transplants, according to the U.S. Department of Health and Human Services. And each day, about 20 people die waiting. In the U.S. alone, more than one hundred thousand people need heart transplants each year, yet only about 2,000 actually receive one. http://www.ajc.com/news/science/scientists-create-first-human-sheep-hybrids-what-that-means-for-the-future-organ-transplants/yzoQOVDnGHAkt7shZhSYXJ/ My God, animal/human mixes, AI in machines "San Francisco’s ‘Diseased Streets’ Are Being Comp... '"He Never Went In' Officer On Duty Filmed "Doing... "'Shocked And Outraged': Four Broward Deputies Wai... "Black men speak: 10 honest conversations (TRAILER... "Trump administration levels 'heaviest sanctions e... "Miller, Leinies and Coors Light themed bars comin... Baby Raper Takes Lead in "Jaw Up" Mugshot Challeng... "The conspiracy theory about Florida shooting surv... "NOT REAL NEWS: Correcting the record with a look ... "Suspect in Festival Foods hit-and-run pleads not ... "WILL Press Release | WILL Sues Rep. Brostoff in E... "Talking Racine Episode 59 Community Forum on Mach... "Scientists create first human-sheep hybrids — wha... "At Munich Security Conference, Frayed Relations O... "Police dogs at risk of accidental overdose in opi... When Governments Suspend Their Own Rules" "Why the Reindustrialization of SE Wisconsin Will ... "It Finally Happened" "Racine County DA Trish Hanson Must Once Again Cho... "Sweatshops in China" "City downing more than 2,200 trees due to emerald... Tosa startup AssuresMe develops matchmaking platform for hiring tech talent Betsy Anderson enjoyed gardening and entertaining Monday gifdump Oil rises as Libya declares force majeure in oilfields Ukraine reports first H5 bird flu case in three years: OIE U.S. judge dismisses assault case against British retailer Philip Green: Arcadia Cristiano Ronaldo scores twice, moves into top five in goals Studio Ghibli's animated films to stream on Netflix outside of North America
cc/2020-05/en_middle_0097.json.gz/line1418193
__label__cc
0.735592
0.264408
Remarks December 2012 Issue e-mail to the editor post a reader comment An Editor’s Checkride An examiner I once had put it this way: When giving a private checkride he was evaluating if he’d be comfortable as a passenger with the prospective pilot. He equated giving an instrument checkride to deciding if he’d be comfortable letting his wife and kids be the passengers. A good lesson, that. It helps me remember that my first responsibility is to my passengers. And that’s probably as good an analogy as any for how I think the new editor of IFR ought to relate to readers. As departing editor Jeff Van West mentioned last month, he’s stepping down and aside, but not out. He’s pursuing other ventures in aviation but we’ll still see his name on an occasional feature. I’m stepping in to mind the store. In a way, you could think of this as my editor checkride. And like the examiner I mentioned above, I believe my first responsibility is to the readers of this magazine, as any editor should. How did I get here? I’ve wanted to be a pilot since forever and an airline pilot since B-707s were the latest thing. The economic realities of the times, though, conspired to push me to a more conventional career. I landed in the computer industry. I flew GA in my spare time, but always wondered what life would have been like as an airline pilot. After a gazillion years burning out in hi-tech, wistfully thinking about life as an airline pilot, the world gave me a second chance. The airline boom and less competitive hiring environment of the late 1990s got me a job as a turboprop first officer at a regional airline. For that job, I wanted a new flashlight. As a long-time reader of various Belvoir aviation publications, I convinced them to let me do a product comparison—my checkride as an author. I confidently recommended a flashlight, bought it, and became a regular contributor. The flashlight’s gone. The flying and writing continue. I worked my way into the left seat on the jet. When I took that ATP checkride, I thought it would be my last, but here I am at the controls of this magazine, taking my editor checkride. A different kind of checkride, to be sure, but I remain keenly aware of my responsibility to my passengers. Flying has been described as hours of boredom punctuated by moments of terror. I’ve found that the pages here can reduce the so-called terror to a few moments of excitement and sharpened senses. There’s good stuff here—the kind of stuff you need in the real world to balance the inherent risks of flying against the utility and pleasure it offers. The hours of boredom? Well, the good stuff here is worthless if it’s so thick you can’t get through it without an instrument clearance. But, presented in the punchy, lively, casual style that’s a hallmark of this magazine, it can be fun. And if it’s fun, you get more out of it, improving the utility and joy of flying while managing the risks. My flight plan is to continue the course set by the experts before me, with an occasional vector from our readers who, thankfully, aren’t bashful about offering course corrections. I trust you’d let your kids ride along. —Frank Bowlin Be the first to comment on this post using the section below. New to IFR Magazine? Register for Free!
cc/2020-05/en_middle_0097.json.gz/line1418195
__label__cc
0.524755
0.475245
A study to improve the image quality in low-dose computed tomography (SPECT) using filtration SC Kheruka1, UC Naithani2, AK Maurya3, NK Painuly4, LM Aggarwal5, S Gambhir1 1 Department of Nuclear Medicine, SGPGIMS, Lucknow, India 2 Department of Physics, HNB University, Srinagar, India 3 Department of Radiotherapy, SGPGIMS, Lucknow, India 4 Department of Radiotherapy, CSMMU, Lucknow, India 5 Department of Radiotherapy and Radiation Medicine, IMS, BHU, Varanasi, India Date of Web Publication 7-Sep-2011 S C Kheruka Department of Nuclear Medicine, SGPGIMS, Lucknow - 226 014 Background: The output of the X-ray tube used in computed tomography (CT) provides a spectrum of photon energies. Low-energy photons are preferentially absorbed in tissue; the beam spectrum shifts toward the higher energy end as it passes through more tissue, thereby changing its effective attenuation coefficient and producing a variety of artifacts (beam-hardening effects) in images. Filtering of the beam may be used to remove low-energy photon component. The accuracy of attenuation coefficient calculation by bilinear model depends highly upon accuracy of Hounsfield units. Therefore, we have made an attempt to minimize the beam-hardening effects using additional copper filter in the X-ray beam. The quantitative evaluation were made to see the effect of additional filters on resulting CT images. Materials and Methods: This study was performed on dual-head SPECT (HAWKEYE 4, GE Healthcare) with low-dose CT which acquires images at peak voltages of 120/140 kV and a tube current of 2.5 mA. For the evaluation of image quality, we used CT QA Phantom (PHILIPS) having six different density pins of Water, Polyethylene, Nylon (Aculon), Lexan, Acrylic (Perspex) and Teflon. The axial images were acquired using copper filters of various thicknesses ranging from 1 to 5 mm in steps of 1 mm. The copper filter was designed in such a manner that it fits exactly on the collimator cover of CT X-ray tube. Appropriate fixation of the copper filter was ensured before starting the image acquisition. As our intention was only to see the effect of beam hardening on the attenuation map, no SPECT study was performed. First set of images was acquired without putting any filter into the beam. Then, successively, filters of different thicknesses were placed into the beam and calibration of the CT scanner was performed before acquiring the images. The X-ray tube parameters were kept the same as that of unfiltered X-ray beam. All the acquired image sets were displayed using Xeleris 2 (GE Healthcare) on a high-resolution monitor. Moreover, Jaszak's SPECT Phantom after removing the spheres was used to see the different contrast intensities by inserting the different contrast materials of iodine and bismuth in water as background media. Images were analyzed for visibility, spatial resolution and contrast. Results: Successive improvement in the image quality was noticed when we increased the filter thickness from 1 to 3 mm. The images acquired with 3-mm filter appeared almost with no artifacts and were visibly sharper. Lower energy photons from X-ray beam cause a number of artifacts, especially at bone-tissue interfaces. Additional filtrations removed lower energy photons and improved the image quality. Degradation in the image quality was noticed when we increased the filter thickness further to 4 and 5 mm. This degradation in image quality happened due to reduced photon flux of the resulting X-ray beam, causing high statistical noise. The spatial resolution for image matrix of 512 × 512 was found to be 1.29, 1.07, 0.64 and 0.54 mm for without filter, with 1, 2 and 3 mm filters, respectively. The image quality was further analyzed for signal-to-noise ratio (SNR). It was found to be 1.72, 1.78, 1.98 and 1.99 for open, with 1, 2 and 3 mm filters respectively. This shows that 3-mm filter results in an improvement of 15.7% in SNR. Conclusion: On the basis of this study, we could conclude that use of 3-mm copper filter in the X-ray beam is optimal for removing the artifacts without causing any significant reduction in the photon flux of the resulting X-ray beam. We also propose that as artifacts have been removed from the images, the value of Hounsfield units will be more accurate and hence the value of attenuation coefficients lead to better contrast and visualization of SPECT images. Keywords: Artifacts, attenuation correction, beam hardening, filtration, image quality, low-dose computed tomography Kheruka S C, Naithani U C, Maurya A K, Painuly N K, Aggarwal L M, Gambhir S. A study to improve the image quality in low-dose computed tomography (SPECT) using filtration. Indian J Nucl Med 2011;26:14-21 Kheruka S C, Naithani U C, Maurya A K, Painuly N K, Aggarwal L M, Gambhir S. A study to improve the image quality in low-dose computed tomography (SPECT) using filtration. Indian J Nucl Med [serial online] 2011 [cited 2020 Jan 20];26:14-21. Available from: http://www.ijnm.in/text.asp?2011/26/1/14/84595 The theoretical foundations for the tomographic image reconstruction were laid as early as 1917 when Radon described a transform which relates the properties of an object to projections measured at angles around the object. [1] This was later extended to X-ray imaging by Cormack. [2],[3] At about the same time, Kuhl and Edwards used optical superposition to reconstruct slices from projections acquired with a rectilinear scanner. [4] While these pioneering works provided the foundation for computed tomography (CT). Later on Hounsfield described a method for obtaining tomographic slices with a rotating X-ray tube [5] that computer assisted tomography (CAT or CT) was established in medical imaging. The techniques developed for X-ray CT were subsequently applied to nuclear medicine by initially rotating the patient in front of the gamma camera detector and subsequently rotating the detector around the patient. [6],[7],[8],[9] A detailed treatise on performing emission-CT with modified conventional gamma cameras, including instrumentation, acquisition and reconstruction implications was published by Larsson. [10] The technique of performing tomographic imaging of an isotope which emits single-energy photons with a rotating gamma camera is referred to as single photon emission computed tomography (SPECT). Most current commercial gamma cameras are available with SPECT capability. Traditionally, SPECT systems were based on a single rotating detector. The sensitivity of the gamma camera can be improved by using more than one detector. This also has the potential to reduce the study time and improve the quality of the study. Photon attenuation and scattering are two of the most critical factors in achieving high quantitative accuracy in SPECT imaging. Photons emitted by radiopharmaceuticals can undergo photoelectric interaction with the inner-shell atomic electrons of a medium and get completely absorbed by the medium. On the other hand, photons can be Compton scattered when they interact with the loosely bound electrons in the medium. The energy of the scattered photons can be lower than or the same as that of the incident photons. In the body, due to the low atomic number (Z) composition of the soft tissue and water, Compton scattering dominates. Since these factors are related to the density and composition of the body tissues, it is crucial to have access to individual attenuation maps to account for the attenuation and scatter effects when high quantitative accuracy is desired. It requires accurate measurement of attenuation, particularly in highly heterogeneous areas (e.g. thorax). For non-uniform attenuation correction, usually a transmission study can be performed prior to the emission scan, but it doubles the time and increases the chance of misregistration. To overcome this problem, efforts have been made to perform simultaneous measurements of emission and transmission. Several radioisotopes have been employed for this purpose including 153 Gd (100 keV), 99m Tc (140 keV), 241 Am (59 keV), and 57 Co (122 keV). The main drawback of this technique is that transmission data also are contaminated by scatter events from the higher energy windows. The situation is further complicated when the emission source or transmission source has multiple energy peaks due to downscatter from the upper energy and spillover from the lower energy windows. These contaminations in the transmission window hamper the reconstruction of the attenuation map. [11],[12],[13],[14] The problem with this technique is requirement of frequent replacement of the transmission source which is not cost-effective for routine practice. Recent advances in radionuclide imaging technology have provided a new and powerful tool to handle this dilemma: integrated SPECT/CT systems. This work was pioneered by Lang and Hasagawa et al., [15] who, not only combined hardware components into an integrated system but also developed important algorithms for SPECT attenuation correction using CT images. This technology makes it possible to acquire physiologic and anatomic images in a registered format and fuse them so that precise anatomic localizations of radiopharmaceutical distributions can readily be visualized. An additional benefit of this technologic advance is that the anatomic images can be used to perform high-quality attenuation corrections of the radiopharmaceutical distributions. CT images are acquired as transmission maps with a high photon flux and are actually high-quality representations of tissue attenuation and thus can provide the basis for attenuation correction. Therefore, combining SPECT and CT modalities into an integrated system is a significant advancement because the two modalities are complementary in that the weaknesses of one are often the strengths of the other in specific imaging situations. CT images are acquired by using a high-output X-ray tube and an arc of detectors in a fixed geometry to acquire cross-sectional transmission images of the patient as the X-ray tube and detector configuration rapidly rotates around the patient as shown in [Figure 1]a and b. The integration of SPECT and CT systems into a single imaging unit sharing a common imaging table provides a significant advancement in technology because this combination permits the acquisition of SPECT and CT data sequentially in a single patient study, with the patient in an ideally fixed position. Thus, the two datasets can be acquired in a registered format by appropriate calibrations, permitting the acquisition of corresponding slices from the two modalities. The CT data can then be used to correct for tissue attenuation in the SPECT scans on a slice-by-slice basis. Because the CT data are acquired in a higher-resolution matrix than the SPECT data, it is necessary to decrease the resolution of the CT data to match that of SPECT. In other words, the CT data are blurred to match the SPECT data. From the attenuation coefficient data acquired with CT, correction factors can then be determined as shown in [Figure 2]b, which can then be used to correct the SPECT data [Figure 2]a for attenuation, yielding the attenuation-corrected SPECT data as shown in [Figure 2]c. One additional topic must be addressed to ensure the accuracy of the attenuation correction. The output of the X-ray tube used in CT provides a spectrum of photon energies from 0 keV up to the maximum photon energy (kVp = peak energy in keV) setting used for the acquisition, as shown in [Figure 3]. Because low-energy photons are preferentially absorbed in tissue, the beam spectrum shifts toward the higher energy end as it passes through more tissue, thereby changing its effective μ and producing a variety of artifacts (beam-hardening effects) in images, and filtering of the beam to remove low-energy photons is required. Figure 1: (a and b) CT data are acquired in fan beam geometry where individual rays represent transmitted photon intensities from multiple projections around patient. (c and d) These data can be reformatted into orthogonal geometry similar to that used for SPECT Figure 2: (a) Can be determined from attenuation coefficient measurements determined from CT scan and are used to correct emission counts from uncorrected SPECT scan; (b) Array of attenuation correction factors; (c) to provide final attenuation-corrected SPECT scan Figure 3: Typical energy spectrum of X-rays from X-ray tube. Filtered curve shows effects of filtration (beam hardening), which is used for CT. These data can be applied for attenuation correction of single-photon emitters such as 99mTc using bilinear model shown in Figure 6 In the present work, we attempted to remove low-energy photons by introducing additional copper filters in the X-ray beam. CT specification This study was performed on dual-head SPECT system (HAWKEYE 4, GE Healthcare Technologies Waukesha, Wisconsin, USA) with low-dose MDCT (4-slice) [Figure 4]. The technical details of the CT scanner have been summarized in [Table 1]. Figure 4: SPECT-CT system Table 1: Technical details of low-dose MDCT scanner The use of a single gantry for the SPECT and CT systems results in a relatively low CT rotation speed of 23 s/rotation for the Hawkeye, as operated with heads opposite (H mode). Together with its X-ray tube operating only at 1.0-2.5 mA, exposures per rotation from 14.0 mA in half-rotation mode to 57.5 mA in full-rotation mode are achieved. Hence, the maximum exposure is roughly three times lower than in a typical diagnostic scan used in clinical routine (150 mA). The Hawkeye image slice width is fixed at 5.0 mm, whereas the slice width in diagnostic scanners is usually variable over a wide range. For tomographic image reconstruction, there are three frequency filters available for the Hawkeye, called "std" (standard), "soft" and "bone". The matrix dimension of the reconstructed image is 512 × 512 pixels. Attenuation correction using CT CT-based attenuation correction in SPECT-CT is much faster and introduces far less noise than the attenuation correction based on transmission scans in standalone SPECT systems. However, the sensitivity of the CT to dense materials such as metal implants and the conversion from CT Hounsfield units to SPECT attenuation correction factors can produce artifacts. The traditional approach is to start from the (diagnostic) CT image and derive an attenuation map with reduced resolution. Attenuation effects vary with energy, as shown in [Figure 5] (a). In addition, the magnitude of the attenuation effect depends on the tissue type, as shown in [Figure 5] (b). It is necessary to convert the attenuation data acquired with CT to match the energy of the radionuclide used in the SPECT acquisitions. This is typically accomplished by using a bilinear model [12],[13],[14] relating attenuation coefficients at the desired energy to CT numbers measured at the effective energy of the CT beam of X-rays, as shown in [Figure 6]. For CT numbers less than 0, the measured tissue is assumed to be a combination of air and water, and the attenuation coefficient at the desired energy (i.e. 140 keV) can be calculated from the CT number by the following equation: Figure 5: (a) Plot of percentage of transmitted photons as function of depth in 20-cm cylindrical Phantom measured in single planar projection image for radionuclides commonly used in nuclear medicine. (b) Plot of percentage of transmitted photons from 99mTc source as function of depth in lung, water, and bone Figure 6: Bilinear model commonly used for converting measured CT numbers to attenuation coefficients for specific radionuclide such as 99mTc This equation describes the first component of the bilinear curve in [Figure 6]. For CT numbers greater than 0, the conversion is more complicated because the measured tissue is a combination of water and bone. In this case, the attenuation coefficient at the desired energy (140 keV) can be calculated from the CT number by the following equation: This equation describes the second component of the bilinear curve in [Figure 6]. In practice, the various attenuation coefficients for specific photon energy used in the SPECT acquisition and the effective photon energy used in the CT acquisition can be found in a stored look-up table in the reconstruction algorithm. The conversion can then be performed using two simple linear relationships relating the attenuation coefficient at the desired energy and the measured CT numbers for specific measured tissues. There are numerous advantages in the use of CT data for attenuation correction of emission data. First, the CT scan provides a high photon flux that significantly reduces the statistical noise associated with the correction in comparison to other techniques (e.g. radionuclides used as transmission sources). Also, because of the fast acquisition speed of CT scanners, the total imaging time is significantly reduced by using this technology. Another advantage related to the high photon flux of CT scanners is that attenuation measurements can be made in the presence of radionuclide distributions with negligible contributions from photons emitted by the radionuclides (i.e. post-injection CT measurements can be performed). The use of CT also eliminates the need for additional hardware and transmission sources that often must be replaced on a routine basis. Also, of course, the anatomic images acquired with CT can be fused with the emission images to provide functional anatomic maps for accurate localization of radiopharmaceutical uptake. Contrast-to-noise ratio The contrast-to-noise ratio (CNR) is an objective measure of the ability of an imaging system to detect large details. CNRs were determined by analyzing sectional images of the cylindrical syringe placed in water-filled Jaszak's Phantom and CT QA Phantom [Figure 7]. Circular regions of interest (ROIs) with 10 mm diameter were placed on the image of detail and on the background (BG) as indicated in [Figure 8]. Following the approach described by Gupta et al.,[15] CNRs were derived from mean CT numbers (CT) in the ROIs and the standard deviations (SD) in the background ROI as: Figure 7: Jaszak's SPECT QA Phantom Figure 8: Cross-sectional views of the Phantoms: (a) Jaszak's Phantom; (b) CT Phantom Phantom studies As our intention was only to see the effect of beam hardening on the attenuation map, no SPECT study was performed. Phantom study 1 was performed to evaluate the performance of streak artifact suppression in the presence of very dense objects. To remove the low-energy photons from the X-ray beam, copper filters having thicknesses ranging from 1 to 5 mm were fabricated. The copper filters were designed in such a manner that they fit exactly on the collimator cover of CT X-ray tube. Appropriate fixation of the copper filter was ensured before starting the image acquisition. Water, iodine and bismuth contrast filled into three syringes of 2.5 ml having needles with lumen diameter of 24 gauge were introduced into a Jaszak's SPECT Phantom after removing the spheres. The cross-sectional area of the contrast-filled syringe was 54.11 mm 2 . The water was filled in the Phantom to simulate the body. The concentrations of the iodine and bismuth contrast materials were 375 and 500 mg/ml, respectively. First, the Phantom was scanned without any additional copper filter into the X-ray beam. Then filters of copper ranging from 1 to 5 mm were introduced consecutively into the X-ray beam. The CT scanner was re-calibrated each time with the respective copper filter before scanning the Phantom. Images were analyzed for visibility, spatial resolution and contrast. To see the effect of heterogeneity interfaces on the image, cylindrical portion of the syringe having diameter of 8.3 mm with iodine concentration of 375 mg/ml inserted into the Phantom was used. The cross-sectional area of the contrast syringe has been assessed to see the effect of artifacts due to high-low density interfaces. All the acquired image sets were displayed using Xeleris 2 (GE Healthcare) on a high-resolution monitor. To verify the findings of the Phantom 1 study, we used CT QA Phantom (PHILIPS) having six different density rods of Water, Polyethylene, Nylon (Aculon), Lexan, Acrylic (Perspex) and Teflon. The Phantom was scanned first without any additional filtration of the X-ray beam. Then copper filter of 3-mm thickness was introduced and CT re-calibrated. The X-ray tube parameters were kept the same as those without copper filter. All the acquired image sets were displayed using Xeleris 2 (GE Healthcare) on a high-resolution monitor. Phantom study 1 Successive improvement in the image quality was noticed when we increased the filter thickness from 1 to 3 mm. Basically, improvement in the image quality was noticed as reduction in streak artifacts which used to be very significant problem due to very fast attenuation of lower energy X-ray photons. The images acquired with 3-mm filter appeared almost with no artifacts and were visibly sharper [Figure 9]a-d. It was in accordance with our expectation as additional filtration removed lower energy photons from the resulting X-ray beam, causing a number of artifacts, especially at bone-tissue interfaces. A degradation in the image quality was noticed when we increased the filter thickness further [Figure 10]. We feel that this degradation in image quality happened due to reduced photon flux of the resulting X-ray beam, causing high statistical noise. The spatial resolution for image matrix of 512 × 512 was found to be 1.29, 1.07, 0.64 and 0.54 mm for without filter, with 1, 2 and 3 mm filter, respectively [Figure 11]a-d. The scatter graph of spatial resolution versus additional copper filter is shown in [Figure 12]. The cross-sectional areas measured on CT image of the iodine-contrast syringe have been found to be 68.55, 59.77, 58.01 and 53.61 mm 2 for without filter, with 1, 2 and 3 mm filters, respectively. The effects of additional copper filtration on area estimation have been plotted in [Figure 13]a and b. Due to lot of artifacts, the cross-sectional area of the contrast syringe measured on image without filter results in an error of 26.68%, whereas for the images with 1, 2 and 3 mm filters, the estimated error was found to be 10.46, 7.21 and 0.92%, respectively. This shows an improvement of 25.76% with 3-mm filter as compared to without any additional filter. The image quality was further analyzed for CNR for iodine-filled cylindrical syringe. It was found to be 18.31, 19.54, 20.06 and 23.49 for no additional filter, with 1, 2 and 3 mm filters, respectively. The effect of additional copper filtration on CNR has been plotted in [Figure 14]. This shows that 3-mm filter results in an improvement of 5.18 in CNR as compared to that without any additional filter. Figure 9: Acquired CT images of Jaszak's Phantom without and with different thickness of copper filters: (a) without filter (b) 1 mm (c) 2 mm (d) 3 mm Figure 10: Cross-sectional images acquired with (a) 4 mm (b) 5 mm additional copper filter Figure 11: Spatial resolution spectrum: (a) open beam (b) 1 mm filter (c) 2 mm filter (d) 3 mm filter Figure 12: Spatial resolution versus additional copper filter thickness Figure 13: (a) Estimated cross-sectional area of the cylindrical syringe versus additional copper filter thickness. (b) % error reduction in area estimation versus additional copper filter thickness Figure 14: Contrast-to-noise ration versus additional copper filter thickness The axial images acquired without any additional filter had a lot of streak artifacts, especially at metallic interfaces, due to beam-hardening effect. As expected from Phantom study 1, the axial image acquired with 3-mm filter was almost free from streak artifacts [Figure 15]a and b. The images were further analyzed for the CNR for the three rods of Lexan, Acrylic and Tefnol. Significant improvement in the CNR was found for all the three rods. The CNR value changed from 3.72 to 5.30, from 3.82 to 5.29 and from 4.15 to 7.51 for Lexan, Acrylic and Tefnol respectively [Table 2]. The resolution pattern was very clearly visualized in the cross-sectional image acquired with 3-mm copper filter compared to the image acquired without additional filter [Figure 16]a and b. Figure 15: Streak artifacts on metal interfaces: (a) with no additional filter, (b) with additional 3-mm copper filter Figure 16: Visualization of resolution pattern: (a) without additional filter and (b) with additional 3-mm copper filter Table 2: Contrast-to-noise ratio estimated from PHILIPS CT Phantom Beam hardening and scatter-induced artifacts in the CT image can have a similar appearance in the emission image. Metal artifacts in the CT image can severely distort the attenuation-corrected images, making these images effectively useless as reported by Johan Nuyts et al. on PET/CT images. [16] These effects are illustrated with an abdominal test Phantom. Nowadays, full diagnostic CT units are combined with SPECT (e.g. Philips Precedence) and also in PET (e.g. GE Discovery). With the Hawkeye, however, GE offers a low-cost SPECT-CT unit where the CT scanner is mounted to the same gantry as the SPECT system and operates at low dose. The construction of the CT scanner differs significantly from conventional diagnostic CT units. The rotation speed of the Hawkeye gantry is 23 s/rotation, which is dramatically lower than the typical speed of modern diagnostic systems (<1 s/rotation). Apart from significantly prolonging the overall SPECT-CT scanning time (a scan of 40 cm corresponding to the SPECT axial field of view takes about 5 mins), CT image quality may be compromised by motion artifacts due to cardiac motion, breathing and voluntary movements. [17] The maximum applicable dose of the Hawkeye X-ray tube is roughly three times smaller than the dose used in routine clinical diagnostic scans, although scans can be acquired at similar dose levels on diagnostic systems. It has to be noted, however, that a standard diagnostic system (with roughly three times higher dose) outperforms the Hawkeye significantly. In cases where patient dose is an issue, Hawkeye offers diagnostic advantages in low-contrast detail detection. Reduced radiation risk, however, has to be put into context of the overall patient exposure in a SPECT-CT examination. After all, it is a clinical decision if a patient would benefit from the information of a full diagnostic CT examination. Attenuation correction problem in SPECT and PET imaging has been studied by several authors and various methods have been proposed to tackle this problem. [18],[19],[20],[21],[22] All manufacturers of SPECT scanners incorporate X-ray CT-based attenuation correction algorithms in their systems, and for some PET scanners, it is the only option offered. The bilinear and hybrid scaling methods work well for clinical procedures where only biological materials are being imaged. There are remaining challenges, however, that can cause errors in the converted attenuation correction factors caused by contrast agents and respiratory motion as well as truncation and beam hardening. Errors that are present in the CT-based attenuation image have the potential of introducing bias or artifacts in the attenuation-corrected SPECT emission image as studied by Paul Kinahan et al. for PET/CT systems. [23] These effects are illustrated with an abdominal test Phantom containing aqueous F-18 FDG with a concentration of 4 kBq/ml, which is typical of a whole-body FDG PET scan. Uncorrected beam hardening and scatter build-up reduces measured attenuation along the lines of high attenuation between the arms. On the basis of this preliminary study, we conclude that use of 3-mm copper filter to harden the X-ray beam is optimal for removing the artifacts without causing any significant reduction in the photon flux of the resulting X-ray beam. We found that image quality has improved significantly with almost no artifact, which is a very common problem seen in inadequately filtered X-ray beams. Significant improvements in the CNR and spatial resolution were also noticed in all image sets acquired with 3-mm additional copper filter. We propose that as artifacts have been removed from the images, the value of Hounsfield units will be more accurate and hence the value of attenuation coefficients lead to better spatial resolution, contrast and visualization of SPECT images. We wish to extend this work to see the effect of improved attenuation map on the SPECT images. 1. Radon J. Uber die bestimmung von funktionen durch ihre integralwerte langs gewisser manningfaltikeiten (on the determination of functions from the integrals along certain manifolds). Berichte Saechsische Akademie der Wissenshaft 1917;29:262-77. 2. Cormack AM. Representation of a function by its line integrals with some radiological applications. J App Phys 1963;34:2722-7. 3. Cormack AM. Representation of a function by its line integrals with some radiological applications II. J App Phys 1964;35:2908-13. 4. Kuhl DE, Edwards RQ. Image separation radioisotope scanning. Radiology 1963;80:653-62. 5. Hounsfield GN. Computerized transverse axial scanning (tomography): Part 1. Description of the system. Br J Radiol 1973;46:1016-22. 6. Budinger TF, Gullberg GT. Three-dimensional reconstruction in nuclear medicine emission imaging. IEEE Trans Nucl Sci 1974;21:2-20. 7. Budinger TF, Gullberg GT. Transverse section reconstruction of X-ray emitting radionuclides in patients. Reconstruction tomography in diagnostic radiology and nuclear medicine. Baltimore: University Park Press; 1977. p. 315-42. 8. Budinger TF, Gulberg GT, Huesman RH. Emission computed tomography, In: Herman GT, editor. Topics In Applied Physics, Image Reconstruction From Projections, Implementation And Application. New York: Springer Verlag; 1979. p. 147-246. 9. Gustafson DE, Berggren MI, Singh M and Dewanjee MK. Computed transaxial imaging using gamma emitters. Radiology 1978;129:187-94. 10. Larsson SA. Gamma camera emission tomography. Acta Radiol suppl 1980;363:1-75. 11. Beekman FJ, Kamphuis C. Effects of truncation of transmission projections on cardiac SPECT images acquired by a right-angle dual-camera with half-fan-beam collimators. IEEE Trans Nucl Sci 1998a;45:1174-8. 12. Tan P, Bailey DL, Meikle SR, Eberl S, Fulton RR, Hutton BF. A scanning line source for simultaneous emission and transmission measurements in SPECT. J Nucl Med 1993;34:1752-60. [PUBMED] [FULLTEXT] 13. Heller EN, Deman P, Liu YH, Dione DP, Zubal IG, Wackers FJ, et al. Extra cardiac activity complicates quantitative cardiac SPECT imaging using a simultaneous transmission-emission approach. J Nucl Med 1997;38:1882-90. 14. Almquist H, Arheden H, Arvidsson AH, Pahlm O, Palmer J. Clinical implementation of down-scatter in attenuation-corrected myocardial SPECT. J Nucl Card 1999;6:406-11. 15. Gupta AK, Nelson RC, Johnson GA, Paulson EK, Delong DM, Yoshizumi TT. 2003 Optimization of eight-element multi-detector row helical CT technology for evaluation of the abdomen. Radiology 2003;227:239-45. 16. Nuyts J, Stroobants S, Dupont P, Vleugels S, Flamen P, Mortelmans L. Reducing loss of image quality due to the attenuation artifact in uncorrected PET whole body images. J Nucl Med 2002;43:1054-62. 17. Lang TF, Hasegawa BH, Liew SC, Brown JK, Blankespoor SC, Reilly SM, et al. Description of a prototype emission-transmission computed-tomography imaging system. J Nucl Med 1992;33:1881-7. 18. Hamann M, Aldridge M, Dickson J, Endozo R, Lozhkin K, Hutton BF. Evaluation of a low-dose/slow-rotating SPECT-CT system. Phys Med Biol 2008;53:2495-508. 19. LaCroix KJ, Tsui BMW, Hasegawa BH, Brown JK. Investigation of the use of X-ray CT images for attenuation compensation in SPECT. IEEE Trans Nucl Sci 1994;NS-41:2793-9. 20. Blankespoor SC, Xu X, Kalki CK, Brown JK, Tang HR, Cann CE, et al. Attenuation correction of SPECT using X-ray CT on an emission-transmission CT system: Myocardial perfusion assessment. IEEE Trans Nucl Sci 1996;NS-43:2263-74. 21. Fricke H, Fricke E, Weise R, Kammeier A, Lindner O, Burchert W. A method to remove artifacts in attenuation-corrected myocardial perfusion SPECT introduced by misalignment between emission scan and CT-derived attenuation maps. J Nucl Med 2004;45:1619-25. 22. Fricke E, Fricke H, Weise R, Kammeier A, Hagedorn R, Lotz N, et al. Diethelm tschoepe and wolfgang burchert, attenuation correction of myocardial SPECT perfusion images with low-dose CT: Evaluation of the method by comparison with perfusion PET. J Nucl Med 2005;46:736-44. 23. Kinahan PE, Hasegawa BH, Beyer T. X-ray-based attenuation correction for positron emission tomography/computed tomography scanners. Semin Nucl Med 2003;23:166-79. [Figure 1], [Figure 2], [Figure 3], [Figure 4], [Figure 5], [Figure 6], [Figure 7], [Figure 8], [Figure 9], [Figure 10], [Figure 11], [Figure 12], [Figure 13], [Figure 14], [Figure 15], [Figure 16] 1 A new approach for scatter removal and attenuation compensation from SPECT/CT images Oloomi, S., Noori Eskandari, H., Rasoul Zakavi, S., Kalantari, F., Hajizadeh Saffar, M. Iranian Journal of Basic Medical Sciences. 2013; 16(11): 1181-1189 2 A new approach to scatter correction in SPECT images based on Klein-Nishina equation Saffar, M.H., Oloomi, S., Knoll, P., Taleshi, H. Iranian Journal of Nuclear Medicine. 2013; 21(1): 19-25 Kheruka S C Naithani U C Maurya A K Painuly N K Aggarwal L M Gambhir S attenuation correction beam hardening low-dose computed tomography Cited by others 2
cc/2020-05/en_middle_0097.json.gz/line1418196
__label__cc
0.670473
0.329527
Label Bundle Giveaway! NOW ENDED! in Allotment / Competition / Give-away / Handmade / Lavender and Leeks / Metalwork / Shop It’s February and the growing season is slowly coming out of hibernation. Seeds are starting to be sown, perennials are showing signs of life and Spring bulbs are starting to pop out from underneath their layer of soil. It’s going to be a hectic few months so to make your life a little bit easier we’re giving away one set of our slate label bundles which includes 4 real slate labels, 4 small metal crooks and a fine waterproof chalkboard pen! Read more about the bundle here: http://www.lavenderandleeks.co.uk/shop/grow/4-slate-plant-labels-copy/ These are not only perfect for labeling and keeping track of rows but also look great next to perennial flowers, vegetables or fruit. And what’s even better is that the waterproof pen can be removed by using anything with ammonia in it (we use oven cleaner!) so they can be re-used again and again! All the metal work is handmade in Hampshire by my Dad and we cut the slate labels here too. To enter simply comment below with your full name and what you are most looking forward to growing this year. All entrants must be from the UK only I’m afraid and the giveaway will end at 10pm on Saturday the 10th of February. The winner will be announced at 9am on Sunday, good luck! Website: http://www.lavenderandleeks.co.uk Label Crooks Metal Crooks Slate Labels Waterproof Pen Seed Storage Giveaway Allotment Care Plot 15C Manure Bin DIY Handmade Beauty Hamper 128 thoughts on “Label Bundle Giveaway! NOW ENDED!” Simon Ruth Sam and Jacob on February 5, 2018 at 10:04 am said: What a good idea, these look so much nicer than our white plastic ones. We’re trying a couple of newbies this year, and especially looking forward to eating some Cucamelons and Physalis. Esme Lee on February 8, 2018 at 10:33 am said: Hi there Katie, I’m trying to introduce colleagues at work to try more interesting tomatoes each year as they seem afraid of anything that is not conventionally red and round, last year I introduced them to yellow pears and beautiful sweet sungolds and tigrellas, this year I’m trying lots of different green varieties 🙂 Esmé Sasha Ivanova on February 5, 2018 at 10:09 am said: Good morning Katie! Great giveaway – I always manage to mislabel my seeds! This year I am looking to grow some new edibles Oca, Achocha, Aztec Broccoli, Callaloo, Kabocha & Ute Indian squashes, Purple Shiso and Aji Lemon chilli. Hollie Ramsey on February 5, 2018 at 10:13 am said: I’m looking forward to growing peas for the first time and getting my 4 year old more involved. Vicki Doran on February 5, 2018 at 10:15 am said: We have just got our first plot & with 4 children we are Looking forward to growing many things as long as we succeed at something we will be happy. ☺️ Sara Jolly on February 5, 2018 at 10:28 am said: Just taken on a second half plot to grow more fruit, I’m looking forward to growing Blueberries. Sara Jolly. Xx Lori laing on February 5, 2018 at 10:29 am said: I’m really excited to grow our Pacific giant squash! They can get to 20kilo without much looking after and I think the record last year was a 60kilo squash! Must find a good squash soup recipe by autumn!! X Richard Suggett on February 5, 2018 at 10:30 am said: This labels look stunning and would go so well in my 1930’s house. As always enjoying your blog posts, so please keep up the good work. Karen Scammell on February 5, 2018 at 10:34 am said: Sunflowers for my wedding 💒 🌻 😍 ♥ Chris Pluck on February 5, 2018 at 10:37 am said: I always get the most joy from my potato harvest – so many stages to go through “yay,they’ve chitted” “yay,they’re growing” “yay,I’ve actually managed to earth them up” and all the time you have no idea what, if anything is developing down there. And then that first tentative dig……..and almost always the sheer wonder at such bounty and beauty. And it doesn’t end there ……..the taste, the flavour, the satisfaction, the pride! Yes, potatoes do it for me . Sarah Blenkinsop on February 5, 2018 at 10:43 am said: I’m looking forward to growing all my bee friendly flowers this year 🐝💐 Susie on February 5, 2018 at 10:45 am said: Love those labels .looking forward to growing my first cabbages this year ! Jade McGarvie on February 5, 2018 at 10:47 am said: Such a beautiful giveaway. We are most looking forward to growing sweetcorn this year. Kirsty Vigor on February 5, 2018 at 10:52 am said: This year I’m really looking forward to growing the following from seed for the first time… Larkspur, Cleome, Ammi Visnaga, Cosmos ‘Cupcakes’, Scabiosa & Icelandic Poppies.. there will also be Purple Carrots! My 8 & 4 yr old Nieces & I have already sown, Broad beans, Sweet Peas, Basil, Chives, Parsley & Cress! Happy Growing everyone 🌱🌿💚 Nicola McConnell on February 5, 2018 at 11:03 am said: Hello! I’ve had my plot for 2 years and I’m looking forward to growing onions & shallots from seed rather than sets this year, and trying kuri squash. Can’t wait to get going 😊 Julia Rowley on February 5, 2018 at 11:08 am said: Looking forward to growing French beans.😊 Sarah Dunscombe on February 5, 2018 at 11:11 am said: Well as a newbie I’m looking forward to growing potatoes, garlic, onions, carrots and lots of flowers. Our garden has had a makeover and leaves loads of room for me to experiment and experiment I will! RUBY CLAXTON on February 5, 2018 at 11:30 am said: I have to admit..that it’s kinda like picking your favourite child..as to what i’my looking forward to growing..but last year, I was astounded at how the chrysanthemums I grew lasted as cut flowers.! Sarah Raven has some amazing varieties which I will attempt to grow in the “cutting garden”-!! Sara on February 5, 2018 at 11:35 am said: Anything and everything! It’s my first full year on the allotment so I’ll be happy with what ever we grow on our little patch of land! Excited to see what the new season brings!! John on February 5, 2018 at 11:48 am said: Looking forward to everything, my first year on plot Margaret on February 5, 2018 at 11:57 am said: Those labels look great! I’m looking forward to growing peas and beans again this year, they are our favourite summer vegetable. I also want to grow purple sprouting broccoli, which I grow every year but last year didn’t get around to sowing the seed and I’ve missed not having them on the allotment. Gemma Cook on February 5, 2018 at 11:59 am said: I love growing Fruit and Veg in our garden. I’m looking to adding tomatoes, Strawberries & Potatoes this year. Collette on February 5, 2018 at 12:04 pm said: I’m looking forward to growing everything! I gave up my allotment last year so I’ve finally put raised beds into my tiny little town garden. At last, I am able to grow plants that need deep roots. I can’t decide what I am looking forward to growing the most, corn, sweet peas, or a new variety of tomato!! Karina Davis on February 5, 2018 at 12:06 pm said: This is our first year on the plot so everything is exciting to us (!) but we’re looking forward to growing ‘Nuns Belly Button’ Beans which we picked up at Seedy Sunday. 🌱 Sherree on February 5, 2018 at 12:15 pm said: I love these labels ❤ I’m relatively new to growing last year I grew onions, potatoes and a small selection of herbs. This year I’m growing onions, potatoes, garlic, spring onions and extending my herb’s (thank you for recommending the handmade apothecary- I love it 😊) I’m really excited to see how much I can get from my small garden space 😊 Heulwen Hughes on February 5, 2018 at 12:22 pm said: We’re looking forward to planting our mixed variety of bulbs in March. Plan to get an old tin bath! Also looking forward to planting out more rainbow chard and trying sweet candle carrots to show at this year’s allotment show. Katie-Scarlett Roberts on February 5, 2018 at 12:22 pm said: Hey Katie! I’m looking forward to starting a veg patch so everything is new to me. However, the only thing I have grown before is sweetcorn 🌽 so I’m excited to grow it again! Happy planting. Sarah Howard on February 5, 2018 at 12:43 pm said: As a new allotmenteer, I am looking forward to growing everything!! I’ve still got a bit of clearing to do and raised beds to make and then I’ll be ready to start planning 🙂 Love your insta account – thanks for the inspiration x Megan on February 5, 2018 at 12:43 pm said: Love these, I’ve only just started following you and I’ve not seen labels hanging before! It’s such a great idea, my labels are forever getting lost when the veg grows over them. I’d love some labels for my little herb garden I’m planning on growing. Lynn Bright on February 5, 2018 at 12:46 pm said: Hi Katie my Allotment has been rather neglected over the last couple of years for one reason or another. You know how it is! This year I am aiming at growing a variety of crops including potatoes in buckets, runner beans, sweet corn and peppers alongside my fruit bushes. These plant labels are great and will help to spruce it up. Roll on Spring! Maureen Webster on February 5, 2018 at 12:47 pm said: Looking forward to two main things this year – my first raspberries, and introducing some bee friendly flowers to brighten up the beds (and help the harvests!). Emma king on February 5, 2018 at 12:47 pm said: Good morning Katie. I’m most looking forward to using my heirloom seeds that I brought last year. I didn’t get to plant them as we had a surprise addition to the family, baby no.3! 😊 I have some beautiful sweetcorn I’m hoping to have some success with and some lovely berlotti beans I want to try. Rachael on February 5, 2018 at 12:50 pm said: I always admire these labels in your photos! Tomatoes will be new to my plot this year and I’m excited for summer salads and maybe even some chutney at the end of the season 🙂 Victoria Menzies on February 5, 2018 at 1:03 pm said: I’m looking forward to growing leeks for the first time!! It will be good to get some practice in before I get an allotment next year! Jennifer Mcclenaghan on February 5, 2018 at 1:11 pm said: This will be my first full year of growing veg. Last year I finally finished building my raised beds. These labels look fantastic!! Dawn Warden on February 5, 2018 at 1:41 pm said: I’m growing quite a lot of new things this year, want to try and get the most from the garden this year, think what I’m most looking forward to growing are the carrots Clare Crawford on February 5, 2018 at 1:42 pm said: Beautiful ! Love seeing what you are up to on your allotment. I’ve got a new veg patch at home so am growing lots .. potatoes, brassicas, beans , beetroot , salad crops , and lots of soft fruit… exciting Gaynor Witchard on February 5, 2018 at 1:55 pm said: As a new plot holder, I’m looking forward to just growing! Your site & blog have given me some fresh ideas!! Barry Gibson on February 5, 2018 at 2:09 pm said: I am most looking forward to seeing my tulips come into bloom, I can see them all poppping up out of the soil currently so they won’t be long now. I’m also hoping our plum tree will fruit this year! Francesca Page-Smith on February 5, 2018 at 2:10 pm said: Just taken on plot no.2 and really excited about trying a pumpkin arch this year! Also will be planting up a dahlia bed and trying some new herbs, with lots of different mints for teas and some lovely rosemary. Just found some very hardy coriander whilstclearing the plot, so it looks like I’ve made a start on the herbs already! Annette Grist on February 5, 2018 at 2:41 pm said: Still a beginner with my little veggie patch, it’s my favorite place to be. Beetroot grew well last year but the broccoli has gone a bit weird and sweetcorn was rock hard. I love seeing what you do on your plot. Very inspiring, I think I’ll be trying to grow more salad options this year so the slate labels would be brilliant. X Jemma Shoobridge on February 5, 2018 at 2:42 pm said: Hi Katie, I’m looking forward to my greenhouse being full of tomatoes, and trying to grow aubergine for the first time x Charlotte Bowker on February 5, 2018 at 2:42 pm said: I am most looking forward to growing Charlotte potatoes!! This is our first summer in our first house and our veg patch is ready and waiting!! Yasmin Cordell on February 5, 2018 at 2:46 pm said: I just got my allotment late last year and I’ve been super inspired by your posts. I’m looking forward to growing little white “peekaboo” pumpkins ready for later in the year. I have set aside a large space for a cut flower garden and I can’t wait to grow some dahlias to cut and bring home. Fab competition. Good luck everyone, x Val on February 5, 2018 at 2:47 pm said: Hi Katie , I am looking forward to growing some new rocket seeds I found called ” dragons tongue ” sounds interesting ! I came very close to giving up my allotment this year because of time commitments but I quickly realised it’s in my blood Now and I just am going to have to put other commitments back a little ….I can’t be happy without my allotment now ! Kim Hunter on February 5, 2018 at 2:58 pm said: I can’t wait to grow pumpkins! I have about 7 or 8 different variety’s – my garden is going to be a total pumpkin patch! I’m so looking forward to it x Helen Ridley on February 5, 2018 at 3:02 pm said: Oh how gorgeous! I’m planning a whole new part and way of the garden to grow in!! I’m most excited about growing carrots that are carrot size and not tiny!! Hehehe! Helen Ridley Julie Yates on February 5, 2018 at 3:09 pm said: We got our first allotment in January so I’m excited about growing everything! Your blog and videos are a real inspiration, thank you! Julie Norma Patrick on February 5, 2018 at 3:18 pm said: We haven’t got a very big plot but we try to cram in as much as possible! I’m looking forward to growing potatoes (Charlotte variety), beetroot, courgettes (yellow), onions (mixed variety), and edge the plot with the gloriously scented Spencer Sweet Peas. Ahhhh..Summer! Kelly Diggle on February 5, 2018 at 3:25 pm said: Inspired by you I am looking forward to growing munchkin pumpkins! Saronne Rubyan-Ling on February 5, 2018 at 3:28 pm said: I definitely need to get better at labeling stuff at my allotment. This year I’m really looking forward to growing popping corn and lots of winter squash! Roll on warm weather..! Marion Clevett on February 5, 2018 at 3:34 pm said: I’m looking forward to growing potatoes its just amazing when you dig your harvest, its like finding treasure. Katie Ebbs on February 5, 2018 at 3:42 pm said: Can’t wait to get back in the garden this year, we only grew pumpkins last year as my baby was due at the end of June and I knew I would have my hands full. I would like to try planting some butternut squash and maybe look at a few other varieties too. Carrots are always a family favourite too. 😍 Katie Ebbs Manda Matthews on February 5, 2018 at 3:54 pm said: Cannot wait for the growing season to get going! Looking forward to growing all different kinds of squash, pumpkins, beetroot and… oh, everything else!! 🙂 Iraide on February 5, 2018 at 4:22 pm said: As I commented on your dungarees post, your blog inspired me to start growing my own vegetables and flowers.So this this month, will be my first time growing from seed. I’m excited about the learning process ahead, but in particular about growing tomatoes.🍅🍅 Amelia whybro on February 5, 2018 at 4:31 pm said: Wow such a Great competition. I’m most looking forward to growing sweet peas, I’m trying some different varieties this year and always find they are so simply to grow, such sweet smells, beautiful colours and with a long flowering season what’s not to love about the humble sweet pea. Hayley Johnson on February 5, 2018 at 4:57 pm said: Hi!! This year I’m mostly looking forward to growing flowers! Ready to start planning my wedding bouquet next year Jenny davies on February 5, 2018 at 5:06 pm said: Oh what aren’t I looking forward to those amazing tomatoes, bortollo beans fresh herbs and sweet peas to name a few the only things you can achieve growing your own . I cant wait 😆❤ fabulous set of labels would lovely in my garden very ornate happy nearly spring totally excited now lol Lisa berry on February 5, 2018 at 5:12 pm said: Hya Katie I’m mostly looking forward to growing melons From Lisa Berry 😁 Katie Holland on February 5, 2018 at 5:17 pm said: 😍 these look amazing!! I have an allotment with my Dad and he wants to grow the basics but I’ve got my >>😍 eyes set on ALLL the pumpkins, rainbow carrots and all the different coloured beetroots 😋 So excited! Have followed your IG for a while and now it looks like it’s going to be my Bible 🙈 Thank you for the lovely give away opportunity!!! 🥕🌽🍆 xx Briony Berning-Pollard on February 5, 2018 at 5:26 pm said: I’m looking forward to growing some juicy strawberries! I reckon my one year old will absolutely love them. 🍓🍓🍓 Christina T on February 5, 2018 at 5:37 pm said: I got a free greenhouse last month, so I’m looking forward to growing tomatoes this year. Amy Walsh on February 5, 2018 at 5:46 pm said: These are beautiful! I’m trying aubergines for the first time this year! Emma on February 5, 2018 at 6:25 pm said: I’m most looking forward to growing – absolutely anything! Last year the woodlice ate every scrap of everything I planted, and I have worked tirelessly to get everything off the ground and into containers that woodlice don’t like or can’t access. On top of that I now have 6 little chickens who are happily chomping their way through the population, so I’m hopeful that this year the odd seedling might survive. Survive the woodlice anyway. Now I just have to work out how to keep them safe from the chickens! James Finch-Harding on February 5, 2018 at 6:28 pm said: I’m really looking forward to growing pumpkins and beans this year as these seem to be the only vegetables that my son is interested in growing.. beans because he can make a camp using the bamboo sticks and pumpkins because of Halloween.. but hopefully this year I can introduce some more exciting fruit and veg.. any ideas would be great.. thank you Heather Taylor on February 5, 2018 at 6:35 pm said: Squash, squash and more squash! My favourite are SQUASH UCHIKI KURI. I grew them last year but I didn’t grow enough. Their bright red/orange skins light up my allotment. Katrina Harrison on February 5, 2018 at 7:01 pm said: What a wonderful giveaway, Katie! I would so love to win something that’s been handmade by your dad! The plant labels will fit my mantra that nothing can enter my shed unless it has been handmade, gifted or thrifted! What I am most looking forward to growing this year are Honey Boat squash (from Sutton’s seeds). I had an unusually successful year for squash and this one is meant to be particularly sweet! Thanks for the chance to win, lovely! Sharon Williams on February 5, 2018 at 7:41 pm said: After 2 years clearing and crisis management of our overgrown plot we’re trying to be better organised and looking forward to growing anything and everything. Amanda O'Dowd on February 5, 2018 at 7:45 pm said: I’m looking forward to finishing off growing my baby 🙂 due next month! Plant wise though I’m really hoping to concentrate a bit more on flowers this year rather than vegetables, and maybe successfully grow sweet peas for the first time as I never seem to get them right! Christina Campbell on February 5, 2018 at 7:47 pm said: I’m looking forward to increasing my flowers for cutting this year and hope to sell some at Farmers market locally. First venture into this world for me so a bit daunting but nothing ventured…… Shaun collins on February 5, 2018 at 7:47 pm said: Ahhhhh finally found it (plot bg) ha it’s my first year on the new allotment so looking forward to growing everything! However I’m looking forward to trying my hand at honeysuckle as my nan always used to grow it so it will be like ‘re living my childhood 🙂 when I started watching youtube videos you were one of the first people I come across 🙂 even if I don’t win I think this is fab! Kate Holliday on February 5, 2018 at 8:01 pm said: Hi Katie, last week I discovered your website and have been so enjoying all your posts (I have gone back to the beginning and am reading them all!!). Also last week I got my first allotment – soooooo excited! So this year I am looking forward to growing EVERYTHING! I have been really wanting to grow the pumpkin Munchkin having seen it on your sight and have ordered some seed of that and want to get some arches for it to grow over. I have been considering a wildlife pond and I am planning where it might go and want to grow lots of flowers as well as vegetables and fruit….. at this time of year, when the weeds are few, anything seems possible! Keep up your wonderfully, inspiring posts. Amanda H on February 5, 2018 at 8:12 pm said: Love these plant labels. They are so unusual. This year I’m looking forward to growing crystal lemon cucumbers again, and mini pumpkins, inspired by your YouTube channel. Jan Nairn on February 5, 2018 at 8:23 pm said: Thanks for the chance to win those lovely slate markers. I’m going to grow a flower cutting garden to fill all my many vases and also looking forward to growing pumpkins for the grandchildren, potatoes, leeks and broccoli for soups and lots of lettuce, tomatoes and pea pods for salads xx Kerry D on February 5, 2018 at 8:26 pm said: I’ve just taken on my first half plot and i’m sooooo excited about it! I have a bed for cut flowers and can’t wait to try growing beautiful dahlias, sweet peas and peonies. Blueberries, Butternut squash and Chard are my favourite to eat so I’m keen to try and grow my own this year (fingers crossed) I love reading your blog and Instagram as it gives me such inspiration. Alison Brien on February 5, 2018 at 9:03 pm said: Looking forward to getting my soft fruit bed up and running. Raspberries, strawberries and hopefully a blueberry bush or two if I’m lucky. Also attempting brussels sprouts again (snails got to mine last year) and always sweet peas. Must have sweet peas! Fiona Stokes on February 5, 2018 at 9:14 pm said: Can’t wait to start growing sweet peas. My favourite flower plus lots of cut flowers from Sarah Raven. Going to try and grow some gherkins too. Katie Hilton on February 5, 2018 at 9:18 pm said: I’m really looking forward to growing lots of vegetables with the toddlers in my “muddy buddies” group a group for little people aged 0-5 out in all weathers exploring the great outdoors, nature and growing things together 🌱 these labels will be perfect for marking our seeds and plants as we grow them! x Ciara Britten on February 5, 2018 at 9:25 pm said: Hi Katie, I am looking forward to growing the Munchkins again this year! I love the hazel arch ,y hubby made following the plans of your original one. Lizzie Tubbs on February 5, 2018 at 9:41 pm said: Hello, I’m Lizzie from Bristol and I’m most looking forward to growing spicy mooli for the first time 🙂 Belinda Marks on February 5, 2018 at 9:48 pm said: Looking forward to growing pardon pepper, especially if I get some really hot one’s Curtis on February 5, 2018 at 9:58 pm said: I’ve acquired a section of land between my garden and the field behind. It was thick with brambles, 6ft nettles and many other nasty weeds. I wrote to my local council and asked to buy or take on the land with a view of teaching my 4 year old son where his favourite fruit and veg come from. He’s a fruit and veg monster. Fast forward 6 Months I’ve just put my shed in and levelled the grown and built my raised beds. Now for planting. I can’t wait to get growing at home. I’m hoping I do well with my carrots and also my raspberry’s. To win some really tasteful labels would round it off a treat. Suzanne Charlton on February 5, 2018 at 10:10 pm said: I have 7 different types of squashes that I’m looking forward to trying, but honestly, I’m hoping and looking forward the most to growing sweet peas. My plot was raided by rabbits and deer last year and they ate all the sweet peas before they flowered. Such simple beauty in those flowers so fingers crossed I’ll get to see some this year! Barbara Ann Steward on February 5, 2018 at 10:24 pm said: My cottage garden has fruit bushes mixed with parsley, rocket, and any seeds or plants I take a fancy to. I am naughty about snipping off cuttings that lean over a garden wall or fence. A fig tree cutting eventually gave me a dozen fruits last year, wonderful reminder of my New Zealand home. I keep some dandelions as they taste spicy with lettuce and are full of nutriments. My garden will be a year of surprises as I sow the cheapest from the pound shop with the poshest from Sarah Raven. Many foxglove seeds and lupin seeds saved from last year will be scattered and butterfly bushes mixed with honeysuckle cuttings, roses and clematis for the bumble bees. Belle Epoch have been generously fed to face our Northern climes and like most fellow gardeners, I am brimming with optimism. Contact with nature is so healing and healthy and I am lucky with hubby growing so many organic veggies in his plot. Our neighbouring farmer gifts us a trailer of manure in exchange for computer help from my husband, that is a wonderful exchange for both. Helen on February 5, 2018 at 10:25 pm said: I’m looking forward to growing Chard Bright Lights with my four and eight year old nephews who love the radiant colours. Also looking forward to growing Violetta Beans and rows and rows of peas, I could go on and on, I love my allotment 😊😊🌱🌱 Flora on February 5, 2018 at 10:26 pm said: Hi Katie . At Christmas my son gave me some labels which were part of my Christmas present which he bought from you . Had I known how marvellous they were I would have requested many more . Valerie Caddens on February 5, 2018 at 10:33 pm said: Love these slate signs and would love to add to my existing ones, I’m growing a few new types of fruit and veg this year but most excited about raspberries and celeriac! Suz Reid on February 5, 2018 at 11:05 pm said: They’re so lovely! I’m looking forward to growing squash this year! I’m going to try Crown Prince so fingers crossed for me 🙂 Emily Priest on February 5, 2018 at 11:08 pm said: I am looking forward to growing my #secretseedswap beetroot seeds that were sent to me! Never grown them before so it will be interesting xx Derek Daly on February 6, 2018 at 12:03 am said: Hey Katie, I am intent on growing some loofahs this year after getting so close last year but the young fruit fell off instead. Sophie Paul on February 6, 2018 at 6:58 am said: I’d love to have a go at growing butternut squash this year, yummy! Jenni on February 6, 2018 at 7:37 am said: These are lovely. My husband and I are growing veggies for the first time this year. We have converted a flower bed and we are going to remove some old shrubs to create a raised bed when it isn’t quite so cold! I’ll be looking for lots of advice on your website. Fiona on February 6, 2018 at 7:58 am said: These slate labels look great! Second year for the allotment and concentrating on having year round fodda, so sowing Celeriac, turnips and parsnips. Nothing glamorous about them but very tasty! Belinda on February 6, 2018 at 8:27 am said: I’m looking forward to growing everything I can 😂 but maybe looking forward to trying to grow a flower cutting patch, inspired by Sarah Raven and her books the most, so that I can cut my own beautiful flowers 💐🌷 for my house and for friends 😊💕 xx belinda bartlett on February 6, 2018 at 8:34 am said: Hi Katie, im looking forward to growing just about everything I can. Ive always loved growing my own fruit and veg. Anna Macpherson on February 6, 2018 at 8:45 am said: Wow these are fab! I’m most looking forward to growing tomatoes again this year. Last year was my first attempt and I didn’t pinch them out properly so ended up with ginormous tomato monster plants with not so much fruit….this year I’ve done my reading and made a frame to tie them too and will pinching out left right and centre 😁 Amy Corney on February 6, 2018 at 11:02 am said: I am most looking forward to growing Potatoes, my Dad no longer grows them on his farm and I miss them! Let’s hope I have inherited some of his growing skills! Amy Thomas on February 6, 2018 at 11:29 am said: I love my allotment-its my tiny bit of paradise-overlooking the Wye Downs in Kent. This year my “new thing to grow” is Cavolo nero. I just love those dark crinkly leaves and so I am really looking forward to growing my own and seeing how it turns out. Fingers crossed Helen davis on February 6, 2018 at 11:33 am said: Hi. We have just signed for our allotment a few weeks ago! It’s our first time owning one so we are a bit new to it all! I have 3 young boys and want to include them as much as we can. We are looking forward to getting our allotment tidied up and hopefully being able to grow vegetables we use with our Sunday dinner as a starting point and hopefully progress next year to growing more once we begin to get the hang of everything! Love your page so far it’s really helped me put a plan in place for what we are wanting to achieve 😊 x Harriet on February 6, 2018 at 11:45 am said: I can’t wait to grow tomatoes again this year on my allotment. Nothing beats the smell of tomato plants in the summer! And looking forward to attempting sweetcorn again this year, hoping they won’t all get demolished like they did last year! Corinna on February 6, 2018 at 12:15 pm said: I’m looking forward to having a proper herb bed this year. We had to have our rotten deck replaced last summer and so got them to build raises planters at the same time. Love cooking with herbs so it’s going to be wonderful to have them just outside the back door! Lucy tope on February 6, 2018 at 12:30 pm said: Brilliant plant labels and stands, really looking forward to growing strawberry sweetcorn this year which is a popcorn never grown them before got them at a seed swap, favourite time when spring bulbs are starting to grow and flower Helena Jones on February 6, 2018 at 4:41 pm said: Really lovely giveaway. Looking forward to growing Brussel sprouts for the first time,radishes,tomatoes,Runner and purple queen beans,courgettes, and an old fashioned colourful flower cutting patch. We always enjoy your videos and blog. Helena 🙂 Jacqueline on February 6, 2018 at 5:50 pm said: I’m going to sow more varieties of sweet peas. Nicola daniel on February 6, 2018 at 9:38 pm said: we have just taken on our first allotment plot and we have onions and garlic in already but I am most excited about munchkin pumpkins! I got some seeds after watching you grow them and roast them ! I am hoping they will be lovely autumn food ! thanks for a great YouTube channel and blog! Lynn Bines on February 6, 2018 at 11:04 pm said: This year I’m really keen to grow more butternut squash and beetroot along with all my other fruit and veg. Also hoping to have a bed for flowers for cutting. Lucinda Dann on February 7, 2018 at 10:35 am said: I have just taken on an additional half plot and a vegetable patch at a friend’s house so I am looking forward to trying to grow crops continuously all year round! Every vegetable is my favourite to grow at the time until the next one wants harvesting! Leticia Jones on February 7, 2018 at 10:41 am said: I am looking forward to planting everything! I am getting stuck into the garden this year as I’m off on maternity leave and I’m enjoying reading and learning about planting- especially your blog and YouTube they are proving v. helpful. My husband will grow veggies (carrots, potatoes, tomatoes) and I’ll grow flowers (sweet peas, ammi, dahlias) x Marti Rex on February 7, 2018 at 11:37 am said: Looking forward and excited to be outside , growing as much as I can ,looking forward to bringing out all my cuttings I took this year and the seeds I have saved. Life is so good. Sue Robinson on February 7, 2018 at 12:01 pm said: Hi Growing this year will be anything the slugs leave for us to eat. We have great success with growing brassicas and then the little monsters beat us to it. We still persevere and eat the left overs. Jo on February 7, 2018 at 4:24 pm said: Hi! Anything really. Never grown anything before and I’m sure our Allotment neighbours think we are Bonkers! These would make Allotment look beautiful if all else fails. Julia Ambler on February 7, 2018 at 5:48 pm said: Most looking forward to growing some more flowers on the plot this year! Trying to get a lot more for cutting as well as just to make it look lovlier! Nicola Taylor on February 7, 2018 at 8:38 pm said: Hi Katie this is my first plot and after watching your vidios and following your blogs you have inspired me to join in the fun of growing and other then my favorite yellow sunflowers I am most looking forward to trying some red ones and also some climbing strawberries well excited keep the tips coming thank you. 🙂 Melanie hicks on February 7, 2018 at 9:41 pm said: What a lovely idea Katie for u and your dad to do. I’m really looking forward to growing one of your favourite recommendations and that’s Swiss chard bright lights! Never tried it but I’m sure I will love it Also I’m going to grow for the 1st time is spaghetti squash Kirstine Belt on February 8, 2018 at 8:51 am said: I’ve just got a new allotment so am starting from scratch again AND I’m having a baby in the spring 🤰🏻I’m most looking forward to growing munchkin pumpkins (they did really well on my old plot last year- 32 pumpkins from 4 plants! Hopefully I can do the same on my new plot this year!) and some beautiful, tasty rainbow chard. I’m really looking forward to growing fruit and veg to ween my little boy onto when he is ready so I know he is getting all of the goodness he needs! X Elizabeth Whitehouse on February 8, 2018 at 7:26 pm said: Hi Katie 🙂 I’ve just been offered my first half size plot which I’m super excited about so as you can imagine I’m excited to grow everything! The thing I’m most excited to grow are the Sarah Raven climbing munchkin pumpkins. You’ve completely inspired me with plot 15C and I can’t wait to get some pumpkins and sweet peas climbing up an arch. I did a huge Sarah Raven order last week so I’m looking forward to start planting as soon as possible. I also managed to get some giant sunflower seeds which I’ll be planting up at home with my daughters so we can see who can grow the biggest one (this is what we would be using the slate labels for). Looking forward to your next YouTube video. Take care. Joy on February 10, 2018 at 8:45 am said: These are just lovely. Looking forward to chillies this year. Not had huge success before but really going for it this year. Lexi Morris on February 10, 2018 at 10:18 am said: I’m finally hoping to master sweet peas Carol Norton on February 10, 2018 at 2:36 pm said: Hello, I’m looking forward to growing so many things in year two on my new allotment. But particularly looking forward to sweet peas, seeds already in, some blight-resistant tomatoes and more dahlias. My son is getting married in August and his partner wants some of my flowers for her bouquet. What an honour x Kerry Smith on February 10, 2018 at 6:05 pm said: I have just been offered my first allotment so I am so excited to be starting off on my allotment journey! You are an absolute allotment angel and have given me lots of advice and tips as I am a complete novice. Charlieh Denovan on February 11, 2018 at 9:14 pm said: I discovered a love of Dahlias late on last year, so I’m looking forward to growing different varieties, especially for the bees. I’m also looking forward to growing tomatoes, it’s the only fruit/veg I seem to be good at growing! Wanda Mayer on February 12, 2018 at 1:49 am said: Hi Katie, I’m looking forward to trying to grow tulips and sweetpeas. Plus trying out a few freebie squash seeds I got from SeedsShare. I looking forward to this year’s growing season x Cherry Joyce on February 12, 2018 at 6:41 am said: Hello, I’m looking forward to growing more cut flowers as this is only our second year with the allotment. Also growing my 2yr olds interest of growing and picking our own fruit and Veg. Strawberry picking off our patch was definitely a highlight for her last year! X Rebecka on February 12, 2018 at 7:03 am said: I’m looking forward to growing everything this year! I’ve just moved house and have a clean slate to start growing again in the garden and I have my name down on the waiting list for the allotments opposite to my house! But until then I’m probably looking forward to starting a ‘cutting’ Flower garden as I haven’t ever given that a go, and as always potatoes as homegrown potatoes are the very best! Jenny McNeilis on February 12, 2018 at 7:53 am said: Hi Katie. I’ve just bought loads of seeds and I always have to stop myself from getting carried away and buying too many. It’s difficult to pick, but I’m looking forward to growing cucamelons this year. Apparently a cross between a melon and cucumber (bet they were up all night thinking of the name!). They are quite small and are best grown in a greenhouse I believe. Love seeing your updates on instagram xx Grace Clements on February 12, 2018 at 8:23 am said: This year I’m really looking forward to growing chilli’s in my greenhouse. I think it will be a nice addition to my tomatoes when making pasta sauce! Love your blog and YouTube, it’s great for inspiration. 🍅🌶️🍝 Liz Fordham on February 12, 2018 at 10:58 am said: Hello there! I’m in the process of planning my plot and have some new seeds I’m trying out. Asturias tree cabbage which is a perennial, huauzontle aztec broccoli which I plan on planting in my borders and Cherokee trail of tears climbing bean which hails from the Cherokee nation! Have a great day x Eleanor Tyrrell on February 12, 2018 at 11:20 am said: I’m looking forward to growing tomatoes and peas – though we might be moving house so the peas will have to wait! X Leave a Reply to Carol Norton Cancel reply
cc/2020-05/en_middle_0097.json.gz/line1418198
__label__cc
0.721037
0.278963
Tour of Mexico reveals the faith of dutiful members byLDS Church News | Jun. 04, 2011 Opinions & Features Mexico's dutiful Latter-day Saints would be recognizable to fellow members across the globe. They are diligent, temple-going people who worship, serve and raise their families in faith despite the troubles sometimes found just outside the doors of their homes. Yes, they have worries — but they also live purposeful lives fueled by optimism and gospel principles. That was the observation made by a trio of General Authorities who recently spent several days touring Mexico. Elder Dallin H. Oaks and Elder Quentin L. Cook of the Quorum of the Twelve, along with Elder Ronald A. Rasband of the Presidency of the Seventy, traveled to Mexico to conduct an annual review of the Mexico Area and also meet with thousands of local priesthood leaders, members, missionaries and Church employees in a variety of gatherings and training sessions across the country. At times the three were together, but they also split up to visit members in several different Mexican cities. Read the rest of this story at ldschurchnews.com Opinions & Features Dallin H. Oaks Central AmericaDallin H. Oaks,Central America,Opinions & Features First Presidency Announces Changes in Policies Impacting LGBTQ Members and Their Children 15 Powerful Books and Talks by Our Prophet and Apostles
cc/2020-05/en_middle_0097.json.gz/line1418200
__label__wiki
0.500776
0.500776
Commission Directive of 29 April 1981 laying down the Community method of analysis for the official control of vinyl chloride released by materials and articles into foodstuffs (81/432/EEC) (repealed) Directives originating from the EU Whole Directive Original (As adopted by EU) Open whole Directive Open Directive without Annexes Open Annexes only EU Official Journal Version This is a Directive originating from the EU See the EU version of this legislation on EUR-Lex See an archived version from EUR-Lex in the web archive This is a legislation item that originated from the EU After exit day there will be three versions of this legislation to consult for different purposes. The legislation.gov.uk version is the version that applies in the UK. The EU Version currently on EUR-lex is the version that currently applies in the EU i.e you may need this if you operate a business in the EU. The web archive version is the official version of this legislation item as it stood on exit day before being published to legislation.gov.uk and any subsequent UK changes and effects applied. The web archive also captured associated case law and other language formats from EUR-Lex. This is the original version (as it was originally adopted). Commission Directive of 29 April 1981 laying down the Community method of analysis for the official control of vinyl chloride released by materials and articles into foodstuffs (81/432/EEC) (repealed) THE COMMISSION OF THE EUROPEAN COMMUNITIES, Having regard to the Treaty establishing the European Economic Community, Having regard to Council Directive 78/142/EEC of 30 January 1978 on the approximation of the laws of the Member States relating to materials and articles which contain vinyl chloride monomer and are intended to come into contact with foodstuffs(1), and in particular Article 3 thereof, Whereas Article 2 of Directive 78/142/EEC lays down that materials and articles must not pass on to the foodstuffs which are in, or have been brought into, contact with such materials and articles any vinyl chloride detectable by a method having a limit of detection of 001 mg/kg, and Article 3 that this limit must be controlled by a Community method of analysis; Whereas, on the basis of a series of inter-laboratory collaborative trials, the method described in the Annex has proved to be sufficiently accurate and reproducible to be adopted as a Community method; Whereas the measures provided for in this Directive are in accordance with the opinion of the Standing Committee on Foodstuffs, HAS ADOPTED THIS DIRECTIVE: The analysis necessary for official control of vinyl chloride released by materials and articles into foodstuffs shall be performed according to the method described in the Annex hereto. The Member States shall bring into force the laws, regulations and administrative provisions necessary to comply with this Directive not later than 1 October 1982. They shall forthwith inform the Commission thereof. Done at Brussels, 29 April 1981. For the Commission Karl-Heinz Narjes Member of the Commission ANNEXDETERMINATION OF VINYL CHLORIDE RELEASED BY MATERIALS AND ARTICLES INTO FOODSTUFFS 1.SCOPE AND FIELD OF APPLICATION The method determines the level of vinyl chloride in foodstuffs. 2.PRINCIPLE The level of vinyl chloride (VC) in foodstuffs is determined by means of gas-chromatography using the ‘headspace’ method. 3.REAGENTS 3.1.Vinyl chloride (VC), of purity greater than 99.5% (v/v). 3.2. N, N-dimethylacetamide (DMA), free from any impurity with the same retention time as VC or as the internal standard (3.3) under the conditions of the test. 3.3.Diethyl ether or cis-2-butene, in DMA (3.2) as the internal standard solution. These internal standards must not contain any impurity with the same retention time as VC, under the conditions of the test. 3.4.Distilled water or demineralized water of equivalent purity. 4.APPARATUS An instrument or piece of apparatus is mentioned only if it is special, or made to particular specifications. Usual laboratory apparatus is assumed to be available. 4.1.Gas-chromatograph fitted with automatic headspace sampler or with facilities for manual sample injection. 4.2.Flame ionization detector or other detectors mentioned in point 7. 4.3.Gas-chromatographic column The column must permit the separation of the peaks of air, of VC and of the internal standard, if used. Furthermore, the combined 4.2 and 4.3 system must allow the signal obtained with a solution containing 0·005 mg VC/litre DMA or 0·005 mg VC/kg DMA to be equal to at least five times the background noise. 4.4.Sample phials or flasks fitted with silicon or butyl rubber septa When using manual sampling techniques, the taking of a sample from the headspace with a syringe may cause a partial vacuum to form inside the phial or flask. Hence, for manual techniques where the phials are not pressurized before the sample is taken, the use of large phials is recommended. 4.5.Micro-syringes. 4.6.Gas-tight syringes for manual headspace sampling. 4.7.Analytical balance accurate to 0.1 mg. 5. PROCEDURE CAUTION: VC is a hazardous substance and a gas at ambient temperature therefore, the preparation of solutions should be carried out in a well-ventilated fume cupboard. Take all the necessary precautions to ensure that no VC or DMA is lost. When employing manual sampling techniques, an internal standard (3.3) should be used. When using an internal standard, the same solution must be utilized throughout the procedure. 5.1. Preparation of standard VC solution (solution A) 5.1.1. Concentrated standard VC solution at approximately 2 000 mg/kg Accurately weigh to the nearest 0.1 mg a suitable glass vessel and place in it a quantity (e.g. 50 ml) of DMA (3.2). Re-weigh. Add to the DMA a quantity (e.g. 0.1 g) of VC (3.1) in liquid or gas form, injecting it slowly onto the DMA. The VC may also be added by bubbling it into the DMA, provided that a device is used which will prevent loss of DMA. Reweigh to the nearest 0.1 mg. Wait two hours to allow equilibrium to be attained. If an internal standard is to be employed, add internal standard so that the concentration of the internal standard in the concentrated standard VC solution is the same as in the internal standard solution prepared under point 3.3. Keep the standard solution in a refrigerator. 5.1.2. Preparation of dilute standard VC solution Take a weighed amount of concentrated standard solution of VC (5.1.1) and dilute, to a known volume or a known weight, with DMA (3.2) or with internal standard solution (3.3). The concentration of the resultant dilute standard solution (solution A) is expressed as mg/litre or mg/kg respectively. 5.1.3. Preparation of the response curve with solution A The curve must comprise at least seven pairs of points. The repeatability of the responses(2) must be lower than 0.002 mg VC/litre or kg of DMA. The curve must be calculated from these points by the least squares technique, i.e., the regression line must be calculated using the following equation: y = a1x + ao the height or area of peaks in any single determination; the corresponding concentration on the regression line; number of determinations carried out (n ≥ 14). The curve must be linear, i.e., the standard deviation (s) of the differences between the measured responses (yi) and the corresponding value of the responses calculated from the regression line (zi) divided by the mean value (y) of all the measured responses shall not exceed 0·07. This shall be calculated from: each individual measured response; the corresponding value of the response (yi) on the calculated regression line; ≥ 14. Prepare two series of at least seven phials (4.4). Add to each phial volumes of dilute standard VC solution (5.1.2) and DMA (3.2) or internal standard solution in DMA (3.3) such that the final VC concentration of the duplicate solutions will be approximately equal to 0, 0·005, 0·010, 0·020, 0·030, 0·040, 0·050, etc., mg/litre or mg/kg of DMA and that each phial contains the same total volume of solution. The quantity of dilute standard VC solution (5.1.2) must be such that the ratio between the total volume (μl) of added VC solution and quantity (g or ml) of DMA, or internal standard solution (3.3) does not exceed five. Seal the phials and proceed as described under points 5.4.2, 5.4.3 and 5.4.5. Construct a graph in which the ordinate values show the areas (or heights) of the VC peaks of the duplicate solutions, or the ratio of these areas (or heights) to those of the relevant internal standard peaks, and the abscissa values show the VC concentrations of the duplicate solutions. 5.2. Validation of preparation of standard solutions obtained in point 5.1 5.2.1. Preparation of a second standard VC solution (solution B) Repeat the procedure described under points 5.1.1 and 5.1.2 to obtain a second dilute standard solution with, in this case, a concentration approximately equal to 0·02 mg VC: 1, or 0·02 mg VC/kg of DMA or internal standard solution. Add this solution to two phials (4.4). Seal the phials and proceed as described under points 5.4.2, 5.4.3 and 5.4.5. 5.2.2. Validation of solution A If the average of two gas-chromatographic determinations relating to the solution B (5.2.1) does not differ by more than 5% from the corresponding point of the response curve obtained in point 5.1.3, the solution A is validated. If the difference is greater than 5%, reject all the solutions obtained in points 5.1 and 5.2 and repeat the procedure from the beginning. 5.3. Preparation of the ‘addition’ curve The curve must be calculated from these points by the least squares technique (5.1.3, third indent). The curve must be linear, i.e., the standard deviation(s) of the differences between the measured responses (yi) and the corresponding value of the responses calculated from the regression line (zi) divided by the mean value ( ) of all the measured responses shall not exceed 0·07 (5.1.3, fourth indent). 5.3.1. Preparation of sample The sample of foodstuff to be analyzed must be representative of the foodstuff presented for analysis. The foodstuff must, therefore, be mixed or reduced to small pieces and mixed before the sample is taken. 5.3.2. Procedure Prepare two series of at least seven phials (4.4). Add to each phial a quantity, not less than 5 g, of sample obtained from the foodstuff under investigation (5.3.1). Ensure that an equal quantity is added to each phial. Close the phial immediately. Add to each phial for each gram of sample 1 ml, preferably of distilled water, or demineralized water of at least equivalent purity, or an appropriate solvent if necessary. (Note: for homogeneous foodstuffs, addition of distilled of demineralized water is not necessary.) Add to each phial volumes of dilute standard VC solution (5.1.2), containing the internal standard (3.3), if considered useful, such that concentrations of VC added to the phials equal to 0, 0·005, 0·010, 0·020, 0·030, 0·040 and 0·050, etc., mg/kg of foodstuffs. Ensure that the total volume of DMA or DMA containing internal standard (3.3) in each phial is the same. The quantity of dilute standard VC solution (5.1.2) and additional DMA where used, must be such that the ratio between the total volume (μl) of these solutions and the quantity (g) of foodstuff contained in the phial is as low as possible but not more than five and is the same in all phials. Seal the phials and proceed as described under point 5.4. 5.4. Gas-chromatographic determinations 5.4.1.Agitate the phials avoiding contact between the contained liquid and the septum (4.4) to obtain a solution or a suspension of the samples of foodstuff as homogeneous as possible. 5.4.2.Put all the sealed phials (5.2 and 5.3) in a waterbath for two hours at 60 ± 1 oC to allow equilibrium to be attained. Agitate again, if necessary. 5.4.3.Take a sample from the headspace in the phial. When utilizing manual sampling techniques care must be exercized in obtaining a reproducible sample (4.4) in particular the syringe must be pre-warmed to the temperature of the sample. Measure the area (or height) of the peaks relating to the VC and internal standard, if used. 5.4.4.Construct a graph in which the ordinate value shows the areas (or heights) of the VC peaks or the ratio of the areas (or heights) of VC peaks to the areas (or heights) of the internal standard peaks and the abscissa values show the quantities of VC added (mg) relating to the quantities of the sample of foodstuff weighed in each phial (kg). Measure the abscissa intercept from the graph. The value so obtained is the concentration of VC.in the sample of the foodstuff under investigation. 5.4.5.Remove from the column (4.3) excess DMA using an appropriate method as soon as peaks of DMA appear on the chromatogram. 6.RESULTS The VC released by materials and articles into the foodstuff under investigation expressed in mg/kg shall be defined as the average of the two determinations (5.4) provided that the repeatability criterion in point 8 is satisfied. 7.CONFIRMATION OF THE VC In cases where the VC released by materials and articles into the foodstuffs as calculated under point 6, exceeds the criterion in Article 2 (2) of Council Directive 78/142/EEC of 30 January 1978, the values obtained in each of the two determinations (5.4) must be confirmed in one of three ways: by using at least one other column (4.3) having a stationary phase of different polarity. This procedure should continue until a chromatogram is obtained with no evidence of overlap of the VC and/or internal standard peaks with constituents of the sample of foodstuff, by using other detectors, e.g. the micro-electrolytic conductivity detector(3), by using mass spectrometry; in this case, if molecular ions with parent masses (m/e) of 62 and 64 are found in the ratio of 3: 1 it may be regarded with high probability as confirming the presence of VC. In case of doubt the total mass spectrum must be checked. 8.REPEATABILITY The difference between the results of two determinations (5.4) carried out simultaneously or in rapid succession on the same sample, by the same analyst, under the same conditions, must not exceed 0·003 mg VC/kg of foodstuff. OJ No L 44, 15.2. 1978, p. 15. See recommendation ISO DIS 5725: 1977. See Journal of Chromatographic Science (volume 12), March 1974, page 152. PrintThe Whole Directive PDF The Whole Directive Web page The Whole Directive Original (As adopted by EU): The original version of the legislation as it stood when it was first adopted in the EU. No changes have been applied to the text. the original print PDF of the as adopted version that was used for the EU Official Journal the original print PDF of the as adopted version that was used for the print copy
cc/2020-05/en_middle_0097.json.gz/line1418202
__label__cc
0.675783
0.324217
Computational Materials Engineering: Recent Applications of VASP in the MedeA® Software Environment Wimmer, Erich;Christensen, Mikael;Eyert, Volker;Wolf, Walter;Reith, David;Rozanska, Xavier;Freeman, Clive;Saxe, Paul 263 Electronic structure calculations have become a powerful foundation for computational materials engineering. Four major factors have enabled this unprecedented evolution, namely (i) the development of density functional theory (DFT), (ii) the creation of highly efficient computer programs to solve the Kohn-Sham equations, (iii) the integration of these programs into productivity-oriented computational environments, and (iv) the phenomenal increase of computing power. In this context, we describe recent applications of the Vienna Ab-initio Simulation Package (VASP) within the MedeA$^{(R)}$ computational environment, which provides interoperability with a comprehensive range of modeling and simulation tools. The focus is on technological applications including microelectronic materials, Li-ion batteries, high-performance ceramics, silicon carbide, and Zr alloys for nuclear power generation. A discussion of current trends including high-throughput calculations concludes this article. Computational Simulations of Thermoelectric Transport Properties Ryu, Byungki;Oh, Min-Wook 273 This review examines computational simulations of thermoelectric properties, such as electrical conductivity, Seebeck coefficient, and thermal conductivity. With increasing computing power and the development of several efficient simulation codes for electronic structure and transport properties calculations, we can evaluate all the thermoelectric properties within the first-principles calculations with the relaxation time approximation. This review presents the basic principles of electrical and thermal transport equations and how they evaluate properties from the first-principles calculations. As a model case, this review presents results on $Bi_2Te_3$ and Si. Even though there is still an unsolved parameter such as the relaxation time, the effectiveness of the computational simulations on the transport properties will provide much help to experimental scientist researching novel thermoelectric materials. Na-Ion Anode Based on Na(Li,Ti)O2 System: Effects of Mg Addition Kim, Soo Hwa;Bae, Dong-Sik;Kim, Chang-Sam;Lee, June Gunn 282 This study involves enhancing the performance of the $Na(Li,Ti)O_2$ system as an Na-ion battery anode with the addition of Mg, which partially replaces Li ions. We perform both computational and experimental approaches to achieve a higher reversible capacity and a faster transport of Na ions for the devised system. Computational results indicate that the $Na(Li,Mg,Ti)O_2$ system can provide a lower-barrier path for Na-ion diffusion than can a system without the addition of Mg. Experimentally, we synthesize various $Na_z(Li_y,Mg_x,Ti)O_2$ systems and evaluate their electrochemical characteristics. In agreement with the theoretical study, Mg addition to such systems improves general cell performance. For example, the prepared $Na_{0.646}(Li_{0.207}Mg_{0.013}Ti_{0.78})O_2$ system displays an increase in reversible capacity of 8.5% and in rate performance of 13.5%, compared to those characteristics of a system without the addition of Mg. Computational results indicate that these improvements can be attributed to the slight widening of the Na-$O_6$ layer in the presence of Mg in the $(Li,Ti)O_6$ layer. Monte Carlo Simulation of Densification during Liquid-Phase Sintering Lee, Jae Wook 288 The densification process during liquid-phase sintering was simulated by Monte Carlo simulation. The Potts model, which had been applied to coarsening during liquid-phase sintering, was modified to include vapor particles. The results of two- and threedimensional simulations showed a temporal decrease in porosity, in other words, densification, and an increase in the average size of pores. The results also showed growth of solid grains and the effect of wetting angle on microstructure. Thermal Conductivity Analysis of Amorphous Silicon Formed by Natural Cooling: A Molecular-dynamics Study Lee, Byoung Min 295 To investigate the thermal conductivity and the structural properties of naturally cooled excimer-laser annealed Si, molecular-dynamics (MD) simulations have been performed. The thermal conductivity of crystalline Si (c-Si) was measured by direct method at 1000 K. Steady-state heat flow was measured using a stationary temperature profile; significant deviations from Fourier's law were not observed. Reliable processes for measuring the thermal conductivity of c-Si were presented. A natural cooling process to admit heat flow from molten Si (l-Si) to c-Si was performed using an MD cell with a size of $48.9{\times}48.9{\times}97.8{\AA}^3$. During the cooling process, the temperature of the bottom $10{\AA}$ of the MD cell was controlled at 300 K. The results suggest that the natural cooling system described the static structural property of amorphous Si (a-Si) well. Proton Conduction in Nonstoichiometric Σ3 BaZrO3 (210)[001] Tilt Grain Boundary Using Density Functional Theory Kim, Ji-Su;Kim, Yeong-Cheol 301 We investigate proton conduction in a nonstoichiometric ${\Sigma}3$ $BaZrO_3$ (210)[001] tilt grain boundary using density functional theory (DFT). We employ the space charge layer (SCL) and structural disorder (SD) models with the introduction of protons and oxygen vacancies into the system. The segregation energies of proton and oxygen vacancy are determined as -0.70 and -0.54 eV, respectively. Based on this data, we obtain a Schottky barrier height of 0.52 V and defect concentrations at 600K, in agreement with the reported experimental values. We calculate the energy barrier for proton migration across the grain boundary core as 0.61 eV, from which we derive proton mobility. We also obtain the proton conductivity from the knowledge of proton concentration and mobility. We find that the calculated conductivity of the nonstoichiometric grain boundary is similar to those of the stoichiometric ones in the literature. Investigation of LiO2 Adsorption on LaB1-xB'xO3(001) for Li-Air Battery Applications: A Density Functional Theory Study Kwon, Hyunguk;Han, Jeong Woo 306 Li-air batteries have received much attention due to their superior theoretical energy density. However, their sluggish kinetics on the cathode side is considered the main barrier to high performance. The rational design of electrode catalysts with high activity is therefore an important challenge. To solve this issue, we performed density functional theory (DFT) calculations to analyze the adsorption behavior of the $LiO_2$ molecule, which is considered to be a key intermediate in both the Li-oxygen reduction reaction (ORR) and the evolution reaction (OER). Specifically, to use the activity descriptor approach, the $LiO_2$ adsorption energy, which has previously been demonstrated to be a reliable descriptor of the cathode reaction in Li-air batteries, was calculated on $LaB_{1-x}B^{\prime}_xO_3$(001) (B, B' = Mn, Fe, Co, and Ni, x = 0.0, 0.5). Our fast screening results showed that $LaMnO_3$, $LaMn_{0.5}Fe_{0.5}O_3$, or $LaFeO_3$ would be good candidate catalysts. We believe that our results will provide a way to more efficiently develop new cathode materials for Li-air batteries. The Effect of Domain Wall on Defect Energetics in Ferroelectric LiNbO3 from Density Functional Theory Calculations Lee, Donghwa 312 The energetics of defects in the presence of domain walls in $LiNbO_3$ are characterized using density-functional theory calculations. Domain walls show stronger interactions with antisite defects than with interstitial defects or vacancies. As a result, antisite defects act as a strong pinning center for the domain wall in $LiNbO_3$. Analysis of migration behavior of the antisite defects across the domain wall shows that the migration barrier of the antisite defects is significantly high, such that the migration of antisite defects across the domain wall is energetically not preferable. However, further study on excess electrons shows that the migration barrier of antisite defects can be lowered by changing the charge states of the antisite defects. So, excess electrons can enhance the migration of antisite defects and thus facilitate domain wall movement by weakening the pinning effect. Quantum Mechanical Simulation for the Analysis, Optimization and Accelerated Development of Precursors and Processes for Atomic Layer Deposition (ALD) Mustard, Thomas Jeffrey Lomax;Kwak, Hyunwook Shaun;Goldberg, Alexander;Gavartin, Jacob;Morisato, Tsuguo;Yoshidome, Daisuke;Halls, Mathew David 317 Continued miniaturization and increasingly exact requirements for thin film deposition in the semiconductor industry is driving the search for new effective, efficient, selective precursors and processes. The requirements of defect-free, conformal films, and precise thickness control have focused attention on atomic layer deposition (ALD). ALD precursors so far have been developed through a trial-and-error experimental approach, leveraging the expertise and tribal knowledge of individual research groups. Precursors can show significant variation in performance, depending on specific choice of co-reactant, deposition stage, and processing conditions. The chemical design space for reactive thin film precursors is enormous and there is urgent need for the development of computational approaches to help identify new ligand-metal architectures and functional co-reactants that deliver the required surface activity for next-generation thin-film deposition processes. In this paper we discuss quantum mechanical simulation (e.g. density functional theory, DFT) applied to ALD precursor reactivity and state-of-the-art automated screening approaches to assist experimental efforts leading toward optimized precursors for next-generation ALD processes. Preparation of Anatase Particles through Electro-Dialysis of TiCl4 Aqueous Solution Chang, Myung Chul 325 Anatase particles of titanium dioxide were prepared from $TiCl_4$ aqueous solution by using an electro-dialysis [ED] process. For the preparation of an aqueous solution of $TiCl_4$ precipitates, $TiCl_4$ liquid frozen in ice was transferred to a neck flask and then hydrolyzed using deionized [DI] $H_2O$. During the hydrolysis of the $TiCl_4$ solution at $0^{\circ}C$, a slurry solution of $TiOCl_2$ was obtained and the color changed from red to orange. The ED process was applied for the removal of chlorine content in the slurry solution. Two kinds of hydrolyzed slurry solution with lower [$Ti^{4+}$] and higher [$Ti^{4+}$] were sampled and the ED process was applied for the samples according to the removal time of [$Cl^-$]. With de-chlorination, the solution status changed from sol to gel and the color quickly changed to blue. Finally, white crystalline powders were formed and the phase was confirmed by XRD to be anatase crystallites. The morphology of the hydrous titania particles in the solution was observed by FE-SEM. The hydrous titania particles were nano-crystalline, and easily coagulated with drying. A Case Study on Sintering Characteristics of Yttria Stabilized Zirconia Powder Prepared by Two-Fluid Spray Drying Choi, Jin Sam;Kong, Young-Min 332 As a case study on yttria stabilized zirconia ceramics, the sintering characteristics of submicron powders and the granulation prepared by two-fluid spray drying of submicron particles were investigated. As-received powders of yttria stabilized zirconia particles were reduced to a uniform size of less than about 200 nm by repeated milling. Granulation size obtained by the two-fluid spray drying was affected by the organic matter and the primary particle size. Sintering behavior such as porosity, water absorption ratio, density, and transparency was influenced by processing conditions of the powder, and the discontinuous interfaces in a green body were reduced. Characterization of F- and Al-codoped ZnO Transparent Conducting Thin Film prepared by Sol-Gel Spin Coating Method Nam, Gil Mo;Kwon, Myoung Seok 338 ZnO thin film co-doped with F and Al was prepared on a glass substrate via simple non-alkoxide sol-gel spin coating. For a fixed F concentration, the addition of Al co-dopant was shown to reduce the resistivity mainly due to an increase in electrical carrier density compared with ZnO doped with F only, especially after the second post-heat-treatment in a reducing environment. There was no effective positive contribution to the reduction in resistivity due to the mobility enhancement by the addition of Al co-dopant. Optical transmittance of the ZnO thin film co-doped with F and Al in the visible light domain was shown to be higher than that of the ZnO thin film doped with F only. Quantitative Photocatalytic Activity under Visible Light with Mn-ACF/TiO2 Ye, Shu;Kim, Hyun-il;Oh, Won-Chun 343 Manganese and $TiO_2$ grown on Activated Carbon Fiber (ACF) was synthesized by hydrothermal method. The prepared composites were characterized by X-ray diffraction (XRD) and scanning electron microscopy (SEM) with energy dispersive X-ray (EDX). The catalytic behavior was investigated through the decomposition of methylene blue (MB) and methyl orange (MO) as standard dyes under visible light. The degradation performance of the degraded standard dye solutions was determined by UV-Vis spectrophotometry. This enhanced photocatalytic activity arises from the positive synergetic effect among the Mn, $TiO_2$ and ACF in this heterogeneous photocatalyst. The process contributes to the release of abundant photocatalytic sites of Mn and $TiO_2$ and improves the photocatalytic efficiency. The excellent adsorption and photocatalytic effect with the explanation of the synergetic mechanism are very useful not only for fundamental research but also for potential practical applications. Effects of Mixing Ratio of Silicon Carbide Particles on the Etch Characteristics of Reaction-Bonded Silicon Carbide Jung, Youn-Woong;Im, Hangjoon;Kim, Young-Ju;Park, Young-Sik;Song, Jun-Baek;Lee, Ju-Ho 349 We prepared a number of reaction-bonded silicon carbides (RBSCs) made from various mixing ratios of raw SiC particles, and investigated their microstructure and etch characteristics by Reactive Ion Etch (RIE). Increasing the amount of $9.5{\mu}m$-SiC particles results in a microstructure with relatively coarser Si regions. On the other hand, increasing that of $2.6{\mu}m$-SiC particles produces much finer Si regions. The addition of more than 50 wt% of $2.6{\mu}m$-SiC particles, however, causes the microstructure to become partially coarse. We also evaluated their etching behaviors in terms of surface roughness (Ra), density and weight changes, and microstructure development by employing Confocal Laser Scanning Microscope (CLSM) and Scanning Electron Microscope (SEM) techniques. During the etching process of the prepared samples, we confirmed that the residual Si region was rapidly removed and formed pits isolating SiC particles as islands. This leads to more intensified ion field on the SiC islands, and causes physical corrosion on them. Increased addition of $2.6{\mu}m$-SiC particles produces finer residual Si region, and thus decreases the surface roughness (Ra.) as well as causing weight loss after etching process by following the above etching mechanism. Carbonation Behavior of Lightweight Foamed Concrete Using Coal Fly Ash Lee, Jae Hoon;Lee, Ki Gang 354 The purpose of this study was to prepare lightweight foamed concrete by mixing coal fly ash of circulating fluidized bed combustion(CFBC) with cement, and to develop uses for recycling by analyzing carbonation behavior resulting from a change in conditions for pressurized carbonation. For concrete, CFBC coal fly ash was mixed with Portland cement to the water-binder ratio of 0.5, and aging was applied at room temperature after 3 days of curing at $20^{\circ}C$, RH 60%. For carbonation, temperature was fixed at $60^{\circ}C$ and time at 1 h in the use of autoclave. Pressures were controlled to be $5kgf/cm^2$ and the supercritical condition of $80kgf/cm^2$, and gas compositions were employed as $CO_2$ 100% and $CO_2$ 15%+N2 85%. In the characteristics of produced lightweight concrete, the characteristics of lightweight foamed concrete resulting from carbonation reaction were affirmed through rate of weight change, carbonation depth test, air permeability, and processing analysis for the day 28 specimen. Based on these results, it is concluded that the present approach could provide a viable method for mass production of eco-friendly lightweight foamed concrete from CFBC coal fly ash stabilized by carbonation. Fabrication of Humidity Control Ceramics from Drinking-Water Treatment Sludge and Onggi Soil Lee, Min-Jin;Lee, Hyeon-Jun;Kim, Kyungsun;Hwang, Hae-Jin 362 In this study, humidity control ceramics with good adsorption/desorption capabilities and high strength were fabricated from drinking-water treatment sludge (DWTS) and Onggi soil. The DWTS powder heat-treated at $800^{\circ}C$ and Onggi soil were mixed at weight ratios of 40:60, 50:50, 60:40, and 70:30 and fired at $800-1000^{\circ}C$. With increasing DWTS content, density and flexural strength increased. For the sample with a DWTS:Onggi soil weight ratio of 70:30, porosity and specific surface area decreased with increasing firing temperature, attributed to densification and grain growth at high firing temperatures. From the results obtained, a firing temperature of $800^{\circ}C$ is the optimum condition for fabricating humidity control ceramics with good adsorption/desorption capabilities and strength. The maximum adsorbed amount for the sample fired at $800^{\circ}C$ was $439g/m^2$. Hot-Injection Thermolysis of Cobalt Antimony Nanoparticles with Co(II)-Oleate and Sb(III)-Oleate Ahn, Jong-Pil;Kim, Min-Suk;Kim, Se-Hoon;Lee, Byung-Ha;Kim, Do-Kyung;Park, Joo-Seok 367 A novel strategy for the synthesis of $CoSb_2$ nanoparticles is demonstrated via preparation of novel organometallic complexes. Hydrated cobalt oleate (CoOl) and non-hydrated antimony oleate (SbOl) complexes are synthesized as precursors. The $CoSb_2$ nanoparticles are prepared by hot injection, which involves thermolysis of CoOl and SbOl in a non-coordinating solvent at $320^{\circ}C$. The coordination modes and distinct thermal behaviors of the intermediate non-hydrated SbOl complexes are comparatively investigated by thermo-analytical techniques. When the reaction temperature is increased, the particle size is found to increase linearly. The crystallinity of the $CoSb_2$ nanoparticles prepared at $250^{\circ}C$ is amorphous phase without any peaks. $CoSb_2$ structural peaks start to appear at $300^{\circ}C$ and dominant peaks with high crystallinity are synthesized at $320^{\circ}C$. The potential chemical structures of non-hydrated SbOl and their reaction mechanisms by thermolysis are elucidated. The elemental composition and crystallographic structure of $CoSb_2$ nanoparticles suggest a bimodal interaction of the organic shell and the nanoparticle surface, with a chemical absorbed inner layer and physically absorbed outer layer of carboxylic acid. Fe3O4 Nanoparticles on MWCNTs Backbone for Lithium Ion Batteries Lee, Kangsoo;Shin, Seo Yoon;Yoon, Young Soo 376 A composite electrode made of iron oxide nanoparticles/multi-wall carbon nanotube (iNPs/M) delivers high specific capacity and cycle durability. At a rate of $200mAg^{-1}$, the electrode shows a high discharge capacity of ${\sim}664mAhg^{-1}$ after 100 cycles, which is ~ 70% of the theoretical capacity of $Fe_3O_4$. Carbon black, carbon nanotube, and graphene as anode materials have been explored to improve the electrical conductivity and cycle stability in Li ion batteries. Herein, iron oxide nanoparticles on acid treated MWCNTs as a conductive platform are combined to enhance the drawbacks of $Fe_3O_4$ such as low electrical conductivity and volume expansion during the alloying/dealloying process. Enhanced performance was achieved due to a synergistic effect between electrically 3D networks of conductive MWCNTs and the high Li ion storage ability of $Fe_3O_4$ nanoparticles (iNPs).
cc/2020-05/en_middle_0097.json.gz/line1418203
__label__cc
0.673822
0.326178
Home > Sports > Son struggles, Leverkusen eliminated from Champions League Son struggles, Leverkusen eliminated from Champions League Leverkusen’s Son Heung-min, left and Atletico’s Juanfran hump for a high ball during the Champions League round of sixteen second leg soccer match between Atletico de Madrid and Bayer 04 Leverkusen at the Vicente Calderon stadium in Madrid, Spain, Tuesday, March 17, 2015. (AP Photo/Andres Kudacki) By Brian Han Son Heung-Min had a lackluster performance Tuesday in Bayer Leverkusen’s 1-0 loss against Atlético Madrid in the Champions League round of 16. The two clubs faced each other previously on Feb. 25 in Germany where Leverkusen won 1-0 on their home turf resulting in a 1-1 aggregate score for the tournament. Despite being a lost game for Leverkusen, the aggregate score forced a penalty shootout after neither team could add a goal during extra time. Leverkusen goalkeeper Bernd Leno had saved six penalty attempts in the last three seasons putting him as one of the best in that particular category. No matter though, Atlético Madrid outscored Leverkusen 3-2 on penalties allowing them to move on to the quarterfinals. During regulation, Son made a key defensive play in the 34th minute when he headed away an Atlético free kick by forward Antoine Griezman. He was eventually substituted by Simon Rolfes in the 77th minute. Champions LeagueKoreatimessoccerSon Heung-min I was delighted to found out that you have the English version of this newspaper. I thought “goodies”, I can compare my translation using your English version. After Reading three articles in English from three of your sections, politic, foreign and sports of which I read two in Korean as well, I developed a mega headaches trying to understand what you wrote. Do you have your articles edited for the English speaking people? Because there are turning of phrases that we will never say in an English newspaper, some words should not even be there. However, I did get the general contents of the story. I just wish it will be better written in English. If I had to translate an article into Korean, I am sure I will not be able to write as well as your translators. All in all well done.
cc/2020-05/en_middle_0097.json.gz/line1418204
__label__wiki
0.60986
0.60986
Today Movie Schedule About Maha Movie We have launched a free to air Hindi Movie Channel - "Maha Movie" -Movie ka keeda on 1st June 2014. Audience of Urban Area is focus of everyone but our focus in on audience of urban as well as rural area. We are maintaining our channel in view of every age's people.The programming of channel is designed to suit the cultural and traditional moods of the masses and the classes. The channel covers all genres and feature drama, comedy, spiritual, action, romance, horror or fantasy films. TELEONE CONSUMERS PRODUCT PVT. LTD. www.teleone.in Teleone Consumers Product Pvt. Ltd. is one of the eminent teleshopping companies in India. We have established a team to look after the marketing and supply the products all over the world. We offer high quality of products at affordable prices. We believe to get into basic necessities of individual and come up with innovative daily used household products to lifestyle products. "Teleone believes in keep moving rapidly by setting milestones”, we believe to go along with our customers needs and satisfaction. Teleone Consumers Product Pvt. Ltd. have call centres which are working round the clock 24*7*365 to provide better services to our customers. We have more than 100 franchised dealers in almost 100 cities within India and Abroad which help us reaching the maximum number of people to meet their needs and requirements. Our product and brand promotions are seen through Television ads, Newspaper ads etc. almost in every channel in international, national and regional channels. Teleone is an open organization, which welcomes customer to share their thoughts and suggestions to help us improving quality, production and delivery of products. Maha Cartoon Tv CHANNEL www.mahacartoontv.com Maha Cartoon Tv - India's first Free-to-air Hindi kids cartoon channel has been Launched By us on November 1, 2016, on Freedish, the free DTH platform of Prasar Bharati. Maha Cartoon Tv Channel is a result of two years of planning on various aspects of creation and compilation of programming for kids. Maha Cartoon Tv is a Hindi language channel targeting the age group of 4-14 years. It features unique cartoon characters conceived and made by in-house production teams. Experts have created Indian characters which will instantly appeal to Indian kids. They have the potential to be popular homegrown characters that kids can easily relate to. The key shows and cartoon characters that have debuted on Maha Cartoon TV are Mooshak Gungun, the Indian adaption of the classical cat and mouse chase show, which has frills, adventure,Indian origin and flavour, Bal Chanakya is about an Indian kids with a sharp mind and a strong ability to overcome various obstacles with ease and composure, Panchtantra, a compilation of short stories that give a message of our immense cultural heritage, Ciko, a character which tells you facts related to various aspects of life which we are unaware of. The channel will also air a variety of foreign content, which will be shown for the first time in the Indian market like the Charlie Chaplin show. The content will be dubbed in Hindi. Apart from cartoon series, it will air interactive & educative programming. "Techno Kids" shows has already been a craze for kids that Encourages a hands-on approach for kids to understand how the world around them works. The show introduces mechanical & engineering concepts to kids between the ages of 3 – 14 through working models created entirely out of household items. Teleone Consumers Product Pvt Ltd OUR GROUP OF CHANNEL MAHA MOVIE Managed by D V Media & Entertainment Private Limited Home | About Maha Movie | Schedule | Press | Contact Us | On Line user:24 Copyright ® 2014 Maha Movie All rights reserved.
cc/2020-05/en_middle_0097.json.gz/line1418206
__label__wiki
0.968305
0.968305
TBWA pulls Trump/Verwoerd campaign, hands back Loerie by Herman Manson (@marklives) TBWA\Hunt Lascaris has issued a statement acknowledging it inadvertently misquoted apartheid prime minister, Dr HF Verwoerd, and current US president, Donald J Trump, in a Gold Loeries award-winning radio ad produced for the Apartheid Museum (see #Loeries2018 controversy over TBWA’s Apartheid Museum ad). The agency says “7 of the 27 quotes it used in the campaign appear to be in question as to their true authenticity.” Sean Donovan, TBWA CEO apologised for the campaign. “We always apply in-depth research and fact-checking in all our work, and it was certainly never our intention to attribute the wrong quotes to anyone. For that we unreservedly apologise. But the lesson is certainly that even trusted sources need to be questioned.” The agency also announced that the campaign has been pulled and that it would be handing back the Loerie award it had won. http://www.marklives.com/wp-content/uploads/TBWA-radio-ad-for-Apartheid-Museum.mp3 Full statement by TBWA Hunt Lascaris TBWA Hunt Lascaris statement on sources used in “Past and Present” Campaign Johannesburg – 24 August 2018 – TBWA Hunt Lascaris confirms that it inadvertently took some of the sources believed to be trustworthy and used them in its recent award-winning “Past and Present” campaign at face value and should have dug deeper. The company’s internal investigations in which all sources were submitted for further verification revealed that 7 of the 27 quotes it used in the campaign appear to be in question as to their true authenticity. The campaign, which is no longer on the airwaves, was a three-part series for the Apartheid Museum which compared the quotes of famous people in history. The campaign juxtaposing Verwoerd and Trump won an award at The Loeries Awards a week ago. The campaign drew attention to a message which remains highly relevant – the uncannily similar quotes made by apartheid architect Dr HF Verwoerd and US President Donald Trump. “We always apply in-depth research and fact-checking in all our work and it was certainly never our intention to attribute the wrong quotes to anyone. For that we unreservedly apologise. But the lesson is certainly that even trusted sources need to be questioned,” says TBWA CEO Sean Donovan. The four questionable sources were from a purported speech, a book which is currently in circulation and a major international newspaper specifically the New York Times. “We certainly apologise for taking those sources at face value and had no malicious intent to misrepresent the facts. We trusted them and had no reason to doubt that the sentiments being expressed were not those of either Verwoerd or Trump,” he says. TBWA is in communication with The Loeries and has provided full details of their investigation. As a proactive measure and to ensure the integrity of the Apartheid Museum, the agency has pulled the campaign and will be handing the award back. //Ends Herman Manson (@marklives) is the founder and editor of MarkLives.com. — One subscription form, three newsletters: sign up now for the MarkLives newsletter, including Ramify headlines; The Interlocker, our new monthly comms-focused mailer; and Brands & Branding, launching soon! Adland, Columns, Featured, Hermaneutics – Herman Manson EXCLUSIVE: New CEO for Wunderman Thompson SA EXCLUSIVE: Kessel rejoins adland as creative lead for Liquid EXCLUSIVE: Make Beautiful acquired by M&N Brands
cc/2020-05/en_middle_0097.json.gz/line1418209
__label__cc
0.551867
0.448133
MechCorps PX/Store About MechCorps MechCorps reports for duty at ComicPalooza! posted May 20, 2015, 6:19 PM by Muerte MechCorps [ updated May 20, 2015, 7:05 PM ] ComicPalooza, Houston’s largest fan expo, is back for yet another round of high excitement. This Memorial Day, the George R Brown Convention center will be home to a collection of some of the most popular celebrities assembled anywhere in the country! Marvel’s Stan Lee will be bringing his SHIELD bodyguards from TV and film. Everyone’s favorite Starfleet pilot, George Takei, will be bringing his own special brand of comedy to ComicPalooza. Not to mention all of the cosplay, fan groups, and gaming, ComicPalooza is shaping up to be a great time! Heavy metal band GWAR is even shown to attend, but no one does heavy metal like the giant robots of MechCorps Entertainment! MechCorps’s Tesla II Battletech Cockpit Simulator Pods will be warmed up and ready to show ComicPalooza some real heat with 75 tons of robotic carnage! Battletech players will be able to enjoy the best simulator game in the galaxy as they join in both solo and team battle games. MechCorps staff will be ready and willing to provide training in the finer points of Battlemech combat. Be sure to bring a big group, because giant robot battles are always more fun with a little smack talk mixed in with the lasers and missiles! Battletech is an experience like no other and MechCorps is honored to bring that experience to ComicPalooza! MechCorps Entertainment, LLC is the largest independent operator of Virtual World Entertainment's Tesla II BattleTech: Firestorm Cockpit Simulator Pods with its main base of operation in Houston, Texas. MechCorps' Mobile Armor Division is the touring branch of MechCorps traveling to various conventions and other remote deployments across the United States. MechCorps Entertainment, LLC is a privately held company. Visit MechCorps.com, Facebook.com/MechCorps or Twitter.com/MechCorps for more information. Headquartered in Kalamazoo, Virtual World Entertainment is a leading supplier of high-end, centerpiece attractions to the location-based entertainment industry. Virtual World has produced and distributed cockpits since 1989. Virtual World Entertainment, LLC is a privately held company. Visit today at MechJock.com. Website ©2018 MechCorps Entertainment, LLC. Some content and imagery ©2009 Virtual World Entertainment, LLC and used with permission. Firestorm, Tesla II and the V-Hoop are trademarks, Virtual World is a registered trademark of Virtual World Entertainment, LLC. BattleTech, 'Mech, and MechWarrior are registered trademarks of Microsoft® Corporation, used under license. MechCorps is a trademark of MechCorps Entertainment, LLC.
cc/2020-05/en_middle_0097.json.gz/line1418219
__label__wiki
0.729505
0.729505
MRA Schedule Race Week NOR and SIs Racing Chart Racing Courses Perpetual Awards < Home Page The Racing Season Both one-design and PHRF racing is scheduled every weekend from May through September each year. The season consists of 4 short series that are scored individually, and then the total scores are combined for the overall season championships. Many other special events, as well as regional, national, and world-level regattas occur throughout the summer. For full schedule details, please refer to the MRA Schedule. Daily - A yacht club logo glass is awarded to the winner of each MRA race in each fleet of two or more starters, during regular MRA series races. After racing is completed for the day, glasses may be picked up at the front desk of the sponsor yacht club (please refer to the MRA Schedule). Series and Season - Prizes will be awarded to the winner of each class. Additional series and season prizes will be awarded depending on the average number of starters for all races completed. Perpetual - Trophies are awarded, where merited, and are based on criteria that are specific to each perpetual trophy. For a list of MRA perpetual trophies and past winners, please see the Perpetual Awards page. At the conclusion of the racing season, series and seasonal awards are distributed during the end of season awards banquet. The date, time and location of this event can be found in the annual MRA schedule. Photo By: Leighton O'Connor © 2020 Marblehead Racing Assocation
cc/2020-05/en_middle_0097.json.gz/line1418224
__label__wiki
0.612983
0.612983
43: Dollars and Sense wi... 42: Tom Wassell is here ... 41: Douglas Scott of @Ex... 40: Announcing @Offspeed... NASORB Cast Paul Richardson’s imminent return was unlikely, both he and the team are lucky Casey McLain | 26 October, 2015 | Seahawks | No Comments It wasn’t even 10 months ago that Paul Richardson tore his ACL in a game against the Carolina Panthers. This kind of injury for this kind of player, especially this late in the season, is a combination for something dreadful in many cases. There was a chance that Richardson wouldn’t be up to game-speed at all in 2015, and there was a greater chance that even if he could have gotten up to game speed, he would have been a casualty of the roster crunch that many teams face after players are no longer eligible to be on the PUP list. There was a chance that if Richardson didn’t make it back by the PUP deadline, that the team would have to place him on injured reserve instead of using an active roster spot on him, or having to IR another player who may be able to contribute sooner. Two things have happened to alter that fate. First, the Seahawks have been one of the league’s healthiest teams so far this year. According to this ESPN article, the Seahawks are the healthiest team in the NFL so far this season, with only Thomas Rawls’ injury to be added to this list. The team will play a game against the Cowboys on November 1, and won’t play again until November 15. Early indications are that Richardson has looked fast in practice. Fast doesn’t inherently mean “game speed” fast, but maybe it does. But the Seahawks are in a position where they could feasibly leave Richardson inactive against the Cowboys, allowing for nearly three more weeks of recovery for Richardson’s surgically repaired knee. Secondly, Richardson has apparently recovered remarkably quickly. Richardson isn’t the kind of receiver who is going to fight for the ball, or who can rely exclusively on his physicality to make plays. His game is speed, and he’s coming off of the second ACL reconstruction of his playing career, the first one in college. Reports from the Seahawks have Richardson looking “lightning fast.” Of course, the genesis of these comments is an article on Seahawks.com, and the source is a direct quote from perpetual cheerleader Pete Carroll. Take it with the appropriate grain of salt. But Paul Richardson is back on the field. His presence could mean depth, or he could start to claim a larger role on the team, something he’d been taking large steps towards when he went down with the knee injury. 2012 Seahawks QB Candidates: Jimmy Clausen Peyton Manning signs with Denver Broncos Seattle Seahawks 2014 offseason financial primer (UPDATED) Preseason Recap: Seahawks vs. Titans Casey McLain Casey is the founder of North and South of Royal Brougham. Follow him at @TheCaseyMcLain and check out his other podcast called Offspeed Podcast. Some tempered enthusiasm regarding Dan Vogelbach 20 July, 2016 Revisiting Safeco as a Pitchers Park 7 February, 2016 Introducing The Mariners New Bullpen 22 December, 2015 The Mariners Welcome Back Iwakuma 20 December, 2015 Why the Seahawks Won’t Cut Lynch 17 December, 2015 Copyright © 2020 North and South of Royal Brougham. Follow @NASORB on Twitter Like NASORB on Facebook Subscribe to NASORB’s RSS Feed About NASORB Contact NASORB
cc/2020-05/en_middle_0097.json.gz/line1418226
__label__cc
0.518175
0.481825
SIX biggest “mainstream” media FAILS and cringe-worthy moments of 2017 This year will, without a doubt, go down as the year the American mainstream media lost its remaining credibility — that is, if you’re being fair in your assessment. And while we can actually trace the beginning of the end for the establishment media to before President Donald J. Trump defeated the most thoroughly corrupt presidential candidate representing the most thoroughly corrupt (and anti-American) party in the history of the republic, it was this year that saw the mainstream media self-destruct. From breathless, wall-to-wall coverage of “Trump-Russia collusion” ‘scoops’ that turned out to be wrong time and again to late-night lectures from far-Left “comedians” about public policy, Americans were treated to one fail after another, and no shortage of truly cringe-worthy moments. Let’s count down the five best examples, shall we? (h/t Grabien News) 1. ’We will tell you what to think, got it?’ In February during MSNBC’s “Morning Joe,” featuring engaged couple Joe Scarborough and wife-to-be Mika Brzezinski, the latter took Trump to task (one of many times throughout the year) for telling Americans they are right to be skeptical of the [lying] press. Why? Because she was concerned that we Americans would trust him a helluva lot more than her and her half-wit colleagues at the network. “He could have undermined the messaging so much that he can actually control exactly what people think. And that, that is our job.” Mind control much, Mika? 2. The losers at ABC News blew the biggest story of the year. After Trump’s first national security advisor, Michael Flynn, was indicted for lying to the FBI, ABC’s Brian Ross broke what many believed was a massive scoop: That during the campaign, then-candidate Trump instructed Flynn to reach out to the Russians. There it was, the smoking gun! Turns out that Trump did ask Flynn to talk to the Russians — and a number of other foreign governments — after he became president-elect, which is completely normal and acceptable. Subsequently, Ross was suspended. (Related: Fake News: ABC forced to ‘correct’ bombshell Flynn report AFTER stock market collapsed 350 points.) 3. Leftism Late Night. After GOP Sens. Lindsey Graham and Bill Cassidy sponsored healthcare reform legislation that would have allowed states to exercise more control and flexibility over Obamacare state-run exchanges, Jimmy Kimmel abandoned any semblance of comedy (and entertainment) to rail against the bill and to get his audience to oppose it. The Left-wing sermonizing by Kimmel earned him the moniker of “America’s conscience” by the nauseating establishment media. 4. Hillary is our hero! After losing her second bid for the White House, Hillary spent A LOT of time looking for some Trump scandal — anything. She also released her book on the 2016 race called “What Happened.” She then went on a major media tour and was feted by reporters who treated the scandal-ridden failed candidate like a queen. Barf! 5. Can we impeach Trump already? It didn’t take long for the media to jump on the “Impeach Trump!” bandwagon. Shortly after he fired FBI Director James Comey for politicizing the bureau’s probe into Hillary Clinton’s criminal mishandling of classified information, the establishment press began beating the impeachment drum. Only problem there is that as head of the Executive Branch, Trump has the authority to fire anyone he wants and for any reason — or no reason. Oops. 6. One more slobberfest for Obama! In his final White House press corps appearance, reporters did not use the opportunity to finally get some answers about Obama’s various and sundry scandals during his administration. No. Rather, it was a slobberfest love-in, with reporters showing the outgoing president with heaps of praise and adulation. The Blade’s Chris Johnson itemized what he felt were Obama’s greatest accomplishments then invited him to…wait for it…bash Trump. Then there was the L.A. Times’ Christi Parsons who pointed at her phone and begged Obama to call her, all while telling him it was “an honor” to cover his administration. She did have a question, though, and it was this: How would he explain the election of Trump to his kids? How about, “It’s called democracy,” you sycophant. J.D. Heyes is a senior writer for NaturalNews.com and NewsTarget.com, as well as editor of The National Sentinel. News.Grabian.com TheNationalSentinel.com Tagged Under: cringe-worthy, fake news, Journalism, mainstream media, media fail, President Donald J. Trump, President Obama, press corps, White House Media unabashedly pushing grossly fake news to cover for CNN reporter Jim Acosta after he lost his press credentials for “putting hands” on White House intern Associated Press caught in massive, engineered pre-election LIE about guns and shootings Woman who accused Brett Kavanaugh of rape admits she totally made up her story to “get attention” NBC News proves yet again why the fake news media is the true ENEMY of the People Scripted narratives: Here are the 10 directives mainstream media pushes to keep the world in the dark Left-wing media desperate to try to somehow blame Trump for anti-Jewish Synagogue mass shooter FBI Director Christopher Wray is LYING to America about the fake pipe bombs: Yes, they were HOAX devices Elements of the Kashoggi murder story appears to be a massive, coordinated media HOAX Fake science: CDC publishes totally false data on gun injuries, but the left-wing media eats it up without any supporting evidence DNA tests prove Elizabeth Warren has LESS “Native American” ancestry than the average white American More obvious CNN brainwashing on display – watch at Brighteon.com The Carbonaro Effect: Magician reveals how fake news media indoctrinates the gullible masses with junk science NBC News totally exposed as a lying FAKE NEWS propaganda network desperately trying to destroy Brett Kavanaugh USA Today smears Kavanaugh, implying he’s a pedophile… this is the media that claims to have a monopoly on “facts” BBC misreports Trump’s words – Replaces “more” with “far” (UK network delivers catastrophic fake news) Latest Kavanaugh accuser Julie Swetnick graduated high school in 1980, so why was she partying with minors in 1982? “Corroborating” signed statements against Kavanaugh are a media hoax; no corroboration is found in any of the statements The smear train against Kavanaugh goes ballistic, Avenatti fabricates “gang rape” accusation in last desperate ploy to halt Senate confirmation NYT deliberately buries critical facts in its reporting on Kavanaugh, proving yet again the NYT is the propaganda arm of the DNC BOMBSHELL: Christine Blasey Ford’s letter to Sen. Dianne Feinstein revealed to be a total FAKE… contains 14 glaring errors that could only be committed by a poorly educated writer COPYRIGHT © 2017 NEWS FAKES
cc/2020-05/en_middle_0097.json.gz/line1418229
__label__wiki
0.877985
0.877985
City & Stage About MMSP Established in 1972 by community and University of Montevallo faculty and staff members, the Montevallo Main Street Players is the oldest active community theatre in Shelby County, Alabama. A not-for-profit performing arts organization, the group is staffed by volunteers who range in age from middle school students to retirees. Members of the Montevallo community and beyond are welcomed and encouraged to get involved—either onstage, backstage, or in the sound and lighting booth. MMSP brings the magic of theatre to Central Alabama with an average of three plays a year. Productions range from contemporary comedy to modern tragedy to classic musicals to old time radio dramas. Whether one acts onstage, works backstage, or sits in the audience, a splendid time is guaranteed for all. MMSP is a 501c-3 not-for-profit organization. Membership is tax deductible. The Montevallo Main Street Players stages its productions in the Parnell Memorial Library Theater, 277 Park Drive, Montevallo, AL 35115. 277 Park Dr, Montevallo, Al 35115 | 1 (205) 665 9207 ext6 | Directions © Montevallo Main Street Players
cc/2020-05/en_middle_0097.json.gz/line1418232
__label__wiki
0.725595
0.725595
Northwest Military A little patch of Zen Japanese garden dedication formalizes relationships By Jessica Corey-Butler on November 8, 2007 Write to Editor You know that special geographical locale when you’re in it. It might be a snowy mountain lookout, or a winding forest trail. Possibly, there’s a patch on a certain beach where the rocks, water and sound of the waves brings you to your happy place. Students at Tacoma Community College — and community residents who know the secret — can now enjoy multiple happy places melded together in a new garden being dedicated Friday, Nov. 9, at 1 p.m. The public is invited to attend the free celebration and sneak a peek at the natural, traditional high art and culture. The Babe and Herman Lehrer Japanese Friendship Garden located at the north end of the Tacoma campus is a sample of a traditional art form that blends the form of a garden with the function of a natural space for reflection, utilizing elements like real or symbolic water, rocks, some architectural elements, potentially rendered in stone, a bridge, and a hidden vista, or “shakkei” (borrowed scenery). These elements are combined in a deliberate manner with elements at every turn that invite observation and quiet contemplation; all blend together to create the perfect pocket of natural escape from urban stress. Consider college students, and you have a likely audience in need of stress relief. “We’re delighted and proud to have a beautiful space to have people reflect and study,” states Dale Stowell, director of marketing and communications at TCC. He reflects on the changing face of TCC: “The college has really been transformed.” Stowell points out the new Science and Engineering building as one example. Compared to the smattering of sometimes confusing outbuildings that marked the campus 10 years ago, the new and improved campus, with new spaces joining revamped and improved buildings, has helped the college put a new face forward. Stowell explains that as part of that revamping process, “We’ve become much more intentional about public spaces — this garden is a great example of that.” The garden also represents, according to Stowell, “how much we value diversity at TCC.” The strong International program, diverse community, generous donors, committees developed at TCC, and the relationship between Japanese sister city to Tacoma, Kitakyushu, all came together in this project. Japanese landscape architects Sadaaki Mizuno and Toshiyuki Yano from Kitakyushu made several trips to TCC to develop and implement the “karensansui”(waterless) garden, which includes a dry waterfall flowing down to a sea of white sand, along with a pebble beach, a central stone island, stone bridges, and “human artifacts” including a 12-foot tall pagoda and several stone lanterns. The garden is named in honor of Babe Lehrer and her late husband Herman, recognizing her 22 years of service and leadership in the TCC Foundation. With so many connections helping to bring the Japanese Friendship Garden about, the different components of the garden seamlessly flowing together serve well as a symbol of the college and its local and global community. “The Japanese Friendship Garden is really a living, breathing work of art,” Stowell adds. For the event that will take place on Friday, sponsored by the Port of Tacoma, the outdoor dedication will be followed by an indoor celebration of Japanese art, flower arranging and music. Kitakyushu Mayor Kenji Kitahashi is expected to attend the event alongside Tacoma Mayor Bill Baarsma, along with a delegation of more than 20 Kitakyushu officials. [Tacoma Community College north end, garden dedication, Friday, Nov 9, 1 p.m., 6501 S. 19th St., Tacoma, 253.460.4379] Discover More Articles By Same Author Online guides for 2020 By Chris Butler on January 16th, 2020 Winter and spring events around JBLM Great American musical classic By Alec Clayton on January 16th, 2020 Pizzeria Fondi By Dutch Randall, Jackie Fender on January 16th, 2020 JBLM couple open biz By Jessica Corey-Butler on August 11th, 2016 Hope, healing and nature By Jessica Corey-Butler on August 4th, 2016 American Grit-like By Jessica Corey-Butler on July 22nd, 2016 Running for hope By Jessica Corey-Butler on July 7th, 2016 Event name change Follow Weekly Volcano: Spouse magazine Weekly Volcano South Sound Cinema South Sound Happy Hours App Content © Copyright 2020 - Northwest Military. All Rights Reserved.
cc/2020-05/en_middle_0097.json.gz/line1418240
__label__wiki
0.854393
0.854393
Enterprise News> Exhibition Information> location: Home > News > BYD won top Future Energy Prize�C"Large-scale Enterprise Nominee" BYD won top Future Energy Prize�C"Large-scale Enterprise Nominee" At Abu Dhabi time on January 15, the WFES 2013 was held in Abu Dhabi, the capital of Dubai. We were awarded “Large-scale Enterprise Nominee” of 2013 Zayed Future Energy Prize and issued the certificate by president of Iceland and sponsor in award ceremony. CCTV, Phoenix TV, Xinhua News Agency and well-known PV Magazine had interviews with the General Manager of 2nd Business Unit HE Long afterwards; at the same time, the Deputy Director of National Energy Administration LIU Qi also visited the booth, the Manager HE and Zhao Tong, the General Manager of Overseas Solar Cell Sales Department, explained our global new energy development strategy. This award is the recognized top new energy award of the world. The politicians and royal family from different countries are invited in the previous award ceremonies, and the King Sheikh Zayed, Organizing Committee Chairman, Spanish king and Iceland president are invited to the award ceremony of this year for making speech. The chairman of the review committee is Iceland president Grimsson, and the members include former president of Maldives, former prime minister of Korea, minister of Energy department of South Africa, well-known film star Leonardo DiCaprio (star in Titanic), etc. After fierce competition, BYD was shortlisted for “Future Energy Large-scale Enterprise Prize” out of 119 global new energy corporations with its overall solution of solar, energy storage and electric vehicles, becoming one of the top three together with Sharp and Siemens. Siemens won the award in the end. We attended this exhibition with complete new energy solution and promoted our excellent products and technology to the Middle East and the world, including the solar components using the latest TOP.5 technology and the household energy storage system favored in European market, and showed the great achievement of electric vehicles. The attending staff enthusiastically introduced the new energy products and green dream of our company, and many visitors showed great interest in BYD products. Manager HE interviewed with reporter from CCTV Chinese ambassador to Japan visits BYD booth scene of award ceremony BYD Shortlisted Iceland president presents certificate to BYD Our staff in exhibition
cc/2020-05/en_middle_0097.json.gz/line1418243
__label__cc
0.571303
0.428697
Oneida Food Service Oneida Catalogs Chef's Table Hammered Our popular 18/0 Chef's Table pattern sparkles with a hammered finish. Modern, hearty and versatile, this design is suited for multiple dining occasions. shop individual products Add Products To Your Quote Below are all the individual products within this specific pattern. Choose a quantity for each product that you would like to add to your quote. Any product that you do not choose a quantity for will not be added to your quote. Once you are satisfied, just click the add to quote button to begin. It's as simple as that. B327FDNF Dinner Fork Width: 7 7/8 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327SDEF Oval Bowl / Dessert Spoon Width: 7 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327KDTF Dinner Knife Width: 9 1/2 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327FDEF Dessert/ Salad Fork Width: 7 1/8 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327STSF Teaspoon Width: 6 1/4 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327STBF Serving Spoon Width: 9 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327FOYF Oyster / Cocktail Fork Width: 6 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327SADF A.D. Coffee Spoon Width: 4 3/8 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327SBLF Bouillon Spoon Width: 6 1/4 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327KBVF Butter Knife Width: 6 7/8 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327SFTF Euro Teaspoon Width: 5 3/4 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327KDAF Dessert Knife Width: 8 1/4 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327SITF Iced Teaspoon Width: 7 3/8 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327KSSF Steak Knife Width: 10 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327SBSF 13" Pierced Spoon Width: 13 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327SBNF 13" Banquet Spoon Width: 13 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327FBNF 13" Banquet Fork Width: 13 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327MSPF 13" Soup Ladle Width: 13 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327MTLF 13" Banquet Tongs Width: 13 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 B327FDIF European Dinner Fork Width: 9 1/8 IN. Select Quantity 0 0 0 0 0 0 0 0 0 0 You must be logged in to submit reviews. Please, log in or register Read Reviews: &amp;lt;img src="//pixel.quantserve.com/pixel/p-rgJkkQCh95_bs.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/&amp;gt; Shop back to top About Oneida back to top Why Buy Oneida Oneida University back to top Oneida Glossaries Follow Us back to top Site Resources back to top Brands back to top Copyright 2020 Oneida Hospitality Group.
cc/2020-05/en_middle_0097.json.gz/line1418245
__label__wiki
0.733575
0.733575
President's Medals About The Presidents's Medals Project Entries Dissertation Entries Dissertation Judges Bronze Medal judges Silver Medal judges Find Student Find School Find Project Dissertation Medal Winner 2010 Happy Communities Part 2 Dissertation 2010 University of Westminster UK Architects, politicians and planners believe that well-designed built environments have a transformative effect on people's lives. They see themselves as integral to the process of creating socially sustainable communities ¬– an objective backed by legislation and passed down in the delivery requirements for housing projects. Yet, while billions of pounds are spent on house building and regeneration, in the belief that successful communities can be created by design, it does not seem to make them better. Curious that both thriving and failing communities come in many guises, I decided to investigate the relationship between their built form and their social circumstances. Observational accounts, written over 150 years, identified some of the features of successful communities and the underlying causes of their failure. Historical precedents revealed the influence of social and political ideologies and the extent to which planned environments have contributed to the success of communities. In search of fresh insight, I called on the expertise of various witnesses – and focused this new light on two communities in London’s East End: the Holly Street Estate in Hackney and Bromley-by–Bow in Tower Hamlets. Both are among the most socially deprived wards in the country, but while Holly Street has undergone a costly and well-designed redevelopment, Bromley-by-Bow has received minimal funding for piecemeal improvement. Yet Holly Street’s social problems persist, while Bromley-by-Bow is experiencing a revival, through locally-generated social enterprise. This investigation reveals a gulf between well-intentioned aspirations and the reality of community life. We have a poor understanding of what constitutes a ‘happy community’ and an inflated sense of the built environment’s ability to create them alone. The factors that decide whether they will thrive or fail are not solely dependent on their physical form – there are social factors, over which designers have little control, which must be addressed first. Communities evolve slowly, from a strong social base. Architects can contribute to their success, but only in conjunction with others: by taking account of local, social and historical context; and by engaging collaboratively with people to create the physical conditions in which they can function and thrive. This is an exceptional piece of research which uses historical and contemporary expert commentary to investigate the factors which contribute towards the creation and success or failure of sustainable communities. The principles adduced are then applied to two deprived areas in East London. The factors are often elusive – if they were not, then there would not be a problem – but the modestly-stated but incisive conclusion, that architects have an important but far from solitary role, is perceptive, well-substantiated and even-handedly argued. The author’s deployment of comparative summaries of observations by others, together with site observation and interviews, supported by official statistics, enables the compilation and assessment of a very wide range of material in understanding and measuring the notion of community in the context of the activities of regeneration and social renewal. In its montage of historical analysis, empirical facts and contemporary policy-making, this multi-faceted study is striking not least for its research-led impartiality. This is an elegantly presented, extensively researched and intelligent study, distinguished by its quality of argument and challenging of received opinions. There are no easy solutions to the problem of understanding the social and environmental elements which make for ‘happy communities’ but this study deserves to be taken into consideration by all those policy-makers who aspire to create them, often on the basis of very limited evidence. Tutor(s) Dr John Bold Happy Communities. Can they be created by design? Image courtesy of James Bell Bromley-by-Bow 1880s. Courtesy of Getty Images Bromley-by-Bow 2008 Holly Street 'snake blocks', Hackney, 1961. Courtesy of Hackney Archive Holly Street, Hackney, 2008 • Page Hits: 18822 • Entry Date: 25 June 2010 • Last Update: 25 November 2010 The Royal Institute of British Architects champions better buildings, communities and the environment through architecture and our members. We provide the standards, training, support and recognition that put our members - in the UK and overseas - at the peak of their profession. RIBA Cookie statement | RIBA Privacy policy | RIBA Terms of use About RIBA Our press office Support RIBA Support architectural excellence RIBA Bookshops 66 Portland Place, London, W1B 1AD • +44 (0)20 7580 5533 • info@riba.org Registered Charity No. 210 566. Incorporated by Royal Charter No. RC000484
cc/2020-05/en_middle_0097.json.gz/line1418246
__label__wiki
0.71695
0.71695
Reasoned.Life Demolishing absurdity under an avalanche of logic and reason … John P. … Jeff Wasel, Ph.D. … Our Privacy Policy Lyndon LaRouche vs. L. Ron Hubbard: Why Two Paranoid Cults Tried to Redefine Music Today, we’ll take a look at how paranoid, far-right fringe political cult leader Lyndon LaRouche attempted to intimidate the musical world into redefining one of the fundamental aspects of musical physics. In some sense, LaRouche’s efforts are similar to what Scientology founder L. Ron Hubbard did when attempting to reinvent the sound recording process as part of his own aesthetic theory. The two stories are good for a few laughs. But ultimately, the moral of the story is quite serious. First, cults behave like totalitarian states in their attempts to control artistic and creative expression. Second, these examples remind us that cults are able to get their followers to believe strange things and to engage in quixotic quests that accomplish little save stroking the egos and lining the wallets of power-mad cult leaders. Scientology is far from alone in this regard, and combining our experience in Scientology’s ability to get members to do bizarre things with what we learn about similarities between cults can help the cult awareness community to help people more generally in the future. It would be extraordinarily surprising if a large number of other cultic groups did not attempt to redefine the very foundation of what it means for something to be art. While not all cults do so, we would suggest that the severity by which any group attempts to restrict its members from experiencing certain types of art or where it attempts to reinvent aesthetics is directly correlated with the level of cultic involvement it tries to get from readers. Power of Source Album Cover, 1974. Are we having fun yet? About Lyndon LaRouche and His Groups I haven’t researched paranoid political cult leader Lyndon LaRouche and his groups more than casually over the last few years, so a large part of this section is summarized from his Wikipedia entry. If you read the Wikipedia article, note that it is relatively mild in tone and treads gently in discussing the cultic aspects of his organization, which controls members’ lives to a degree consistent with other heavy-duty cultic groups. I recall someone who posted several years ago under the handle of “Cultwife” on Tony Ortega’s blog, who lost her husband years before to LaRouche; her personal narrative is consistent with the experiences of other former LaRouche followers. Lyndon LaRouche. Source: NationalVanguard.org Lyndon LaRouche is a political gadfly who over a 60-plus year period has created a number of political organizations to espouse various economic and governmental theories that are fairly far out on the fringe. Originally, his views were hardcore far-left socialism but he rapidly shifted to ultra-right lunacy by the late 1960s. Much of his material is paranoid economic and political theories that are easily debunked by people with only minimal education in economics or who consume reputable news. He also has a number of bizarre scientific notions that have driven him to create front groups ostensibly to advance science-related causes such as spending on development of fusion energy. At his height, LaRouche organizations had perhaps 10,000 active members and over 100,000 subscribers to several magazines the groups published. Various estimates suggest that LaRouche has perhaps 1,000 to 2,000 followers globally today. The most dedicated followers live in decrepit group housing and work long hours soliciting donations, recruiting members, and waiting on leadership. In the early 1970s, LaRouche began to publish “intelligence reports” with his views on world events; he used followers from around the world to collect and forward news articles to him, which he would then editorialize on, typically attempting to fit the news into one of his conspiracy theories. LaRouche started to use this newsgathering organization to attempt to approach and influence politicians, including attempting to offer “data” to the CIA and NSA on groups that LaRouche thought were enemies of the US. LaRouche and various followers were able to meet with senior officials in the Reagan Administration on several occasions, until these meetings were revealed in the press. LaRouche’s intelligence analysis is, of course, not unlike what Hubbard was doing at the same time, in the “Orders of the Day” issued when he was aboard the Apollo and the rest of the motley Mediterranean flotilla, where he took a news clipping and provided “special insight” into current events, with a heavily conspiratorial bent. There’s no way to know whether Hubbard and LaRouche influenced each other in this respect, because they were both already paranoid and possessed by delusions of grandeur, dreaming of taking over governments (Hubbard’s follies in trying to take over Rhodesia, Malawi and other places are well known, and LaRouche frequently ran for president of the US as a fringe candidate). It’s ultimately irrelevant whether one influenced the other, because people indoctrinated into the cult milieu seem to gravitate towards conspiracist thinking naturally; it doesn’t appear that cult leaders need to be taught explicitly to include this in their thought reform programs. Essentially, LaRouche is the founder of a political cult that is in many ways the equal of Scientology in organizational complexity and in the depth of the mindfuck that members suffer, though it has not been as successful in attracting members over its life, and its available cash is less. However, the relative quiet of the LaRouche groups in the last few years could be an asset, since their brand name is not as toxic in the broad reach of society as Scientology’s is today. “Scientific Pitch” In days of yore, there was no universal standard for what frequency would anchor a given system of musical notation. One note anchors a particular tuning, and all other notes are derived from the frequency of the note that the pitch scale was based on. Each conductor used what felt best to them. While variations were not extreme, they were enough to change the “brightness” of the sound significantly. Over time, the musical world settled on one of a few pitch standards. The nearly universally used standard today is the “A440” standard, where the A above Middle C oscillates at 440 Hz. In the 18th century, a physicist proposed a standard now called “scientific pitch,” where the frequency of the Middle C note was defined as precisely 256 Hz – Middle C in the A440 standard works out to be 261.62 Hz. The difference would presumably be extremely noticeable to musicians, perhaps not in a good way. But the idea of 256 Hz as a defining frequency for music had appeal to mathematicians and physicists, including Joseph Sauveur, the inventor of the scientific pitch idea. That’s because 256 is an exact power of two, and thus a table of frequencies in octaves would be very tidy when written out, since all C notes would also be an even power of two. The idea of regularizing measurement systems and “tidying them up” was well under way in Europe at the time, and would culminate much later in the 18th century with the development of the Metric system. Giuseppe Verdi, as drawn in Vanity Fair magazine, 1879 Unsurprisingly, Sauveur’s attempt to impose arbitrary order on the musical community was not a hit and it fell by the wayside, apart from occasional attempts to revive it, for nearly 250 years. Perhaps the only notable attempt to drive scientific pitch was by legendary operatic composer Giuseppe Verdi in the late 19th century who advocated the idea briefly, though even a composer of his stature was unable to interest the broader musical community. Scientific pitch would remain relegated to obscurity after Verdi for a century, when it garnered an unlikely advocate. LaRouche’s Activism on Behalf of Scientific Pitch: From Odd to Cultic Friedrich Schiller painted by Ludovike Simanowiz, 1794. Source: Wikipedia In the 1980s, Lyndon LaRouche’s wife created an organization in Germany called the Schiller Institute. This was created to advance the philosophy of Friedrich Schiller, an important German playwright who also wrote extensively on the philosophy of aesthetics, among other things. Schiller also pursued musical adaptations of his works, with both Beethoven and Brahms writing scores to set his poems to music. The final movement of Beethoven’s 9th Symphony is one score for Schiller’s poetry, and Schubert scored 44 different Schiller poems. Verdi, who tried to promote C256 tuning, was also a fan of Schiller’s musical work, incidentally. I haven’t taken the time to try to find out why Schiller’s ideas were so compelling that an advocacy group was needed two centuries after his death. It may simply be that LaRouche’s German-born second wife, who he married in 1977, was interested in the playwright’s work, so LaRouche funded her passion. He wouldn’t be the first rich husband in history to fund his wife’s vanity business. The Schiller Institute is not exactly a roaring success of late; its 2015 IRS Form 990 reveals income of $37,617 and expenses of $80,175. And its focus appears to have wandered from the questions of aesthetics that its namesake grappled with. It’s been involved in speaking up for maglev trains and climate change, advocating against Clinton-era special prosecutor Kenneth Starr, and a mishmash of other causes. It’s unclear whether Schiller himself advocated for use of scientific pitch, so I’m not readily able to discern why LaRouche’s Schiller Institute felt it so necessary to champion such an obscure and discredited issue. Yet champion it they did. The Schiller Institute continues to hold conferences advocating for the scientific pitch idea. Merely wasting time holding meetings that few attend to advocate for a theory nobody cares about is not inherently cultic or bizarre. But several actions that the Schiller Institute took to advance the cause of scientific pitch most definitely are both cultic and bizarre. Most amusingly, the institute actually lobbied for a bill in Italy that would essentially criminalize possession of A440 tuning forks and would require performance of state-sponsored groups to be in the C256 tuning that it backs. Obviously, such a measure to mandate particular artistic techniques would never get serious consideration in most countries. I can’t find a record of whether such legislation was ever actually introduced into the Italian parliament or merely suggested by LaRouchies. We think such doomed initiatives serve an important purpose in cultic groups: giving members an impossible task, which causes them to doubt themselves more and thus to become more dependent on cult leadership and teachings for reassurance. LaRouche followers were also reportedly dispatched to concert halls with posters demanding the banning of the music of Vivaldi (presumably because he opposed scientific tuning), and leafletting a concert conducted by Leonard Slatkin claiming that “Slatkin Serves Satan.” Any connection between Slatkin and scientific tuning eludes our research. The derision that LaRouche followers felt when mocked while advocating this ludicrous cause is exactly what cult leaders can use to show followers that the world is a hostile place, again reinforcing the message that the cult is their only source of security. And other followers have attempted to frame the classical music community’s rejection of C256 tuning as a conspiracy theory, something deeper and more sinister than a theory that has simply been ignored because it’s irrelevant and unworkable. And, of course, LaRouche is perhaps the king of conspiracy theories among old-line cult groups. Conspiracist thinking is of course rife among many cultic groups because it reinforces the idea that the group has special mystical knowledge only available to a select group of elites who have mastered arcane teachings to achieve clarity that the vast majority of benighted humanity will never see. Finally, LaRouche claimed that the A440 tuning is actually hazardous to life and limb. One article reports various claims including: 432 Hz resonates with the Heart Chakra, repairs DNA and restores both spiritual and mental health. 440 Hz music was good at making people work harder and fostered personality traits desirable in the Third Reich. 440 Hz is unnatural and creates subtle disharmony to the listeners. When the two frequencies are examined in Cymatics experiments, the patterns show that 432 Hz creates distinct shapes which indicate that they resonate with nature. The 440 Hz tuning creates indistinct patterns revealing a lack of coherence. 440 Hz causes psychotic symptoms, paranoia and anxiety. These unhinged claims about A440 sound virtually identical to the claims that Hubbard makes about “the psychs,” who he attributes all the world’s ills to, including Nazism. Clearly, when framing the discussion this way, there’s little about musical merit and everything to do with relating to accomplishing cultic purposes. Hubbard’s Musical Maunderings For this discussion, we’ll ignore Hubbard’s attempt to showcase his own pedestrian musical talent. It’s important to focus on how he used the Scientology organization to attempt to redefine how music is created. L. Ron Hubbard tries to capture the keyboard coolness of, say, Keith Emerson, at the helm of the mighty Wurlitzer. From Issue 409 of “Celebrity” Magazine. Source: Vice.com Various eyewitness accounts have shown how Hubbard took talented musicians and made a laughingstock of their musical talents by imposing his typical anti-expert theories on the project. His idea, that the experts were basically grifting off honest record producers by making the process of recording engineering more complex than necessary, would be solved by simply setting the volume sliders on the mixing console to the middle of the range, and the resulting product would be the most natural sounding record imaginable, capturing every detail of the performances of the geniuses that “Source” personally conducted. The problem is that it takes a lot of effort, skill and creativity behind the scenes to make music sound “natural.” It’s like how Dolly Parton famously says about her clothes, “it costs a lot of money to look this cheap.” Of course, the resultant product, “The Power of Source” by the “Apollo Stars,” was a complete and utter disaster musically and commercially, wiping out the significant investment in not only time and talent, but also the cash forked out to set up the “Source Records” label, the “Source Music” publishing company and to hire a bunch of Scientologists to run around and try to convince legit industry players to deal with Hubbard. The Sea Org members dragooned into this exercise were allowed to dress cool, grow their hair, and channel their music industry experience from all those past lives on the whole track as training to shoulder aside Capitol, A&M and all the rest. Power of Source Album Cover, 1974 The album cover photo above shows that the participants in this recording project, including Hubbard, are excited about their role in musical history. You can share in their joy, as the resultant musical brilliance is available on YouTube for the massively masochistic to “enjoy.” While Hubbard didn’t pursue legislation to try to mandate acceptance of “Clear Sound,” he certainly spent hugely to try to drive its use. The laughably bad end product was easily ignored by indoctrinated cult followers who were able to engage in enough thought-stopping that they didn’t wonder how their brilliant leader was able to produce such a steaming turd of ineptitude. And the derisive reaction from the broader world, particularly from those who actually understood recording technology, provided grist for the mill of scaring members about the evils of the outside world and boosting dependence on the cult. But Hubbard’s actual attempt to reinvent recording techniques was driven by his own totalitarian musical ideology. In the early days of Scientology, Hubbard was just as interested in controlling artistic expression as LaRouche was. His “Art Series,” a series of Hubbard Communications Office Bulletins (HCOBs) appeared starting in the mid-1960s. In them, Hubbard defines his philosophy of art. Hubbard’s assertions that art was fundamentally a form of communication ensured that Scientology-approved art would inevitably be restricted to literalist expression, not unlike the Soviet propaganda posters. Art embodying creation for its own sake was verboten. LaRouche didn’t actually try to put his musical theories into practice (though the Schiller institute did hire performers to put on works using C256 tuning on several occasions), so we’re not blessed with an enduring comic legacy when we listen to his creations. But Hubbard’s insipid creative efforts obscure a very real attempt to define art in the service of Scientology, and to restrict what members are allowed to create, making him as totalitarian as LaRouche. Oh, And There’s Another Cult Leader Who Tried to Redefine Art… I normally wouldn’t want to risk committing a major Godwin’s Law violation by pointing the following out, but it is worth noting that Hitler tried to redefine art as a means for trying to suppress dissident thoughts from his population. Hitler labeled much abstract art as “degenerate” and not only suppressed the works, but also persecuted the artists, damaging many careers. The propaganda that replaced it was an attempt to enforce focus on the goals of the regime, and to make an example of a small group to show the value of going along with the regime. Much has been written elsewhere, but it’s worth noting that this was a key means for controlling the population in the early days of Nazi rule. This regulation of art was not restricted to Nazis; plenty of other totalitarian states subsumed creativity to the interests of the state. Consider Soviet-era propaganda posters, which took some of the country’s most talented painters and turned them into party hacks turning out nonsense. And, of course, the North Koreans continue to do this today, as one facet of controlling artistic expression on a broad scale. Fine Artist Reduced to This: “On each and every attack our valorous Red Army will answer with three times more powerful blows!” Source: allworldwars.com I’ve only highlighted two examples of cults attempting to create a new definition of art, and to impose that definition on the rest of the world. To those of us who were never in cults, these attempts are laughable. But to cult leadership, these efforts to dominate a domain far afield from the cult’s core beliefs are deadly important. They accomplish multiple purposes that help cults attract new members, retain existing members, and to feed the cult leaders’ emotional needs. These purposes include: Reinforcing the leader as the Smartest.Guy.Ever.: Both Hubbard and LaRouche had significant emotional needs to have their followers live in awe of their intellectual firepower. This is standard narcissist fare, as they try to cope with the wounds of having their intellectual brainchildren ridiculed by experts in their field who can instantly see just how ludicrous ideas like Dianetics are. Positioning the leader as an innovative polymath not only makes the leadership feel better, but also helps recruiting. As Robert Jay Lifton and other cult researchers point out, cults depend on “sacred science” revealed to a leader with supernatural intellect and ability, as the foundation for recruitment. Broadening the product line: It’s natural for almost any business to broaden its product line as a core strategy for growing revenue. Restaurants add to their menus. Software companies add new layered products to solve progressively more complex problems. Greeting card manufacturers diversify into scrapbooking products. And so on, ad infinitum. As we’ve frequently pointed out, cults are businesses and must obey the same rules of economics as other businesses, even if there are distortions from slave labor wages. But cults also need to broaden the product line to keep members loyal. It’s important to suck up as much of members’ time as possible lest they otherwise complete all the course offerings and start to wonder “is this all there is?” or rise too quickly within the hierarchy. A continuously broadening product line not only brings in money from more potential sources, but also keeps members’ noses to the proverbial grindstone and keeps them focused on mastering all the cult’s dogma. It’s possible to see these forays outside the cult’s normal dogma area as attempts to find new sources of recruits, but the Hubbard and LaRouche forays into music are sufficiently doomed that it’s unlikely anyone not already indoctrinated into the cult would see the end product (Hubbard’s musical drivel) or the idea (LaRouche’s conspiracy that shadowy global elites are poisoning people by slightly different tuning of the woodwinds in an opera) as anything they would want to adopt. We’d suggest that the further outside the core dogma a cult ventures, the less the new area is about membership, and the more it is about control of and fundraising from existing members. Creating a sense of fear and mistrust of the outside world: Cult leaders know their dogma is not going to win widespread acceptance from the outside world. And because they’ve already perfected a system of thought reform, they don’t care. Instead of selling ideas on their own merits, they can sell almost anything to existing followers who are already skilled at suppressing their doubts about leaders’ brilliance. So from the standpoint of retaining existing members, new dogma doesn’t have to make sense. Hubbard’s hastily scribbled dreck laying out the “space opera” of the OT III level is not only nonsensical but also very disrespectful of his followers because it’s so hastily thrown together. While some highly visible ex Scientologists reported a major “WTF?” moment when extracting this holiest-of-holies from the locked briefcase that helped pop them loose from the cult, thousands of others sailed past any doubts and signed up for hundreds of thousands of dollars worth of the higher OT levels. Page 1 of the OT III “data.” Source: Dave Touretzky, www.cmu.edu/~dst Cult leaders, knowing that new dogma doesn’t have to fly in the outside world, thus know that initiates forced to try to “sell” this in public will inevitably fail. That failure opens them up to conversations about the evils and ignorance of the benighted souls not fortunate enough to have received the leader’s divine wisdom, and helps bind them further to the cult. Failure at selling ludicrous dogma or at completing impossible tasks also creates an opening for abuse of the most committed members, making them dependent on the leader’s conditional praise, and creating a sense of “I’m responsible for my abuse” that allows leaders to house followers in squalor, dining on slops and working too many hours. Author: John P. John P. is a Wall Street money manager and IT technologist fascinated by irrationality in all its forms, and Scientology most of all. He's a lifelong Steely Dan fan. View all posts by John P. Author John P.Posted on May 9, 2018 May 8, 2018 Categories Non-Scientology, ScientologyTags Aesthetics, Apollo Stars, Art, Friedrich Schiller, Lyndon LaRouche, Power of Source Previous Previous post: Debunking Military Lies, Part 1: Hubbard’s Tales from the South Pacific Next Next post: Debunking Military Lies Part 2: Hubbard’s Australian Idyll Sometimes, They Just Mind-Control Themselves… A Quick Analysis of Recent IAS Donor Activity Nxivm Cult Meltdown Continues: New Charges, New Defendants EU Court Rules Jehovah’s Witnesses Must Follow Data Protection Law: Template for Scientology? Debunking Military Lies Part 5: The Not So Great “Battle of Cape Lookout” Scientology Fair Game: Be Prepared, Predictability is on Your Side – Penny Mixhau | Writer on Strategic Activism 2: Applied Asymmetry and the Guardian’s Office Scientology Fair Game: Then and Now – Penny Mixhau | Writer on Strategic Activism: Fighting Scientology Asymmetrically, Part 1 Nxivm’s Super Kids Program vs. Scientology Applied Scholastics – Frank Report on Nxivm’s Super Kids Program vs. Scientology Applied Scholastics Nxivm’s Super Kids Program vs. Scientology Applied Scholastics – Frank Report on NXIVM Cult Leader Arrested: Parallels with Scientology? TheMirrorThetan on Analytical Techniques: Don’t Overreact to Single Data Points Analysis Techniques Analytical Reports Back of the Envelope Ideal Orgs Non-Scientology Reasoned.Life … Our Privacy Policy Proudly powered by WordPress
cc/2020-05/en_middle_0097.json.gz/line1418257
__label__cc
0.536127
0.463873
040299 Geochemistry not elsewhere classified | Griffin, William L Home Browse Access Macquarie Limited (1) Adult Migrant English Program Research Centre (5) Advanced Cyber Security Research Centre (5) Applied Finance Centre (48) ARC Centre of Excellence for Core to Crust Fluid Systems (27) ARC Centre of Excellence for Nanoscale BioPhotonics (30) ARC Centre of Excellence in Cognition and its Disorders (396) ARC CoE Engineered Quantum Systems (EQuS) (3) Arts Administration (17) Australian Centre for Astrobiology (32) Australian Centre for Educational Studies (20) Australian Institute of Health Innovation (1270) Australian Proteome Analysis Facility (APAF) (145) Australian School of Advanced Medicine (2808) Biomolecular Frontiers Research Centre (23) Business and Economics Administration (140) Campus Wellbeing & Support Services (1) Centre for Advancement of Teaching (1) Centre for Agency, Values and Ethics (1) Centre for Clinical Governance (17) Centre for Clinical Governance Research (9) Centre for Conflict Resolution (1) Centre for Electromagnetic and Antenna Engineering (CELANE) (6) Centre for Emotional Health (7) Centre for Environmental and Urban Studies (3) Centre for Environmental Law (69) Centre for Flexible Learning (6) Centre for Health Informatics (158) Centre for Health Systems and Safety Research (240) Centre for Healthcare Resilience and Implementation Science (244) Centre for International and Environmental Law (13) Centre for International Communications (15) Centre for Language Technology (19) Centre for Lasers and Applications (36) Centre for Legal Governance (2) Centre for Macquarie English (2) Centre for Policing, Intelligence and Counter Terrorism (234) Centre for Professional Development (26) Centre for Quantum Computer Technology (13) Centre for Research on Social Inclusion (185) Centre for the Health Economy (12) Centre for the History of Christian Thought and Experience (2) Centre for the Integrative Study of Animal Behaviour (77) Centre for Ultrahigh-bandwidth Devices for Optical Systems (CUDOS) (109) Centre for Workforce Futures (8) Centre of Australian Category Theory (2) Centre of Excellence for Core to Crust Fluid Systems (129) Centre of Excellence for Engineered Quantum Systems (60) Centre of Excellence in Bioinformatics (16) Chief Operating Officer - Office (2) Deparment of Geosciences, Earth & Planetary Sciences (1) Departamento de Antropología Social (1) Department of Accounting and Corporate Governance (1171) Department of Accounting and Finance (490) Department of Actuarial Studies (127) Department of Actuarial Studies and Business Analytics (2) Department of Ancient History (2135) Department of Ancient History, (2) Department of Anthropology (737) Department of Applied Finance (10) Department of Applied Finance Actuarial Studies (1) Department of Applied Finance and Actuarial Studies (609) Department of Arts (1) Department of Asian Languages (73) Department of Asian Studies (45) Department of Biological Sciences (4878) Department of Biological Sciences, (3) Department of Biology (2) Department of Biomedical Sciences (445) Department of Brain, Behaviour and Evolution (162) Department of Business (578) Department of Business Law (245) Department of Chemistry (2) Department of Chemistry and Biomolecular Sciences (2521) Department of Chemistry and Molecular Sciences (1) Department of Chiropractic (476) Department of Clinical Medicine (522) Department of Cognitive Science (1397) Department of Computing (3113) Department of Computing, (1) Department of Contemporary Music (6) Department of Contemporary Music Studies (158) Department of Critical and Cultural Studies (173) Department of Cultural Studies (49) Department of Department of Educational Studies (1) Department of Department of Media, Music, Communication and Cultural Studies (3) Department of Department of Modern History, Politics and International Relations (1) Department of Department of Music, Media, Communication & Cultural Studies (1) Department of Earth and Planetary Sciences (2107) Department of Economics (1190) Department of Economics, (1) Department of Education (1332) Department of Educational Studies (60) Department of Electronic Engineering (333) Department of Electronics (212) Department of Engineering (1525)
cc/2020-05/en_middle_0097.json.gz/line1418259
__label__cc
0.701721
0.298279
Publications : LSV [KDH+20] J. Kolcák, J. Dubut, I. Hasuo, S.-Y. Katsumata, D. Sprunger, and A. Yamada. Relational Differential Dynamic Logic. In Proceedings of the 26th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'20), Lecture Notes in Computer Science, Dublin, Ireland, April 2020. Springer. To appear. [AGKR20] S. Akshay, P. Gastin, S. N. Krishna, and S. Roychoudhary. Revisiting Underapproximate Reachability for Multipushdown Systems. In Proceedings of the 26th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'20), Lecture Notes in Computer Science, Dublin, Ireland, April 2020. Springer. To appear. [Man20] A. Mansutti. An auxiliary logic on trees: on the Tower-hardness of logics featuring reachability and submodel reasoning. In Proceedings of the 23rd International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'20), Lecture Notes in Computer Science, Dublin, Ireland, April 2020. Springer. To appear. [FHK20] A. Finkel, S. Haddad, and I. Khmelnitsky. Minimal coverability tree construction made complete and efficient. In Proceedings of the 23rd International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'20), Lecture Notes in Computer Science, Dublin, Ireland, April 2020. Springer. To appear. [BBLS20] B. Bérard, B. Bollig, M. Lehaut, and N. Sznajder. Parameterized Synthesis for Fragments of First-Order Logic over Data Words. In Proceedings of the 23rd International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'20), Lecture Notes in Computer Science, Dublin, Ireland, April 2020. Springer. To appear. [BD20] D. Berwanger and L. Doyen. Observation and Distinction. Representing Information in Infinite Games. In Proceedings of the 37th Annual Symposium on Theoretical Aspects of Computer Science (STACS'20), Leibniz International Proceedings in Informatics, Montpellier, France, March 2020. Leibniz-Zentrum für Informatik. To appear. [DLM20] S. Demri, É. Lozes, and A. Mansutti. Internal Calculi for Separation Logics. In Proceedings of the 28th Annual EACSL Conference on Computer Science Logic (CSL'20), Leibniz International Proceedings in Informatics, Barcelona, Spain, January 2020. Leibniz-Zentrum für Informatik. To appear. [BHL19] N. Bertrand, S. Haddad, and E. Lefaucheux. A Tale of Two Diagnoses in Probabilistic Systems. Information and Computation, 269, December 2019. doi: 10.1016/j.ic.2019.104441. [ BibTex | DOI | PDF ] [GF19] E. Gupta and A. Finkel. The well structured problem for Presburger counter machines. In Proceedings of the 39th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'19), Leibniz International Proceedings in Informatics, pages 41:1--41:15, Bombay, India, December 2019. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.FSTTCS.2019.41. [ BibTex | DOI | Web page | PDF ] [BBM19a] N. Bertrand, P. Bouyer, and A. Majumdar. Concurrent parameterized games. In Proceedings of the 39th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'19), Leibniz International Proceedings in Informatics, pages 31:1--31:15, Bombay, India, December 2019. Leibniz-Zentrum für Informatik. [DH19] S. Donatelli and S. Haddad. Autonomous Transitions Enhance CSLTA Expressiveness and Conciseness. Research Report hal-02306021, HAL, October 2019. 23 pages. [ BibTex | Web page | PDF ] [MSH+19] H. Mandon, C. Su, S. Haar, J. Pang, and L. Paulevé. Sequential Reprogramming of Boolean Networks Made Practical. In Proceedings of the 17th Conference on Computational Methods in System Biology (CMSB'19), volume 11773 of Lecture Notes in Bioinformatics, pages 3--19, Trieste, Italy, September 2019. Springer-Verlag. doi: 10.1007/978-3-030-31304-3_1. [ BibTex | DOI ] [SZ19] S. Schmitz and G. Zetzsche. Coverability Is Undecidable in One-Dimensional Pushdown Vector Addition Systems with Resets. In Proceedings of the 13th Workshop on Reachability Problems in Computational Models (RP'19), volume 11674 of Lecture Notes in Computer Science, pages 193--201, Brussels, Belgium, September 2019. Springer. doi: 10.1007/978-3-030-30806-3_15. [GMG19] P. Gastin, A. Manuel, and R. Govind. Logics for Reversible Regular Languages and Semigroups with Involution. In Proceedings of the 23th International Conference on Developments in Language Theory (DLT'19), volume 11647 of Lecture Notes in Computer Science, pages 182--191, Warsaw, Poland, August 2019. Springer. [DG19] M. Droste and P. Gastin. Aperiodic Weighted Automata and Weighted First-Order Logic. In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'19), volume 138 of Leibniz International Proceedings in Informatics, pages 76:1--76:15, Aachen, Germany, August 2019. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.MFCS.2019.76. [BT19] P. Bouyer and N. Thomasset. Nash equilibria in games over graphs equipped with a communication mechanism. In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'19), volume 138 of Leibniz International Proceedings in Informatics, pages 9:1--9:14, Aachen, Germany, August 2019. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.MFCS.2019.9. [BBM19b] N. Bertrand, P. Bouyer, and A. Majumdar. Reconfiguration and message losses in parameterized broadcast networks. In Proceedings of the 30th International Conference on Concurrency Theory (CONCUR'19), volume 140 of Leibniz International Proceedings in Informatics, pages 32:1--32:15, Amsterdam, The Netherlands, August 2019. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.CONCUR.2019.32. [FP19] A. Finkel and M. Praveen. Verification of Flat FIFO Systems. In Proceedings of the 30th International Conference on Concurrency Theory (CONCUR'19), volume 140 of Leibniz International Proceedings in Informatics, pages 12:1--12:17, Amsterdam, The Netherlands, August 2019. Leibniz-Zentrum für Informatik. [Kou19b] A. Koutsos. Decidability of a Sound Set of Inference Rules for Computational Indistinguishability. In Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'19), pages 48--61, Hoboken, NJ, USA, July 2019. IEEE Computer Society Press. doi: 10.1109/CSF.2019.00011. [GMS19] P. Gastin, S. Mukherjee, and B. Srivathsan. Fast algorithms for handling diagonal constraints in timed automata. In Proceedings of the 31st International Conference on Computer Aided Verification (CAV'19), volume 11561 of Lecture Notes in Computer Science, pages 41--59, New York, USA, July 2019. Springer. [ BibTex | DOI | Web page ] [BKM+19] P. Bouyer, O. Kupferman, N. Markey, B. Maubert, A. Murano, and G. Perelli. Reasoning about Quality and Fuzziness of Strategic Behaviours. In Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI'19), pages 1588--1594. IJCAI organization, July 2019. doi: 10.24963/ijcai.2019/220. [Sch19] S. Schmitz. The Parametric Complexity of Lossy Counter Machines. In Proceedings of the 46th International Colloquium on Automata, Languages and Programming (ICALP'19), volume 132 of Leibniz International Proceedings in Informatics, pages 129:1--129:15, Patras, Greece, July 2019. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.ICALP.2019.129. [For19] M. Fortin. FO = FO3 for linear orders with monotone binary relations. In Proceedings of the 46th International Colloquium on Automata, Languages and Programming (ICALP'19), volume 132 of Leibniz International Proceedings in Informatics, pages 116:1--116:13, Patras, Greece, July 2019. Leibniz-Zentrum für Informatik. [BGJ+19] G. Barthe, B. Grégoire, C. Jacomme, S. Kremer, and P.-Y. Strub. Symbolic methods in computational cryptography proofs. In Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'19), pages 136--151, Hoboken, NJ, USA, July 2019. IEEE Computer Society Press. [BLS19] D. Baelde, A. Lick, and S. Schmitz. Decidable XPath Fragments in the Real World. In Proceedings of the 38th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'19), pages 285--302, Amsterdam, Netherlands, June-July 2019. ACM Press. doi: 10.1145/3294052.3319685. [dBGJL19] M. de Brecht, J. Goubault-Larrecq, X. Jia, and Z. Lyu. Domain-complete and LCS-complete Spaces. In Proceedings of the International Symposium on Domain Theory (ISDT'19), volume 345 of Electronic Notes in Theoretical Computer Science, pages 3--35, Yangzhou, China, June 2019. Elsevier Science Publishers. doi: 10.1016/j.entcs.2019.07.014. [GJ19] J. Goubault-Larrecq and X. Jia. Algebras of the Extended Probabilistic Powerdomain Monad. In Proceedings of the International Symposium on Domain Theory (ISDT'19), volume 345 of Electronic Notes in Theoretical Computer Science, pages 37--61, Yangzhou, China, June 2019. Elsevier Science Publishers. [BGH19] F. Blanqui, G. Genestier, and O. Hermant. Dependency Pairs Termination in Dependent Type Theory Modulo Rewriting. In Proceedings of the 4th International Conference on Formal Structures for Computation and Deduction (FSCD'19), volume 131 of Leibniz International Proceedings in Informatics, pages 9:1--9:21, Dortmund, Germany, June 2019. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.FSCD.2019.9. [DD19] A. Díaz-Caro and G. Dowek. Proof Normalisation in a Logic Identifying Isomorphic Propositions. In Proceedings of the 4th International Conference on Formal Structures for Computation and Deduction (FSCD'19), volume 131 of Leibniz International Proceedings in Informatics, pages 14:1--14:23, Dortmund, Germany, June 2019. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.FSCD.2019.14. [Gas19] P. Gastin. Modular Descriptions of Regular Functions. In Proceedings of the 8th International Conference on Algebraic Informatics (CAI'19), volume 11545 of Lecture Notes in Computer Science, pages 3--9, Nis, Serbia, June 2019. Springer. Invited talk. [Kou19a] A. Koutsos. The 5G-AKA Authentication Protocol Privacy. In Proceedings of the 4th IEEE European Symposium on Security and Privacy (EuroS&P'19), pages 464--479, Stockholm, Sweden, June 2019. IEEE Press. doi: 10.1109/EuroSP.2019.00041. [BCC19] M. Boltenhagen, T. Chatain, and J. Carmona. Generalized Alignment-Based Trace Clustering of Process Behavior. In Proceedings of the 40th International Conference on Applications and Theory of Petri Nets (PETRI NETS'19), volume 11522 of Lecture Notes in Computer Science, pages 237--257, Aachen, Germany, June 2019. Springer. [BD19b] F. Belardinelli and S. Demri. Resource-bounded ATL: the Quest for Tractable Fragments. In Proceedings of the 18th International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS'19), pages 206--214, Montreal, Canada, June 2019. ACM Press. [DFM19] S. Demri, R. Fervari, and A. Mansutti. Axiomatising logics with separating conjunctions and modalities. In Proceedings of the 16th European Conference on Logics in Artificial Intelligence (JELIA'19), volume 11468 of Lecture Notes in Artificial Intelligence, pages 692--708, Rende, Italy, June 2019. Springer. A. Finkel, S. Haddad, and I. Khmelnitsky. Coverability and Termination in Recursive Petri Nets. In Proceedings of the 40th International Conference on Applications and Theory of Petri Nets (PETRI NETS'19), volume 11522 of Lecture Notes in Computer Science, pages 429--448, Aachen, Germany, June 2019. Springer. [Gou19c] J. Goubault-Larrecq. A Probabilistic and Non-Deterministic Call-by-Push-Value Language. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), pages 1--13, Vancouver, Canada, June 2019. IEEE Press. doi: 10.1109/LICS.2019.8785809. [AGJK19] S. Akshay, P. Gastin, V. Jugé, and S. N. Krishna. Timed systems through the lens of logic. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), pages 1--13, Vancouver, Canada, June 2019. IEEE Press. [BD19a] B. Bednarczyk and S. Demri. Why propositional quantification makes modal logics on trees robustly hard ? In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), pages 1--13, Vancouver, Canada, June 2019. IEEE Press. [CD19] K. Chatterjee and L. Doyen. Graph Planning with Expected Finite Horizon. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), pages 1--13, Vancouver, Canada, June 2019. IEEE Press. [LS19b] J. Leroux and S. Schmitz. Reachability in Vector Addition Systems is Primitive-Recursive in Fixed Dimension. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), pages 1--13, Vancouver, Canada, June 2019. IEEE Press. [JS19] P. Jančar and S. Schmitz. Bisimulation Equivalence of First-Order Grammars is ACKERMANN-Complete. In Proceedings of the 34th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'19), pages 1--12, Vancouver, Canada, June 2019. IEEE Press. [MFNS19] J. Maier, M. Függer, T. Nowak, and U. Schmid. Transistor-Level Analysis of Dynamic Delay Models. In Proceedings of the 25th IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC'19), pages 76--85, Hirosaki, Japan, May 2019. IEEE Computer Society. doi: 10.1109/ASYNC.2019.00019. [KS19] P. Karandikar and Ph. Schnoebelen. The height of piecewise-testable languages and the complexity of the logic of subwords. Logical Methods in Computer Science, 15(2):6:1--6:27, April 2019. [BBR19] B. Bollig, P. Bouyer, and F. Reiter. Identifiers in Registers - Describing Network Algorithms with Logic. In Proceedings of the 22nd International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'19), volume 11425 of Lecture Notes in Computer Science, pages 115--132, Prague, Czech Republic, April 2019. Springer. doi: 10.1007/978-3-030-17127-8. [DSS19] M. Džamonja, S. Schmitz, and Ph. Schnoebelen. On ordinal invariants in well quasi orders and finite antichain orders. In Well-quasi orders in computation, logic, language and reasoning, Trends in Logic. Springer, 2019. To appear. [CLS19] S. Colin, R. Lepigre, and G. Scherer. Unboxing Mutually Recursive Type Definitions. In Actes des 30èmes Journées Francophones sur les Langages Applicatifs (JFLA'19), Lamoura, France, January 2019. To appear. [ BibTex | PDF ] [AFMS19] É. André, L. Fribourg, J.-M. Mota, and R. Soulat. Verification of an industrial asynchronous leader election algorithm using abstractions and parametric model checking. In Proceedings of the 20th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'19), Lecture Notes in Computer Science, Cascais/Lisbon, Portugal, January 2019. Springer. To appear. [HKP19] S. Haar, J. Kolcák, and L. Paulevé. Combining Refinement of Parametric Models with Goal-Oriented Reduction of Dynamics. In Proceedings of the 20th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'19), Lecture Notes in Computer Science, Cascais/Lisbon, Portugal, January 2019. Springer. To appear. [KŠHP19] J. Kolcák, D. Šafránek, S. Haar, and L. Paulevé. Parameter Space Abstraction and Unfolding Semantics of Discrete Regulatory Networks. Theoretical Computer Science, 765:120--144, 2019. doi: 10.1016/j.tcs.2018.03.009. [Gou19a] J. Goubault-Larrecq. Fooling the Parallel or Tester with Probability 8/27. In The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy---Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday, volume 11760 of Lecture Notes in Computer Science, pages 313--328. Springer, 2019. Updated version on arXiv:1903.12653. [ BibTex | Web page ] [GM19] J. Goubault-Larrecq and F. Mynard. Convergence without Points. Houston Journal of Mathematics, 2019. To appear. [BQS19] B. Bollig, K. Quaas, and A. Sangnier. The Complexity of Flat Freeze LTL. Logical Methods in Computer Science, 15(3):32:1--32:26, 2019. doi: 10.23638/LMCS-15(3:32)2019. [DF19] S. Demri and R. Fervari. The power of modal separation logics. Journal of Logic and Computation, 2019. To appear. [CHK+19] Th. Chatain, S. Haar, J. Kolcák, L. Paulevé, and A. Thakkar. Concurrency in Boolean networks. Natural Computing, 2019. To appear. [Gou19b] J. Goubault-Larrecq. Formal Ball Monads. Topology and its Applications, 2019. To appear. doi: 10.1016/j.topol.2019.06.044. [HBD19] L. Hirschi, D. Baelde, and S. Delaune. A method for unbounded verification of privacy-type properties. Journal of Computer Security, 27(3):277--342, 2019. doi: 10.3233/JCS-171070. [GBM19] P. Gardy, P. Bouyer, and N. Markey. Dependences in Strategy Logic. Theory of Computing Systems, 2019. To appear. [MSP+19] H. Mandon, C. Su, J. Pang, S. Paul, S. Haar, and L. Paulevé. Algorithms for the Sequential Reprogramming of Boolean Networks. IEEE/ACM Transaction on Computational Biology and Bioinformatics, 2019. To appear. [HS19] S. Halfon and Ph. Schnoebelen. On shuffle products, acyclic automata and piecewise-testable languages. Information Processing Letters, 145:68--73, 2019. doi: 10.1016/j.ipl.2019.01.012. [LS19a] R. Lazić and S. Schmitz. The Ideal View on Rackoff's Coverability Technique. Information and Computation, 2019. To appear. [LPR18] S. Le Roux, A. Pauly, and M. Randour. Extending finite-memory determinacy to Boolean combinations of winning conditions. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), volume 122 of Leibniz International Proceedings in Informatics, pages 38:1--38:20, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik. A. Mansutti. Extending propositional separation logic for robustness properties. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), volume 122 of Leibniz International Proceedings in Informatics, pages 42:1--42:23, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik. [BHH18] B. Bérard, S. Haar, and L. Hélouët. Hyper Partial Order Logic. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), volume 122 of Leibniz International Proceedings in Informatics, pages 20:1--20:21, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik. [FLS18] A. Finkel, J. Leroux, and G. Sutre. Reachability for Two-Counter Machines with One Test and One Reset. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), volume 122 of Leibniz International Proceedings in Informatics, pages 31:1--31:14, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik. [BLS18b] D. Baelde, A. Lick, and S. Schmitz. A Hypersequent Calculus with Clusters for Tense Logic over Ordinals. In Proceedings of the 38th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'18), volume 122 of Leibniz International Proceedings in Informatics, pages 15:1--15:19, Ahmedabad, India, December 2018. Leibniz-Zentrum für Informatik. [Dal18] A. Dallon. Verification of indistinguishability properties in cryptographic protocols -- Small attacks and efficient decision with SAT-Equiv. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, November 2018. [Dup18] Y. Duplouy. Applying Formal Methods to Autonomous Vehicle Control. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, November 2018. [BJM18] P. Bouyer, S. Jaziri, and N. Markey. Efficient Timed Diagnosis Using Automata with Timed Domains. In Proceedings of the 18th Workshop on Runtime Verification (RV'18), volume 11237 of Lecture Notes in Computer Science, pages 205--221, Limassol, Cyprus, November 2018. Springer. [Dem18a] S. Demri. On temporal and separation logics. In Proceedings of the 25th International Symposium on Temporal Representation and Reasoning (TIME'18), Leibniz International Proceedings in Informatics, pages 1:1--1:4, Warsaw, Poland, October 2018. Leibniz-Zentrum für Informatik. Th. Chatain, S. Haar, J. Kolcák, A. Thakkar, and L. Paulevé. Concurrency in Boolean networks. Research Report hal-01893106, HAL, October 2018. 33 pages. [BFG+18a] G. Barthe, X. Fan, J. Gancher, B. Grégoire, C. Jacomme, and E. Shi. Symbolic Proofs for Lattice-Based Cryptography. In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS'18), pages 538--555, Toronto, Canada, October 2018. ACM Press. [FN18] M. Függer and Th. Nowak. Fast Multidimensional Asymptotic and Approximate Consensus. In Proceedings of the 32nd International Symposium on Distributed Computing (DISC'18), Leibniz International Proceedings in Informatics, pages 27:1--27:15, New Orleans, USA, October 2018. Leibniz-Zentrum für Informatik. [BLS18c] B. Bollig, M. Lehaut, and N. Sznajder. Round-Bounded Control of Parameterized Systems. In Proceedings of the 16th International Symposium on Automated Technology for Verification and Analysis (ATVA'18), volume 11138 of Lecture Notes in Computer Science, pages 370--386, Los Angeles, California, USA, October 2018. Springer. [BBBC18] N. Bertrand, P. Bouyer, T. Brihaye, and P. Carlier. When are Stochastic Transition Systems Tameable? Journal of Logic and Algebraic Methods in Programming, 99:41--96, October 2018. doi: 10.1016/j.jlamp.2018.03.004. [BGMR18] P. Bouyer, M. González, N. Markey, and M. Randour. Multi-weighted Markov Decision Processes with Reachability Objectives. In Proceedings of the 9th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'18), volume 277 of Electronic Proceedings in Theoretical Computer Science, pages 250--264, Saarbrücken, Germany, September 2018. doi: 10.4204/EPTCS.277.18. [BDH18] D. Baelde, S. Delaune, and L. Hirschi. POR for Security Protocol Equivalences - Beyond Action-Determinism. In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS'18), volume 11098 of Lecture Notes in Computer Science, pages 385--405, Barcelona, Spain, September 2018. Springer. [CDD18] V. Cortier, A. Dallon, and S. Delaune. Efficiently Deciding Equivalence for Standard Primitives and Phases. In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS'18), volume 11098 of Lecture Notes in Computer Science, pages 491--511, Barcelona, Spain, September 2018. Springer. [Hil18] M. Hilaire. Complexity of the reachability problem for parametric timed automata. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2018. [Lef18] E. Lefaucheux. Controlling Information in Probabilistic Systems. Thèse de doctorat, Université Rennes 1, Rennes, France, September 2018. [Gro18] N. Grosshans. The limits of Nečiporuk's method and the power of programs over monoids taken from small varieties of finite monoids. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, September 2018. [BBJ18] B. Bérard, P. Bouyer, and V. Jugé. Finite bisimulations for dynamical systems with overlapping trajectories. In Proceedings of the 27th Annual EACSL Conference on Computer Science Logic (CSL'18), Leibniz International Proceedings in Informatics, Birmingham, UK, September 2018. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.CSL.2018.26. P. Gastin, S. Mukherjee, and B. Srivathsan. Reachability in timed automata with diagonal constraints. In Proceedings of the 29th International Conference on Concurrency Theory (CONCUR'18), volume 118 of Leibniz International Proceedings in Informatics, pages 28:1--28:17, Beijing, China, September 2018. Leibniz-Zentrum für Informatik. [BFG18c] B. Bollig, M. Fortin, and P. Gastin. It Is Easy to Be Wise After the Event: Communicating Finite-State Machines Capture First-Order Logic with ”Happened Before”. In Proceedings of the 29th International Conference on Concurrency Theory (CONCUR'18), volume 118 of Leibniz International Proceedings in Informatics, pages 7:1--7:17, Beijing, China, September 2018. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.CONCUR.2018.7. [GL18] J. Goubault-Larrecq and J.-P. Lachance. On the Complexity of Monitoring Orchids Signatures, and Recurrence Equations. Formal Methods in System Design, 53(1):6--32, August 2018. Special issue of RV'16, to appear. doi: 10.1007/s10703-017-0303-x. [Bur18a] G. Burel. Linking Focusing and Resolution with Selection. In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'18), volume 117 of Leibniz International Proceedings in Informatics, pages 9:1--9:14, Liverpool, UK, August 2018. Leibniz-Zentrum für Informatik. [CHP18b] Th. Chatain, S. Haar, and L. Paulevé. Most Permissive Semantics of Boolean Networks. Research Report 1808.10240, Computing Research Repository, August 2018. 15 pages. [BLS18a] D. Baelde, A. Lick, and S. Schmitz. A Hypersequent Calculus with Clusters for Linear Frames. In Proceedings of the 10th Conference on Advances in Modal Logics (AiML'18), pages 36--55, Bern, Switzerland, August 2018. College Publications. S. Demri and R. Fervari. On the complexity of modal separation logics. In Proceedings of the 10th Conference on Advances in Modal Logics (AiML'18), pages 179--198, Bern, Switzerland, August 2018. College Publications. [FFL18] S. Friedrichs, M. Függer, and C. Lenzen. Metastability-Containing Circuits. IEEE Transactions on Computers, 67(8):1167--1183, August 2018. doi: 10.1109/TC.2018.2808185. [BMR+18] P. Bouyer, N. Markey, M. Randour, K. G. Larsen, and S. Laursen. Average-energy games. Acta Informatica, 55(2):91--127, July 2018. doi: 10.1007/s00236-016-0274-1. [HM18] S. Haddad and B. Monmege. Interval iteration algorithm for MDPs and IMDPs. Theoretical Computer Science, 735:111--131, July 2018. [LR18a] R. Lepigre and C. Raffalli. Abstract Representation of Binders in OCaml using the Bindlib Library. In Proceedings of the 13th International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice (LFMTP'18), pages 42--56, Oxford, UK, July 2018. ACM Press. doi: 10.4204/EPTCS.274.4. [FNS18] M. Függer, Th. Nowak, and M. Schwarz. Tight Bounds for Asymptotic and Approximate Consensus. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC'18), pages 325--334, Egham, UK, July 2018. ACM Press. [BBF+18a] G. Bacci, P. Bouyer, U. Fahrenberg, K. G. Larsen, N. Markey, and P.-A. Reynier. Optimal and Robust Controller Synthesis Using Energy Timed Automata with Uncertainty. In Proceedings of the 22nd International Symposium on Formal Methods (FM'18), Lecture Notes in Computer Science, pages 203--221, Oxford, UK, July 2018. Springer. Best paper award. [JK18] C. Jacomme and S. Kremer. An extensive formal analysis of multi-factor authentication protocols. In Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'18), pages 1--15, Oxford, UK, July 2018. IEEE Computer Society Press. [DGK18] V. Dave, P. Gastin, and S. N. Krishna. Regular Transducer Expressions for Regular Transformations. In Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'18), pages 315--324, Oxford, UK, July 2018. ACM Press. [LFV18] A. Le Coënt, L. Fribourg, and J. Vacher. Control Synthesis for Stochastic Switched Systems using the Tamed Euler Method. In Proceedings of the 6th IFAC Conference on Analysis and Design of Hybrid Systems (ADHS'18), volume 51 of IFAC-PapersOnLine, pages 259--264, Oxford, UK, July 2018. Elsevier Science Publishers. doi: 10.1016/j.ifacol.2018.08.044. [FHLM18] É. Fabre, L. Hélouët, E. Lefaucheux, and H. Marchand. Diagnosability of Repairable Faults. Discrete Event Dynamic Systems: Theory and Applications, 28(2):183--213, June 2018. [Hal18] S. Halfon. On Effective Representations of Well Quasi-Orderings. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, June 2018. [CGR18] O. Carton, B. Guillon, and F. Reiter. Counter Machines and Distributed Automata. In Proceedings of the 24th Annual International Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA'18), volume 10875 of Lecture Notes in Computer Science, pages 13--28, Ghent, Belgium, June 2018. Springer. [CHP18a] Th. Chatain, S. Haar, and L. Paulevé. Boolean Networks: Beyond Generalized Asynchronicity. In Proceedings of the 24th Annual International Workshop on Cellular Automata and Discrete Complex Systems (AUTOMATA'18), volume 10875 of Lecture Notes in Computer Science, pages 29--42, Ghent, Belgium, June 2018. Springer. [LGS18] E. Lefaucheux, A. Giua, and C. Seatzu. Basis Coverability Graph for Partially Observable Petri Nets with Application to Diagnosability Analysis. In Proceedings of the 39th International Conference on Applications and Theory of Petri Nets (PETRI NETS'18), volume 10877 of Lecture Notes in Computer Science, pages 164--183, Bratislava, Slovakia, June 2018. Springer. [BBDH18] B. Barbot, B. Bérard, Y. Duplouy, and S. Haddad. Integrating Simulink Models into the Model Checker Cosmos. In Proceedings of the 39th International Conference on Applications and Theory of Petri Nets (PETRI NETS'18), volume 10877 of Lecture Notes in Computer Science, pages 363--373, Bratislava, Slovakia, June 2018. Springer. [SGF18b] A. Saoud, A. Girard, and L. Fribourg. On the Composition of Discrete and Continuous-time Assume-Guarantee Contracts for Invariance. In Proceedings of the 16th European Control Conference (ECC'18), pages 435--440, Limassol, Cyprus, June 2018. IEEE Press. doi: 10.23919/ECC.2018.8550622. [AGK18] S. Akshay, P. Gastin, and S. N. Krishna. Analyzing Timed Systems Using Tree Automata. Logical Methods in Computer Science, 14(2):1--35, May 2018. doi: 10.23638/LMCS-14(2:8)2018. [FKLW18] M. Függer, A. Kinali, C. Lenzen, and B. Wiederhake. Fast All-Digital Clock Frequency Adaptation Circuit for Voltage Droop Tolerance. In Proceedings of the 24th IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC'18), pages 68--77, Vienna, Austria, May 2018. IEEE Computer Society. [JMS18] L. Jezequel, A. Madalinski, and S. Schwoon. Distributed computation of vector clocks in Petri nets unfolding for test selection. In Proceedings of the 14th Workshop on Discrete Event Systems (WODES'18), volume 51(7) of IFAC-PapersOnLine, pages 106--111, Sorrento Coast, Italy, May-June 2018. Elsevier Science Publishers. [ABG18] C. Aiswarya, B. Bollig, and P. Gastin. An Automata-Theoretic Approach to the Verification of Distributed Algorithms. Information and Computation, 259:305--327, April 2018. doi: 10.1016/j.ic.2017.05.006. [Gil18] F. Gilbert. Extending higher-order logic with predicate subtyping. Thèse de doctorat, Université Paris 7, Paris, France, April 2018. [Bur18b] G. Burel. Linking Focusing and Resolution with Selection. Research Report hal-01670476, HAL Research Report, April 2018. [SGF18a] A. Saoud, A. Girard, and L. Fribourg. Contract based Design of Symbolic Controllers for Vehicle Platooning. In Proceedings of the 21st ACM International Conference on Hybrid Systems: Computation and Control (HSCC'18), pages 277--278, Porto, Portugal, April 2018. ACM Press. Poster. [Bla18] F. Blanqui. Size-based termination of higher-order rewriting. Journal of Functional Programming, 28, April 2018. doi: 10.1017/S0956796818000072. [JKS18] C. Jacomme, S. Kremer, and G. Scerri. Symbolic Models for Isolated Execution Environments. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), pages 530--545, Paris, France, April 2018. IEEE Press. doi: 10.1109/EuroSP.2017.16. [Had18] S. Haddad. Memoryless determinacy of finite parity games: Another simple proof. Information Processing Letters, 132:19--21, April 2018. [CCD+18] Th. Chatain, M. Comlan, D. Delfieu, L. Jezequel, and O. H. Roux. Pomsets and Unfolding of Reset Petri Nets. In Proceedings of the 12th International Conference on Language and Automata Theory and Applications (LATA'18), volume 10792 of Lecture Notes in Computer Science, pages 258--270, Bar-Ilan, Israel, April 2018. Springer. S. Demri, É. Lozes, and A. Mansutti. The Effects of Adding Reachability Predicates in Propositional Separation Logic. In Proceedings of the 21st International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'18), volume 10803 of Lecture Notes in Computer Science, pages 476--493, Thessaloniki, Greece, April 2018. Springer. [Bou18] P. Bouyer. Games on graphs with a public signal monitoring. In Proceedings of the 21st International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'18), volume 10803 of Lecture Notes in Computer Science, pages 530--547, Thessaloniki, Greece, April 2018. Springer. [FMN+18] M. Függer, J. Maier, R. Najvirt, Th. Nowak, and U. Schmid. A Faithful Binary Circuit Model with Adversarial Noise. In Proceedings of the Conference on Design, Automation and Test in Europe (DATE'18), pages 1327--1332, Dresden, Germany, March 2018. IEEE Computer Society Press. doi: 10.23919/DATE.2018.8342219. [BBF+18b] B. Barbot, M. Beccuti, G. Franceschinis, S. Haddad, and C. Picaronny. Bounds Computation for Symmetric Nets. Research Report hal-01726011, HAL-Inria, March 2018. P. Gardy, P. Bouyer, and N. Markey. Dependences in Strategy Logic. In Proceedings of the 35th Annual Symposium on Theoretical Aspects of Computer Science (STACS'18), volume 96 of Leibniz International Proceedings in Informatics, pages 34:1--34:15, Caen, France, February 2018. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.STACS.2018.34. [BFG18b] B. Bollig, M. Fortin, and P. Gastin. Communicating Finite-State Machines and Two-Variable Logic. In Proceedings of the 35th Annual Symposium on Theoretical Aspects of Computer Science (STACS'18), volume 96 of Leibniz International Proceedings in Informatics, pages 17:1--17:14, Caen, France, February 2018. Leibniz-Zentrum für Informatik. [GKLZ18] M. Ganardi, D. König, M. Lohrey, and G. Zetzsche. Knapsack problems for wreath products. In Proceedings of the 35th Annual Symposium on Theoretical Aspects of Computer Science (STACS'18), volume 96 of Leibniz International Proceedings in Informatics, pages 32:1--32:13, Caen, France, February 2018. Leibniz-Zentrum für Informatik. [Bv18] D. Berwanger and M. van den Bogaard. Consensus Game Acceptors and Iterated Transductions. International Journal of Foundations of Computer Science, 29(02):165--185, February 2018. P. Gastin and B. Monmege. A unifying survey on weighted logics and weighted automata. Soft Computing, 22(4):1047--1065, February 2018. [BFL+18] P. Bouyer, U. Fahrenberg, K. G. Larsen, N. Markey, J. Ouaknine, and J. Worrell. Model Checking Real-Time Systems. In Handbook of Model Checking, pages 1001--1046. Springer, 2018. [BFM18] M. Blondin, A. Finkel, and P. McKenzie. Handling Infinitely Branching Well-structured Transition Systems. Information and Computation, 258:28--49, 2018. B. Bollig, M.-L. Grindei, and P. Habermehl. Realizability of Concurrent Recursive Programs. Formal Methods in System Design, 53(3):339--362, 2018. doi: 10.1007/s10703-017-0282-y. [LR18b] R. Lepigre and C. Raffalli. Practical Subtyping for Curry-Style Languages. ACM Transactions on Programming Languages and Systems, 41(1):5:1--5:58, 2018. doi: 10.1145/3285955. [Lep18] R. Lepigre. PML_2: Integrated Program Verification in ML. In Proceedings of the 23rd International Conference on Types for Proofs and Programs (TYPES'17, volume 104 of Leibniz International Proceedings in Informatics, pages 4:1--4:27, Budapest, Hungary, 2018. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.TYPES.2017.4. [Dem18b] S. Demri. Reasoning about reversal-bounded counter machines. In Ewa Orlowska on Relational Methods in Logic and Computer Science, volume 17 of Outstanding Contributions to Logic, pages 441--479. Springer, 2018. [BLMP18] V. Brattka, S. Le Roux, J. S. Miller, and A. Pauly. Connected Choice and Brouwer's Fixed Point Theorem. Journal of Mathematical Logic, 2018. To appear. [CYFFMF18] R. Chane-Yack-Fa, M. Frappier, A. Mammar, and A. Finkel. Parameterized Verification of Monotone Information Systems. Formal Aspects of Computing, 30(3-4):463--489, 2018. [Zet18] G. Zetzsche. The Emptiness Problem for Valence Automata over Graph Monoids. Information and Computation, 2018. To appear. [LZ18] M. Lohrey and G. Zetzsche. Knapsack in Graph Groups. Theory of Computing Systems, 62(1):192--246, January 2018. [Gou18] J. Goubault-Larrecq. A semantics for nabla. Mathematical Structures in Computer Science, pages 1--25, 2018. To appear. [BHSS18] B. Bérard, S. Haar, S. Schmitz, and S. Schwoon. The Complexity of Diagnosability and Opacity Verification for Petri Nets. Fundamenta Informaticae, 161(4):317--349, 2018. doi: 10.3233/FI-2018-1706. [LFM+18] A. Le Coënt, L. Fribourg, N. Markey, F. De Vuyst, and L. Chamoin. Compositional synthesis of state-dependent switching control. Theoretical Computer Science, 750:53--68, 2018. [LACF18] A. Le Coënt, J. Alexandre dit Sandretto, A. Chapoutot, and L. Fribourg. An improved algorithm for the control synthesis of nonlinear sampled switched systems. Formal Methods in System Design, 53(3):363--383, 2018. [ABDL18] N. Alechina, N. Bulling, S. Demri, and B. Logan. On the Complexity of Resource-Bounded Logics. Theoretical Computer Science, 750:69--100, 2018. [HGLJX18] W. K. Ho, J. Goubault-Larrecq, A. Jung, and X. Xi. The Ho-Zhao Problem. Logical Methods in Computer Science, 14(1):1--19, January 2018. [CMvR+17] W. Czerwiński, W. Martens, L. van Rooijen, M. Zeitoun, and G. Zetzsche. A Characterization for Decidable Separability by Piecewise Testable Languages. Discrete Mathematics & Theoretical Computer Science, 19(4), December 2017. doi: 10.23638/DMTCS-19-4-1. [HKZ17] M. Huschenbett, D. Kuske, and G. Zetzsche. The Monoid of Queue Actions. Semigroup Forum, 95(3):475--508, December 2017. [BHL17a] B. Bérard, S. Haddad, and E. Lefaucheux. Probabilistic Disclosure: Maximisation vs. Minimisation. In Proceedings of the 37th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'17), volume 93 of Leibniz International Proceedings in Informatics, pages 13:1--13:14, Kanpur, India, December 2017. Leibniz-Zentrum für Informatik. [BFG17] M. Blondin, A. Finkel, and J. Goubault-Larrecq. Forward Analysis for WSTS, Part III: Karp-Miller Trees. In Proceedings of the 37th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'17), volume 93 of Leibniz International Proceedings in Informatics, pages 16:1--16:15, Kanpur, India, December 2017. Leibniz-Zentrum für Informatik. [DLL17] S. Demri, É. Lozes, and D. Lugiez. On Symbolic Heaps Modulo Permission Theories. In Proceedings of the 37th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'17), volume 93 of Leibniz International Proceedings in Informatics, pages 25:1--25:14, Kanpur, India, December 2017. Leibniz-Zentrum für Informatik. [CHKP17] K. Chatzikokolakis, S. Haddad, A. Kassem, and C. Palamidessi. Trading Optimality for Performance in Location Privacy. In Proceedings of the 11th International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS'17), pages 221--222, Venice, Italy, December 2017. [Thi17] F. Thiré. Exporting an Arithmetic Library from Dedukti to HOL. Research Report hal-01668250, HAL Research Report, December 2017. [Car17] P. Carlier. Verification of Stochastic Timed Automata. Thèse de doctorat, Ecole Normale Supérieure de Cachan (ENS Paris-Saclay) and Université de Mons, December 2017. [FS17] D. Figueira and L. Segoufin. Bottom-up automata on data trees and vertical XPath. Logical Methods in Computer Science, 13(4:5), November 2017. [Sch17a] S. Schmitz. Algorithmic Complexity of Well-Quasi-Orders. Mémoire d'habilitation, École Normale Supérieure Paris-Saclay, France, November 2017. [GN17] J. Goubault-Larrecq and K. M. Ng. A Few Notes on Formal Balls. Logical Methods in Computer Science, 13(4):1--34, November 2017. Special Issue of the Domains XII Workshop. [CCvD17] Th. Chatain, J. Carmona, and B. van Dongen. Alignment-Based Trace Clustering. In Proceedings of the 36th International Conference on Conceptual Modeling (ER'17), volume 10650 of Lecture Notes in Computer Science, pages 295--308, Valencia, Spain, November 2017. Springer. To appear. [BHL17b] N. Bertrand, S. Haddad, and E. Lefaucheux. Diagnostic et contrôle de la dégradation des systèmes probabilistes. In Actes du 11ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'17), Marseille, France, November 2017. HAL. [DGG17] J. Dubut, É. Goubault, and J. Goubault-Larrecq. Directed homology theories and Eilenberg-Steenrod axioms. Applied Categorical Structures, 25(5):775--807, October 2017. doi: doi:10.1007/s10485-016-9438-y. [CDD17b] V. Cortier, A. Dallon, and S. Delaune. A typing result for trace inclusion (for pair and symmetric encryption only). Research Report hal-01615265, HAL, October 2017. M. Függer, Th. Nowak, and M. Schwarz. Brief Announcement: Lower Bounds for Asymptotic Consensus in Dynamic Networks. In Proceedings of the 31st International Symposium on Distributed Computing (DISC'17), Leibniz International Proceedings in Informatics, pages 51:1--51:3, Vienna, Austria, October 2017. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.DISC.2017.51. J. Goubault-Larrecq. Isomorphism theorems between models of mixed choice. Mathematical Structures in Computer Science, 27(6):1032--1067, September 2017. [Gil17b] F. Gilbert. Proof Certificates in PVS. In Proceedings of the 8th International Conference on Interactive Theorem Proving (ITP'17), volume 10499 of Lecture Notes in Computer Science, pages 262--268, Brasília, Brazil, September 2017. Springer. [Bur17] G. Bury. mSAT: An OCaml SAT Solver. In OCaml Users and Developers Workshop, Oxford, UK, September 2017. Poster. M. Blondin, A. Finkel, and P. McKenzie. Well Behaved Transition Systems. Logical Methods in Computer Science, 13(3):1--19, September 2017. [MHP17] H. Mandon, S. Haar, and L. Paulevé. Temporal Reprogramming of Boolean Networks. In Proceedings of the 15th Conference on Computational Methods in System Biology (CMSB'17), volume 10545 of Lecture Notes in Bioinformatics, pages 179--195, Darmstadt, Germany, September 2017. Springer-Verlag. [Doy17] L. Doyen. The Multiple Dimensions of Mean-Payoff Games. In Proceedings of the 11th Workshop on Reachability Problems in Computational Models (RP'17), volume 10506 of Lecture Notes in Computer Science, pages 1--8, London, UK, September 2017. Springer. [Fri17] L. Fribourg. Euler's Method Applied to the Control of Switched Systems. In Proceedings of the 15th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'17), volume 10419, pages 3--21, Berlin, Germany, September 2017. Springer. [BLL17] F. Bruse, M. Lange, and É. Lozes. Space-Efficient Fragments of Higher-Order Fixpoint Logic. In Proceedings of the 11th Workshop on Reachability Problems in Computational Models (RP'17), volume 10506 of Lecture Notes in Computer Science, pages 26--41, London, UK, September 2017. Springer. [LAC+17] A. Le Coënt, J. Alexandre dit Sandretto, A. Chapoutot, L. Fribourg, F. De Vuyst, and L. Chamoin. Distributed Control Synthesis Using Euler's Method. In Proceedings of the 11th Workshop on Reachability Problems in Computational Models (RP'17), volume 10506 of Lecture Notes in Computer Science, pages 118--131, London, UK, September 2017. Springer. [Dub17] J. Dubut. Directed homotopic and homologic theories for geometric models of true concurrency. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2017. [GBB+17] M. González, O. Beaude, P. Bouyer, S. Lasaulce, and N. Markey. Stratégies d'ordonnancement de consommation d'énergie en présence d'information imparfaite de prévision. In Actes du XXVIème colloque GRETSI, Juan-les-Pins, France, September 2017. [CP17] Th. Chatain and L. Paulevé. Goal-Driven Unfolding of Petri Nets. In Proceedings of the 28th International Conference on Concurrency Theory (CONCUR'17), volume 85 of Leibniz International Proceedings in Informatics, pages 18:1--18:16, Berlin, Germany, September 2017. Leibniz-Zentrum für Informatik. [BHJ17] P. Bouyer, S. Haddad, and V. Jugé. Unbounded product-form Petri nets. In Proceedings of the 28th International Conference on Concurrency Theory (CONCUR'17), volume 85 of Leibniz International Proceedings in Informatics, pages 31:1--31:16, Berlin, Germany, September 2017. Leibniz-Zentrum für Informatik. [AGKS17] S. Akshay, P. Gastin, S. N. Krishna, and I. Sarkar. Towards an Efficient Tree Automata based technique for Timed Systems. In Proceedings of the 28th International Conference on Concurrency Theory (CONCUR'17), volume 85 of Leibniz International Proceedings in Informatics, pages 39:1--39:15, Berlin, Germany, September 2017. Leibniz-Zentrum für Informatik. B. Bollig, K. Quaas, and A. Sangnier. The Complexity of Flat Freeze LTL. In Proceedings of the 28th International Conference on Concurrency Theory (CONCUR'17), volume 85 of Leibniz International Proceedings in Informatics, pages 33:1--33:16, Berlin, Germany, September 2017. Leibniz-Zentrum für Informatik. P. Bouyer, S. Jaziri, and N. Markey. On the Determinization of Timed Systems. In Proceedings of the 15th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'17), volume 10419, pages 25--41, Berlin, Germany, September 2017. Springer. [Sub17] C. L. Subramaniam. Cubical Type Theory in Dedukti. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2017. [Gen17] G. Genestier. Termination checking in the λΠ-calculus modulo theory. Rapport de Master, Université Paris 7, Paris, France, September 2017. [Def17] A. Defourné. Proof Tactics in Dedukti. Rapport de Master, Inria Saclay, September 2017. [Dow17a] G. Dowek. Analyzing Individual Proofs as the Basis of Interoperability between Proof Systems. In Proceedings of the 5th Workshop on Proof eXchange for Theorem Proving (PxTP'17), volume 262 of Electronic Proceedings in Theoretical Computer Science, pages 3--12, Brasília, Brazil, September 2017. [Rie17] M. Riesner. Regularity of deterministic pushdown automata. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2017. [Sch17b] Ph. Schnoebelen. Ideal-Based Algorithms for the Symbolic Verification of Well-Structured Systems (Invited Talk). In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'17), volume 83 of Leibniz International Proceedings in Informatics, pages 85:1--85:4, Aalborg, Denmark, August 2017. Leibniz-Zentrum für Informatik. [CDH17] K. Chatterjee, L. Doyen, and Th. A. Henzinger. The Cost of Exactness in Quantitative Reachability. In Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday, volume 10460 of Lecture Notes in Computer Science, pages 367--381. Springer, August 2017. [BDGK17] D. Baelde, S. Delaune, I. Gazeau, and S. Kremer. Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pages 234--248, Santa Barbara, California, USA, August 2017. IEEE Computer Society Press. doi: 10.1109/CSF.2017.22. [CDD17a] V. Cortier, A. Dallon, and S. Delaune. SAT-Equiv: An Efficient Tool for Equivalence Properties. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pages 481--494, Santa Barbara, California, USA, August 2017. IEEE Computer Society Press. N. Grosshans, P. McKenzie, and L. Segoufin. The power of programs over monoids in DA. In Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS'17), volume 83 of Leibniz International Proceedings in Informatics, pages 2:1--2:20, Aalborg, Denmark, August 2017. Leibniz-Zentrum für Informatik. [CK17] H. Comon and A. Koutsos. Formal Computational Unlinkability Proofs of RFID Protocols. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pages 100--114, Santa Barbara, California, USA, August 2017. IEEE Computer Society Press. doi: 10.1109/CSF.2017.9. [CGKM17] S. Calzavara, I. Grishchenko, A. Koutsos, and M. Maffei. A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications. In Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pages 22--36, Santa Barbara, California, USA, August 2017. IEEE Computer Society Press. [BLM+17] P. Bouyer, F. Laroussinie, N. Markey, J. Ouaknine, and J. Worrell. Timed temporal logics. In Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday, volume 10460 of Lecture Notes in Computer Science, pages 211--230. Springer, August 2017. [Seg17] L. Segoufin. A survey on guarded negation. SIGLOG News, 4(3):12--26, July 2017. [FL17] A. Finkel and É. Lozes. Synchronizability of Communicating Finite State Machines is not Decidable. In Proceedings of the 44th International Colloquium on Automata, Languages and Programming (ICALP'17), volume 80 of Leibniz International Proceedings in Informatics, pages 122:1--122:14, Warsaw, Poland, July 2017. Leibniz-Zentrum für Informatik. [Dow17c] G. Dowek. Models and termination of proof reduction in the λΠ-calculus modulo theory. In Proceedings of the 44th International Colloquium on Automata, Languages and Programming (ICALP'17), volume 80 of Leibniz International Proceedings in Informatics, pages 109:1--109:14, Warsaw, Poland, July 2017. Leibniz-Zentrum für Informatik. [FMW17] M. Fortin, A. Muscholl, and I. Walukiewicz. Model-checking linear-time properties of parametrized asynchronous shared-memory pushdown systems. In Proceedings of the 29th International Conference on Computer Aided Verification (CAV'17), volume 10427 of Lecture Notes in Computer Science, pages 155--175, Heidelberg, Germany, July 2017. Springer. [BR17] D. Berwanger and R. Ramanujam. Deviator Detection under Imperfect Monitoring. In Proceedings of the 5th International Workshop on Strategic Reasoning (SR'17), Liverpool, UK, July 2017. [BFRR17] V. Bruyère, E. Filiot, M. Randour, and J.-F. Raskin. Meet Your Expectations With Guarantees: Beyond Worst-Case Synthesis in Quantitative Games. Information and Computation, 254(2):259--295, June 2017. To appear. [BMV17b] P. Bouyer, N. Markey, and S. Vester. Nash Equilibria in Symmetric Graph Games with Partial Observation. Information and Computation, 254(2):238--258, June 2017. [KGH+17] F. Kordon, H. Garavel, L. M. Hillah, F. Hulin-Hubard, B. Berthomieu, G. Ciardo, M. Colange, S. Dal Zilio, E. Amparore, M. Beccuti, T. Liebke, J. Meijer, A. Miner, C. Rohr, J. Srba, Y. Thierry-Mieg, J. van de Pol, and K. Wolf. Complete Results for the 2017 Edition of the Model Checking Contest, June 2017. [Dou17a] A. Doumane. Constructive completeness for the linear-time μ-calculus. In Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'17), pages 1--12, Reykjavik, Iceland, June 2017. IEEE Press. [Dou17b] A. Doumane. On the infinitary proof theory of logics with fixed points. Thèse de doctorat, Université Paris-Diderot, Paris, France, June 2017. [Gar17] P. Gardy. Semantics of Strategy Logic. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2017. S. Haddad. Memoryless Determinacy of Finite Parity Games: Another Simple Proof. Research Report hal-01541508, HAL-inria, June 2017. 7 pages. [KV17] A. Koutsos and V. Vianu. Process-centric views of data-driven business artifacts. Journal of Computer and System Sciences, 86(1):82--107, June 2017. doi: 10.1016/j.jcss.2016.11.012. [HSZ17] S. Halfon, Ph. Schnoebelen, and G. Zetzsche. Decidability, complexity, and expressiveness of first-order logic over the subword ordering. In Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'17), pages 1--12, Reykjavik, Iceland, June 2017. IEEE Press. [CJLS17] Th. Colcombet, M. Jurdziński, R. Lazić, and S. Schmitz. Perfect Half Space Games. In Proceedings of the 32nd Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'17), pages 1--11, Reykjavik, Iceland, June 2017. IEEE Press. [vCCT17] B. van Dongen, J. Carmona, Th. Chatain, and F. Taymouri. Aligning Modeled and Observed Behavior: A Compromise Between Complexity and Quality. In Proceedings of the 29th International Conference on Advanced Information Systems Engineering (CAiSE'17), volume 10253 of Lecture Notes in Computer Science, pages 94--109, Essen, Germany, June 2017. Springer. B. Bérard, S. Haar, S. Schmitz, and S. Schwoon. The Complexity of Diagnosability and Opacity Verification for Petri Nets. In Proceedings of the 38th International Conference on Applications and Theory of Petri Nets (PETRI NETS'17), volume 10258 of Lecture Notes in Computer Science, pages 200--220, Zaragoza, Spain, June 2017. Springer. [BM17] D. Berwanger and A. B. Mathew. Infinite games with finite knowledge gaps. Information and Computation, 254:217--237, June 2017. [BMv17a] D. Berwanger, A. B. Mathew, and M. van den Bogaard. Hierarchical information and the synthesis of distributed strategies. Acta Informatica, June 2017. J.-P. Jouannaud and P.-Y. Strub. Coq without Type Casts: A Complete Proof of Coq Modulo Theory. In Proceedings of the 21st International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'17), volume 46 of EPiC Series in Computing, pages 474--489, Maun, Botswana, May 2017. EasyChair. [TFL17] G. Tarawneh, M. Függer, and C. Lenzen. Metastability Tolerant Computing. In Proceedings of the 23rd IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC'17), pages 25--32, San Diego, California, USA, May 2017. IEEE Computer Society. doi: 10.1109/ASYNC.2017.9. [FKLP17] M. Függer, A. Kinali, C. Lenzen, and T. Polzer. Metastability-Aware Memory-Efficient Time-to-Digital Converter. In Proceedings of the 23rd IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC'17), pages 49--56, San Diego, California, USA, May 2017. IEEE Computer Society. doi: 10.1109/ASYNC.2017.12. [OBH17] P. O'Hanlon, R. Borgaonkar, and L. Hirschi. Mobile subscriber WiFi privacy. In Proceedings of Mobile Security Technologies (MoST'17), held as part of the IEEE Computer Society Security and Privacy Workshops, San Jose, CA, USA, May 2017. [BJ17] P. Bouyer and V. Jugé. Dynamic Complexity of the Dyck Reachability. In Proceedings of the 20th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'17), Lecture Notes in Computer Science, pages 265--280, Uppsala, Sweden, April 2017. Springer. [BHM+17] P. Bouyer, P. Hofman, N. Markey, M. Randour, and M. Zimmermann. Bounding Average-energy Games. In Proceedings of the 20th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'17), Lecture Notes in Computer Science, pages 179--195, Uppsala, Sweden, April 2017. Springer. [ZKL17] G. Zetzsche, D. Kuske, and M. Lohrey. On Boolean closed full trios and rational Kripke frames. Theory of Computing Systems, 60(3):438--472, April 2017. [Gil17a] F. Gilbert. Automated Constructivization of Proofs. In Proceedings of the 20th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'17), Lecture Notes in Computer Science, pages 480--495, Uppsala, Sweden, April 2017. Springer. [LDCF17] A. Le Coënt, F. De Vuyst, L. Chamoin, and L. Fribourg. Control Synthesis of Nonlinear Sampled Switched Systems using Euler's Method. In Proceedings of the 3rd International Workshop on Symbolic and Numerical Methods for Reachability Analysis (SNR'17), volume 247 of Electronic Proceedings in Theoretical Computer Science, pages 18--33, Uppsala, Sweden, April 2017. [Hir17] L. Hirschi. Automated Verification of Privacy in Security Protocols: Back and Forth Between Theory & Practice. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, April 2017. [BGHH17] S. Böhm, S. Göller, S. Halfon, and P. Hofman. On Büchi one-counter automata. In Proceedings of the 34th Annual Symposium on Theoretical Aspects of Computer Science (STACS'17), Leibniz International Proceedings in Informatics, pages 14:1--14:13, Hannover, Germany, March 2017. Leibniz-Zentrum für Informatik. [CG17] A. Carayol and S. Göller. On long words avoiding Zimin patterns. In Proceedings of the 34th Annual Symposium on Theoretical Aspects of Computer Science (STACS'17), Leibniz International Proceedings in Informatics, pages 19:1--19:13, Hannover, Germany, March 2017. Leibniz-Zentrum für Informatik. M. Lohrey and G. Zetzsche. The Complexity of Knapsack in Graph Groups. In Proceedings of the 34th Annual Symposium on Theoretical Aspects of Computer Science (STACS'17), Leibniz International Proceedings in Informatics, pages 52:1--52:14, Hannover, Germany, March 2017. Leibniz-Zentrum für Informatik. [Mon17] D. Montoya. Une base de connaissance personnelle intégrant les données d'un utilisateur et une chronologie de ses activités. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, March 2017. [SV17] L. Segoufin and A. Vigny. Constant Delay Enumeration for FO Queries over Databases with Local Bounded Expansion. In Proceedings of the 18th International Conference on Database Theory (ICDT'17), volume 68 of Leibniz International Proceedings in Informatics, pages 20:1--20:16, Venice, Italy, March 2017. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.ICDT.2017.20. [Sta17] D. Stan. Randomized Strategies in Concurrent Games. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2017. B. Barbot, B. Bérard, Y. Duplouy, and S. Haddad. Statistical Model-Checking for Autonomous Vehicle Safety Validation. In SIA Simulation Numérique, Montigny-le-Bretonneux, France, March 2017. [CFNS17] B. Charron-Bost, M. Függer, Th. Nowak, and M. Schwarz. New transience bounds for max-plus linear systems. Discrete Applied Mathematics, 219:83--99, March 2017. doi: 10.1016/j.dam.2016.11.003. [Dow17b] G. Dowek. Lineal: A linear-algebraic Lambda-calculus. Logical Methods in Computer Science, 13(1):1--33, March 2017. [Jug17] V. Jugé. The Relaxation Normal Form of Braids is Regular. International Journal of Algebra and Computation, 27(1):61--106, February 2017. [BMJ17] P. Bouyer, N. Markey, and V. Jugé. Courcelle's Theorem Made Dynamic. Research Report 1702.05183, Computing Research Repository, February 2017. 14 pages. [HHMS17] S. Haar, S. Haddad, T. Melliti, and S. Schwoon. Optimal constructions for active diagnosis. Journal of Computer and System Sciences, 83(1):101--120, 2017. [BKM17] B. Bollig, D. Kuske, and R. Mennicke. The Complexity of Model Checking Multi-Stack Systems. Theory of Computing Systems, 60(4):695--736, 2017. [BMPS17] P. Bouyer, N. Markey, N. Perrin, and P. Schlehuber-Caissier. Timed automata abstraction of switched dynamical systems using control funnels. Real-Time Systems, 53(3):327--353, 2017. [DGLWM17] S. Demri, D. Galmiche, D. Larchey-Wendling, and D. Mery. Separation Logic with One Quantified Variable. Theory of Computing Systems, 61(2):371--461, 2017. J. Goubault-Larrecq. A Non-Hausdorff Minimax Theorem. Minimax Theory and its Applications, 3(1):73--80, 2017. [DDS17] S. Demri, A. Dhar, and A. Sangnier. Equivalence Between Model-Checking Flat Counter Systems and Presburger Arithmetic. Theoretical Computer Science, 735:2--23, 2017. [CDFR17] K. Chatterjee, L. Doyen, E. Filiot, and J. Raskin. Doomsday equilibria for omega-regular games. Information and Computation, 254:296--315, 2017. [BCMW17] D. Baelde, A. Carayol, R. Matthes, and I. Walukiewicz. Preface: Special Issue of Fixed Points in Computer Science (FICS'13). Fundamenta Informaticae, 150(3-4):i--ii, 2017. D. Baelde, S. Delaune, and L. Hirschi. A Reduced Semantics for Deciding Trace Equivalence. Logical Methods in Computer Science, 13(2:8):1--48, 2017. [BFHH17] M. Blondin, A. Finkel, C. Haase, and S. Haddad. The Logical View on Continuous Petri Nets. ACM Transactions on Computational Logic, 18(3):24:1--24:28, 2017. [HPV17] S. Haar, S. Perchy, and F. Valencia. D-SPACES: Implementing Declarative Semantics for Spatially Structured Information. In Proceedings of the 11th International Conference on Semantic Computing (ICSC'17), volume 11 of IEEE ICSC, pages 227--233, San Diego, CA, USA, January 2017. IEEE Press. doi: 10.1109/ICSC.2017.34. [GHP+17] M. Guzmán, S. Haar, S. Perchy, C. Rueda, and F. Valencia. Belief, Knowledge, Lies and Other Utterances in an Algebra for Space and Extrusion. Journal of Logic and Algebraic Methods in Programming, 86(1):107--133, January 2017. [ABH17] M. F. Atig, B. Bollig, and P. Habermehl. Emptiness of ordered multi-pushdown automata is 2ETIME-complete. International Journal of Foundations of Computer Science, 28(8):945--975, 2017. [DKW17] S. Demri, D. Kapur, and C. Weidenbach. Special Issue of Selected Extended Papers of IJCAR 2014. Journal of Automated Reasoning, 58(1), 2017. [ACR17] É. André, Th. Chatain, and C. Rodríguez. Preserving Partial-Order Runs in Parametric Time Petri Nets. ACM Transactions in Embedded Computing Systems, 16(2):43:1--43:26, 2017. [AM17] P. Arrighi and S. Martiel. Quantum causal graph dynamics. Physical Review D, 96(2), 2017. [AD17] S. Abiteboul and G. Dowek. Le temps des algorithmes. Editions Le Pommier, 2017. [CCD17] V. Cheval, H. Comon-Lundh, and S. Delaune. A procedure for deciding symbolic equivalence between sets of constraint systems. Information and Computation, 255:94--125, 2017. A. Díaz-Caro and G. Dowek. Typing Quantum Superpositions and Measurement. In Proceedings of the 6th International Conference on Theory and Practice of Natural Computing (TPNC'17), volume 10687 of Lecture Notes in Computer Science, pages 281--293, Prague, Czech Republic, 2017. Springer. [Dow17d] G. Dowek. Rules and derivations in an elementary logic course. IfCoLoG Journal of Logics and their Applications, 4(1):21--32, 2017. Special Issue: Tools for Teaching Logic. M. Blondin, A. Krebs, and P. McKenzie. The Complexity of Intersecting Finite Automata Having Few Final States. Computational Complexity, 25(4):775--814, December 2016. To appear. [The16] S. Theissing. Supervision in Multi-Modal Transportation System. Thèse de doctorat, École Normale Supérieure Paris-Saclay, France, December 2016. [Bol16] B. Bollig. One-Counter Automata with Counter Observability. In Proceedings of the 36th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'16), volume 65 of Leibniz International Proceedings in Informatics, pages 20:1--20:14, Chennai, India, December 2016. Leibniz-Zentrum für Informatik. [Gou16d] J. Goubault-Larrecq. A semantics for . Invited talk, Dale Miller Festschrift, Paris Diderot University, Paris, December 2016. [AD16b] P. Arrighi and G. Dowek. What is the Planck constant the magnitude of? preprint, December 2016. [Hal16a] P. Halmagrand. Automated Deduction and Proof Certification for the B Method. Thèse de doctorat, Conservatoire National Des Arts et Métiers, Paris, December 2016. [BGMS16b] P. Beame, N. Grosshans, P. McKenzie, and L. Segoufin. Nondeterminism and An Abstract Formulation of Nečiporuk's Lower Bound Method. ACM Transactions on Computation Theory, 9(1):5:1--5:34, December 2016. [Van16] M. Van den Bogaard. Motifs de Flot d'Information dans les Jeux à Information Imparfaite. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2016. [MPTAS16] D. Montoya, T. Pellissier Tanon, S. Abiteboul, and F. Suchanek. Thymeflow, A Personal Knowledge Base with Spatio-temporal Data. In Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM'16), pages 2477--2480, Indianapolis, Indiana, USA, October 2016. ACM. [Moh16] S. Mohamed. Une méthode topologique pour la recherche d'ensembles invariants de systèmes continus et à commutation. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2016. [Cau16b] R. Cauderlier. Object-Oriented Mechanisms for Interoperability between Proof Systems. Thèse de doctorat, Conservatoire National Des Arts et Métiers, Paris, October 2016. [DGL16] S. Demri, V. Goranko, and M. Lange. Temporal Logics in Computer Science, volume 58 of Cambridge Tracts in Theoretical Computer Science. Cambridge University Press, October 2016. [Hal16b] P. Halmagrand. Soundly Proving B Method Formulae Using Typed Sequent Calculus. In Proceedings of the 13th International Colloquium on Theoretical Aspects of Computing (ICTAC'16), volume 9965 of Lecture Notes in Computer Science, pages 196--213, Taipei, Taiwan, October 2016. Springer. [vDCC16a] B. van Dongen, J. Carmona, and Th. Chatain. Alignment-based Quality Metrics in Conformance Checking. In Proceedings of the 7th Int. Workshop on Enterprise Modelling and Information Systems Architectures (EMISA'16), volume 1701 of CEUR Workshop Proceedings, pages 87--90, Vienna, Austria, October 2016. CEUR-WS.org. H. Mandon, S. Haar, and L. Paulevé. Relationship between the Reprogramming Determinants of Boolean Networks and their Interaction Graph. In Proceedings of the 5th International Workshop on Hybrid Systems Biology, Lecture Notes in Computer Science, pages 113--127, Grenoble France, October 2016. Springer. P. Bouyer, N. Markey, and V. Jugé. Dynamic Complexity of Parity Games with Bounded Tree-Width. Research Report 1610.00571, Computing Research Repository, October 2016. 33 pages. [CD16a] R. Cauderlier and C. Dubois. ML Pattern-Matching, Recursion, and Rewriting: From FoCaLiZe to Dedukti. In Proceedings of the 13th International Colloquium on Theoretical Aspects of Computing (ICTAC'16), volume 9965 of Lecture Notes in Computer Science, pages 459--468, Taipei, Taiwan, October 2016. Springer. [Haa16] S. Haar. Cyclic Ordering through Partial Orders. Journal of Multiple-Valued Logic and Soft Computing, 27(2-3):209--228, September 2016. [Jac16] C. Jacomme. Automated applications of Cryptographic Assumptions. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2016. [HHK+16a] M. Hutagalung, N. Hundeshagen, D. Kuske, M. Lange, and É. Lozes. Multi-Buffer Simulations for Trace Language Inclusion. In Proceedings of the 7th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'16), volume 226 of Electronic Proceedings in Theoretical Computer Science, pages 213--227, Catania, Italy, September 2016. J. Goubault-Larrecq and J. Lachance. On the Complexity of Monitoring Orchids Signatures. In Proceedings of the 16th Conference on Runtime Verification (RV'16), volume 10012 of Lecture Notes in Computer Science, pages 169--164, Madrid, Spain, September 2016. Springer. J. Kolcák, D. Šafránek, S. Haar, and L. Paulevé. Unfolding of Parametric Logical Regulatory Networks. In Proceedings of The Seventh International Workshop on Static Analysis and Systems Biology (SASB 2016), Electronic Notes in Theoretical Computer Science, Edinburgh, UK, September 2016. Elsevier Science Publishers. To appear. [BDM16] L. Beklemishev, S. Demri, and A. Maté, editors. Proceedings of the 11th Conference on Advances in Modal Logic (AiML'16), Budapest, Hungary, September 2016. College Publications. [BMS16] P. Bouyer, N. Markey, and D. Stan. Stochastic Equilibria under Imprecise Deviations in Terminal-Reward Concurrent Games. In Proceedings of the 7th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'16), volume 226 of Electronic Proceedings in Theoretical Computer Science, pages 61--75, Catania, Italy, September 2016. [Fin16] A. Finkel. The Ideal Theory for WSTS. In Proceedings of the 10th Workshop on Reachability Problems in Computational Models (RP'16), volume 9899 of Lecture Notes in Computer Science, pages 1--22, Aalborg, Denmark, September 2016. Springer. N. Alechina, N. Bulling, S. Demri, and B. Logan. On the Complexity of Resource-Bounded Logics. In Proceedings of the 10th Workshop on Reachability Problems in Computational Models (RP'16), volume 9899 of Lecture Notes in Computer Science, pages 36--50, Aalborg, Denmark, September 2016. Springer. [LFS16] A. Le Coënt, L. Fribourg, and R. Soulat. Compositional analysis of Boolean networks using local fixed-point iterations. In Proceedings of the 10th Workshop on Reachability Problems in Computational Models (RP'16), volume 9899 of Lecture Notes in Computer Science, pages 134--147, Aalborg, Denmark, September 2016. Springer. A. Le Coënt, L. Fribourg, N. Markey, F. De Vuyst, and L. Chamoin. Distributed Synthesis of State-Dependent Switching Control. In Proceedings of the 10th Workshop on Reachability Problems in Computational Models (RP'16), volume 9899 of Lecture Notes in Computer Science, pages 119--133, Aalborg, Denmark, September 2016. Springer. [vDCC16b] B. F. van Dongen, J. Carmona, and Th. Chatain. A Unified Approach for Measuring Precision and Generalization Based on Anti-Alignments. In Proceedings of the 14th International Conference on Business Process Management (BPM'16), volume 9850 of Lecture Notes in Computer Science, pages 39--56, Rio de Janeiro, Brazil, September 2016. Springer. P. Karandikar and Ph. Schnoebelen. The height of piecewise-testable languages with applications in logical complexity. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 37:1--37:22, Marseille, France, September 2016. Leibniz-Zentrum für Informatik. [GGL16] M. Ganardi, S. Göller, and M. Lohrey. On the Parallel Complexity of Bisimulation over Finite Systems. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 12:1--12:17, Marseille, France, September 2016. Leibniz-Zentrum für Informatik. [DGG16b] J. Dubut, É. Goubault, and J. Goubault-Larrecq. The Directed Homotopy Hypothesis. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 9:1--9:16, Marseille, France, September 2016. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.CSL.2016.9. [DBS16] A. Doumane, D. Baelde, and A. Saurin. Infinitary proof theory: the multiplicative additive case. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 42:1--42:17, Marseille, France, September 2016. Leibniz-Zentrum für Informatik. D. Baelde, S. Lunel, and S. Schmitz. A Sequent Calculus for a Modal Logic on Finite Data Trees. In Proceedings of the 25th Annual EACSL Conference on Computer Science Logic (CSL'16), volume 62 of Leibniz International Proceedings in Informatics, pages 32:1--32:16, Marseille, France, September 2016. Leibniz-Zentrum für Informatik. [Leh16] M. Lehaut. PDL on infinite alphabet. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2016. 19 pages. [BGMS16a] P. Beame, N. Grosshans, P. McKenzie, and L. Segoufin. Nondeterminism and an abstract formulation of Neciporuk's lower bound method. Research Report 1608.01932, Computing Research Repository, August 2016. 34 pages. [Lic16] A. Lick. Systèmes de preuves pour logiques modales. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2016. 20 pages. M. Blondin, A. Finkel, and P. McKenzie. Well Behaved Transition Systems. Research Report 1608.02636, Computing Research Repository, August 2016. 18 pages. [FM16] M. Fränzle and N. Markey, editors. Proceedings of the 14th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'16), volume 9884 of Lecture Notes in Computer Science, Québec City, Canada, August 2016. Springer. [HT16b] S. Haar and S. Theissing. Decoupling Passenger Flows for Improved Load Prediction. In Proceedings of the 13th International Conference on Quantitative Evaluation of Systems (QEST'16), volume 9826 of Lecture Notes in Computer Science, pages 364--379, Québec City, Canada, August 2016. Springer. P. Bouyer. Optimal Reachability in Weighted Timed Automata and Games. In Proceedings of the 41st International Symposium on Mathematical Foundations of Computer Science (MFCS'16), volume 58 of Leibniz International Proceedings in Informatics, pages 3:1--3:3, Krakow, Poland, August 2016. Leibniz-Zentrum für Informatik. [ABK+16] S. Akshay, P. Bouyer, S. N. Krishna, L. Manasa, and A. Trivedi. Stochastic Timed Games Revisited. In Proceedings of the 41st International Symposium on Mathematical Foundations of Computer Science (MFCS'16), volume 58 of Leibniz International Proceedings in Informatics, pages 8:1--8:14, Krakow, Poland, August 2016. Leibniz-Zentrum für Informatik. [NPR16] R. Niskanen, I. Potapov, and J. Reichert. Undecidability of Two-dimensional Robot Games. In Proceedings of the 41st International Symposium on Mathematical Foundations of Computer Science (MFCS'16), volume 58 of Leibniz International Proceedings in Informatics, pages 73:1--73:13, Krakow, Poland, August 2016. Leibniz-Zentrum für Informatik. [DGG16a] J. Dubut, É. Goubault, and J. Goubault-Larrecq. Bisimulations and unfolding in P-accessible categorical models. In Proceedings of the 27th International Conference on Concurrency Theory (CONCUR'16), volume 59 of Leibniz International Proceedings in Informatics, pages 25:1--25:14, Québec City, Canada, August 2016. Leibniz-Zentrum für Informatik. S. Akshay, P. Gastin, and S. N. Krishna. Analyzing Timed Systems Using Tree Automata. In Proceedings of the 27th International Conference on Concurrency Theory (CONCUR'16), volume 59 of Leibniz International Proceedings in Informatics, pages 27:1--27:14, Québec City, Canada, August 2016. Leibniz-Zentrum für Informatik. N. Bertrand, S. Haddad, and E. Lefaucheux. Diagnosis in Infinite-State Probabilistic Systems. In Proceedings of the 27th International Conference on Concurrency Theory (CONCUR'16), volume 59 of Leibniz International Proceedings in Informatics, pages 37:1--37:15, Québec City, Canada, August 2016. Leibniz-Zentrum für Informatik. A. David, F. Laroussinie, and N. Markey. On the expressiveness of QCTL. In Proceedings of the 27th International Conference on Concurrency Theory (CONCUR'16), volume 59 of Leibniz International Proceedings in Informatics, pages 28:1--28:15, Québec City, Canada, August 2016. Leibniz-Zentrum für Informatik. [DFP16] S. Demri, D. Figueira, and M. Praveen. Reasoning about Data Repetitions with Counter Systems. Logical Methods in Computer Science, 12(3):1:1--1:55, August 2016. doi: 10.2168/LMCS-12(3:1)2016. J. Goubault-Larrecq. A few things on Noetherian spaces. Invited talk (plenary speaker), Summer Topology Conference, Leicester, UK, August 2016. J. Goubault-Larrecq. An introduction to asymmetric topology and domain theory: why, what, and how. Invited talk, Galway Symposium, Leicester, UK, August 2016. F. Thiré. Reverse engineering on arithmetic proofs. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2016. 26 pages. [BDJ+16] Th. Brihaye, B. Delahaye, L. Jezequel, N. Markey, and J. Srba, editors. Proceedings of the Cassting Workshop on Games for the Synthesis of Complex Systems (Cassting'16) and of the 3rd International Workshop on Synthesis of Complex Parameters (SynCoP'16), volume 220 of Electronic Proceedings in Theoretical Computer Science, Eindhoven, The Netherlands, July 2016. doi: 10.4204/EPTCS.220. [HT16d] S. Haar and S. Theissing. Predicting Traffic Load in Public Transportation Networks. In Proceedings of the 35th American Control Conference (ACC'16), pages 821--826, Boston, Massachusetts, USA, July 2016. IEEE Control System Society. doi: 10.1109/ACC.2016.7525015. N. Bertrand, P. Bouyer, Th. Brihaye, and P. Carlier. Analysing Decisive Stochastic Processes. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 101:1--101:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik. [CH16] D. Chistikov and C. Haase. The Taming of the Semi-Linear Set. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 128:1--128:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik. G. Zetzsche. The complexity of downward closure comparisons. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 123:1--123:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik. [CD16b] K. Chatterjee and L. Doyen. Computation Tree Logic for Synchronization Properties. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 98:1--98:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.ICALP.2016.98. [GS16] J. Goubault-Larrecq and S. Schmitz. Deciding Piecewise Testable Separability for Regular Tree Languages. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 97:1--97:15, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik. [GHLT16] S. Göller, C. Haase, R. Lazić, and P. Totzke. A Polynomial-Time Algorithm for Reachability in Branching VASS in Dimension One. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 105:1--105:13, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik. [BCM16] P. Bouyer, M. Colange, and N. Markey. Symbolic Optimal Reachability in Weighted Timed Automata. In Proceedings of the 28th International Conference on Computer Aided Verification (CAV'16) -- Part I, volume 9779 of Lecture Notes in Computer Science, pages 513--530, Toronto, Canada, July 2016. Springer. P. Bouyer, N. Markey, M. Randour, A. Sangnier, and D. Stan. Reachability in Networks of Register Protocols under Stochastic Schedulers. In Proceedings of the 43rd International Colloquium on Automata, Languages and Programming (ICALP'16), volume 55 of Leibniz International Proceedings in Informatics, pages 106:1--106:14, Rome, Italy, July 2016. Leibniz-Zentrum für Informatik. R. Lazić and S. Schmitz. The Complexity of Coverability in ν-Petri Nets. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 467--476, New York City, USA, July 2016. ACM Press. [DBHS16] A. Doumane, D. Baelde, L. Hirschi, and A. Saurin. Towards Completeness via Proof Search in the Linear Time μ-calculus. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 377--386, New York City, USA, July 2016. ACM Press. Th. Colcombet and S. Göller. Games with bound guess actions. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 257--266, New York City, USA, July 2016. ACM Press. [CD16c] K. Chatterjee and L. Doyen. Perfect-information Stochastic Games with Generalized Mean-Payoff Objectives. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 247--256, New York City, USA, July 2016. ACM Press. [DMZ16] E. D'Osualdo, R. Meyer, and G. Zetzsche. First-order logic with reachability for infinite-state systems. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 457--466, New York City, USA, July 2016. ACM Press. [ACH+16] M. F. Atig, D. Chistikov, P. Hofman, K. N. Kumar, P. Saivasan, and G. Zetzsche. Complexity of regular abstractions of one-counter languages. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'16), pages 207--216, New York City, USA, July 2016. ACM Press. [CFS16] P. Chambart, A. Finkel, and S. Schmitz. Forward Analysis and Model Checking for Trace Bounded WSTS. Theoretical Computer Science, 637:1--29, July 2016. [AMP16] P. Arrighi, S. Martiel, and S. Perdrix. Reversible Causal Graph Dynamics. In 8th Conference on Reversible Computation (RC'16), volume 9720 of Lecture Notes in Computer Science, pages 73--88, Bologna, Italy, July 2016. Springer. [PHL16] H. Ponce de León, S. Haar, and D. Longuet. Model-based Testing for Concurrent Systems: Unfolding-based Test Selection. International Journal on Software Tools for Technology Transfer, 18(3):305--318, June 2016. [Sch16c] S. Schmitz. Implicational Relevance Logic is 2-ExpTime-Complete. Journal of Symbolic Logic, 81(2):641--661, June 2016. doi: 10.1017/jsl.2015.7. [DLV16] A. Deutsch, Y. Li, and V. Vianu. Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems (PODS'16). In Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems (PODS'16), pages 179--194, San Francisco, California, USA, June 2016. ACM Press. [Blo16] M. Blondin. Algorithmique et complexité des systèmes à compteurs. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France and Université de Montréal, June 2016. [PS16] T. Place and L. Segoufin. Decidable Characterization of FO2(<, +1) and locality of DA. Research Report 1606.03217, Computing Research Repository, June 2016. 8 pages. [DG16a] S. Delaune and I. Gazeau. Combination issues. Deliverable VIP 4.2 (ANR-11-JS02-0006), June 2016. 5 pages. [DG16b] S. Delaune and I. Gazeau. Results on the case studies. Deliverable VIP 2.2 (ANR-11-JS02-0006), June 2016. 8 pages. [BBCM16] P. Bouyer, Th. Brihaye, P. Carlier, and Q. Menet. Compositional Design of Stochastic Timed Automata. In Proceedings of the 11th International Computer Science Symposium in Russia (CSR'16), volume 9691 of Lecture Notes in Computer Science, pages 117--130, St Petersburg, Russia, June 2016. Springer. [CC16] J. Carmona and Th. Chatain. Anti-Alignments in Conformance Checking -- The Dark Side of Process Models. In Proceedings of the 37th International Conference on Applications and Theory of Petri Nets (PETRI NETS'16), volume 9698 of Lecture Notes in Computer Science, pages 240--258, Torún, Poland, June 2016. Springer. [KGH+16a] F. Kordon, H. Garavel, L. M. Hillah, F. Hulin-Hubard, G. Chiardo, A. Hamez, L. Jezequel, A. Miner, J. Meijer, E. Paviot-Adet, D. Racordon, C. Rodriguez, C. Rohr, J. Srba, Y. Thierry-Mieg, G. Trinh, and K. Wolf. Complete Results for the 2016 Edition of the Model Checking Contest, June 2016. [Cau16a] R. Cauderlier. A Rewrite System for Proof Constructivization. In Proceedings of the 11th International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice (LFMTP'16), pages 2:1--2:7, Porto, Portugal, June 2016. ACM Press. [LBB+16] A. Linard, B. Barbot, D. Buchs, M. Colange, C. Démoulins, L. Hillah, and A. Martin. Layered Data: A Modular Formal Definition without Formalisms. In Proceedings of the 10th International Workshop on Petri Nets and Software Engineering (PNSE'16), volume 1591 of CEUR Workshop Proceedings, pages 287--306, Torun, Poland, June 2016. CEUR-WS.org. [BCEZ16] T. Brough, L. Ciobanu, M. Elder, and G. Zetzsche. Permutations of context-free, ET0L and indexed languages. Discrete Mathematics & Theoretical Computer Science, 17(3):167--178, May 2016. [HT16a] S. Haar and S. Theissing. A Passenger-centric Multi-agent System Model for Multimodal Public Transportation. Research Report hal-01322956, HAL-inria, May 2016. 12 pages. É. Fabre, L. Hélouët, E. Lefaucheux, and H. Marchand. Diagnosability of Repairable Faults. In Proceedings of the 13th Workshop on Discrete Event Systems (WODES'16), pages 230--236, Xi'an, China, May-June 2016. IEEE Control System Society. doi: 10.1109/WODES.2016.7497853. [GR16] G. Grefenstette and K. Rafes. Transforming Wikipedia into an Ontology-based Information Retrieval Search Engine for Local Experts using a Third-Party Taxonomy. In Proceedings of the Joint 2nd Workshop on Language and Ontology & Terminology and Knowledge Structures (LangOnto+TermiKS'16), Portorož, Slovenia, May 2016. To appear. L. Hirschi, D. Baelde, and S. Delaune. A method for verifying privacy-type properties: the unbounded case. In Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P'16), pages 564--581, San Jose, California, USA, May 2016. IEEECSP. doi: 10.1109/SP.2016.40. [GLSHHM16] J. Goubault-Larrecq, P.-A. Sentucq, F. Hulin-Hubard, and F. Majorczyk. Etat final des travaux engagés sur Orchids. Rapport final et fourniture 4 du contrat DGA-INRIA Orchids, May 2016. [GLM16] J. Goubault-Larrecq and F. Majorczyk. Génération de signatures pour le suivi de flux d'informations. Fourniture 3 du contrat DGA-INRIA Orchids, May 2016. [HHK+16b] M. Hutagalung, N. Hundeshagen, D. Kuske, M. Lange, and É. Lozes. Two-Buffer Simulation Games. In Proceedings of the Cassting Workshop on Games for the Synthesis of Complex Systems and 3rd International Workshop on Synthesis of Complex Parameters (Cassting/SYNCOP'16), volume 220 of Electronic Proceedings in Theoretical Computer Science, pages 213--227, Eindhoven, The Netherlands, April 2016. [HT16c] S. Haar and S. Theissing. Forecasting Passenger Loads in Transportation Networks. In Proceedings of the 8th International Workshop on Practical Applications of Stochastic Modelling (PASM'16), volume 327 of Electronic Notes in Theoretical Computer Science, pages 49--69, Münster, Germany, April 2016. Elsevier Science Publishers. A. Le Coënt, J. Alexandre dit Sandretto, A. Chapoutot, and L. Fribourg. Control of Nonlinear Switched Systems Based on Validated Simulation. In Proceedings of the 2nd International Workshop on Symbolic and Numerical Methods for Reachability Analysis (SNR'16), pages 1--6, Vienna, Austria, April 2016. IEEE Computer Society Press. [FGMP16] L. Fribourg, É. Goubault, S. Mohamed, and S. Putot. A Topological Method for Finding Invariant Sets of Switched Systems. In Proceedings of the 19th ACM International Conference on Hybrid Systems: Computation and Control (HSCC'16), pages 61--70, Vienna, Austria, April 2016. ACM Press. [CCH+16] D. Chistikov, W. Czerwiński, P. Hofman, M. Pilipczuk, and M. Wehar. Shortest paths in one-counter systems. In Proceedings of the 19th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'16), volume 9634 of Lecture Notes in Computer Science, pages 462--478, Eindhoven, The Netherlands, April 2016. Springer. [HLL+16] P. Hofman, S. Lasota, R. Lazić, J. Leroux, S. Schmitz, and P. Totzke. Coverability Trees for Petri Nets with Unordered Data. In Proceedings of the 19th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'16), volume 9634 of Lecture Notes in Computer Science, pages 445--461, Eindhoven, The Netherlands, April 2016. Springer. [FG16] M. Fortin and P. Gastin. Verification of parameterized communicating automata via split-width. In Proceedings of the 19th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'16), volume 9634 of Lecture Notes in Computer Science, pages 197--213, Eindhoven, The Netherlands, April 2016. Springer. V. Cortier, A. Dallon, and S. Delaune. Bounding the number of agents, for equivalence too. In Proceedings of the 5th International Conference on Principles of Security and Trust (POST'16), volume 9635 of Lecture Notes in Computer Science, pages 211--232, Eindhoven, The Netherlands, April 2016. Springer. [BFHH16a] M. Blondin, A. Finkel, C. Haase, and S. Haddad. Approaching the Coverability Problem Continuously. In Proceedings of the 22th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'16), volume 9636 of Lecture Notes in Computer Science, pages 480--496, Eindhoven, The Netherlands, April 2016. Springer. [BHJL16] B. Bérard, S. Haddad, A. Jovanović, and D. Lime. Interrupt Timed Automata with Auxiliary Clocks and Parameters. Fundamenta Informaticae, 143(3-4):235--259, March 2016. N. Bertrand, S. Haddad, and E. Lefaucheux. Accurate Approximate Diagnosability of Stochastic Systems. In Proceedings of the 10th International Conference on Language and Automata Theory and Applications (LATA'16), volume 9618 of Lecture Notes in Computer Science, pages 549--561, Prague, Czech Republic, March 2016. Springer. [DD16a] S. Demri and M. Deters. Expressive Completeness of Separation Logic With Two Variables and No Separating Conjunction. ACM Transactions on Computational Logic, 17(2):12:1--12:44, March 2016. [AD16a] P. Arrighi and G. Dowek. Free fall and cellular automata. In Proceedings of the 11th International Workshop on Developments in Computational Models (DCM'15), volume 204 of Electronic Proceedings in Theoretical Computer Science, pages 1--10, Cali, Colombia, March 2016. [BGM16] P. Bouyer, P. Gardy, and N. Markey. On the semantics of Strategy Logic. Information Processing Letters, 116(2):75--79, February 2016. [HK16] C. Haase and S. Kiefer. The Complexity of the Kth Largest Subset Problem and Related Problems. Information Processing Letters, 116(2):111--115, February 2016. J. Leroux and S. Schmitz. Ideal Decompositions for Vector Addition Systems. In Proceedings of the 33rd Annual Symposium on Theoretical Aspects of Computer Science (STACS'16), volume 47 of Leibniz International Proceedings in Informatics, pages 1:1--1:13, Orléans, France, February 2016. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.STACS.2016.1. S. Schmitz. Complexity Hierarchies Beyond Elementary. ACM Transactions on Computation Theory, 8(1:3), February 2016. [HH16] C. Haase and P. Hofman. Tightening the Complexity of Equivalence Problems for Commutative Grammars. In Proceedings of the 33rd Annual Symposium on Theoretical Aspects of Computer Science (STACS'16), volume 47 of Leibniz International Proceedings in Informatics, pages 41:1--14, Orléans, France, February 2016. Leibniz-Zentrum für Informatik. [KNS16] P. Karandikar, M. Niewerth, and Ph. Schnoebelen. On the state complexity of closures and interiors of regular languages with subwords and superwords. Theoretical Computer Science, 610(A):91--107, January 2016. [DD16b] S. Demri and M. Deters. Temporal Logics on Strings with Prefix Relation. Journal of Logic and Computation, 26(3):989--1017, 2016. doi: 10.1093/logcom/exv028. [BFHH16b] M. Blondin, A. Finkel, C. Haase, and S. Haddad. QCover: an efficient coverability verifier for discrete and continuous Petri nets, 2016. S. Delaune and L. Hirschi. A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols. Journal of Logic and Algebraic Methods in Programming, 87:127--144, 2016. To appear. [JSD16] F. Jacquemard, L. Segoufin, and J. Dimino. FO2(<, +1,) on data trees, data tree automata and branching vector addition systems. Logical Methods in Computer Science, 12(2):1--28, 2016. [GSSW16] J. Goubault-Larrecq, M. Seisenberger, V. Selivanov, and A. Weiermann. Well Quasi-Orders in Computer Science (Dagstuhl Seminar 16031). Dagstuhl Reports, 6(1):69--98, January 2016. doi: 10.4230/DagRep.6.1.69. [KGH+16b] F. Kordon, H. Garavel, L. Hillah, E. Paviot-Adet, L. Jezequel, C. Rodríguez, and F. Hulin-Hubard. MCC'2015 - The Fifth Model Checking Contest. Transactions on Petri Nets and Other Models of Concurrency, 11:262--273, 2016. [ADF+16] P. A. Abdulla, S. Demri, A. Finkel, J. Leroux, and I. Potapov. Selected papers of Reachability Problems Workshop 2012 (Bordeaux) and 2013 (Uppsala). Fundamenta Informaticae, 143(3--4), 2016. [LDR+16] A. Le Coënt, F. De Vuyst, C. Rey, L. Chamoin, and L. Fribourg. Control of mechanical systems using set-based methods. International Journal of Dynamics and Control, pages 1--17, 2016. [DD16c] A. Díaz-Caro and G. Dowek. Quantum superpositions and projective measurement in the lambda calculus. Research Report 1601.04294, Computing Research Repository, January 2016. 22 pages. [Chr16] R. Chrétien. Analyse automatique de propriétés d'équivalence pour les protocoles cryptographiques. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2016. S. Schmitz. Automata column: The complexity of reachability in vector addition systems. SIGLOG News, 3(1):3--21, January 2016. [HOW16] C. Haase, J. Ouaknine, and J. Worrell. Relating Reachability Problems in Timed and Counter Automata. Fundamenta Informaticae, 143(3-4):317--338, January 2016. J. Goubault-Larrecq. Les méthodes formelles: l'autre arme de la cybersécurité. Encart dans l'article ”S'adapter à la cyberguerre”, de Karen Elazari, Pour La Science 459, January 2016. [ADJL16a] A. Assaf, G. Dowek, J.-P. Jouannaud, and J. Liu. Encoding Proofs in Dedukti: the case of Coq proofs. In Preliminary Proceedings of the 1st International Workshop on Hammers for Type Theories (HaTT'16), Coimbra, Portugal, 2016. [ADJL16b] A. Assaf, G. Dowek, J.-P. Jouannaud, and J. Liu. Untyped Confluence in Dependent Type Theories. In Proceedings of the 8th International Workshop on Higher-Order Rewriting (HOR'16), Porto, Portugal, 2016. [ABC+16] A. Assaf, G. Burel, R. Cauderlier, D. Delahaye, G. Dowek, C. Dubois, F. Gilbert, P. Halmagrand, O. Hermant, and R. Saillard. Expressing theories in the λΠ-calculus modulo theory and in the Dedukti system. In Proceedings of the 22nd International Conference on Types for Proofs and Programs (TYPES'16), volume 97 of Leibniz International Proceedings in Informatics, Novi Sad, Serbia, 2016. Leibniz-Zentrum für Informatik. To appear. [Dow16] G. Dowek. Rules and derivations in an elementary logic course. preprint, January 2016. [CDGH15] K. Chatterjee, L. Doyen, H. Gimbert, and T. A. Henzinger. Randomness for free. Information and Computation, 245:3--16, December 2015. [LM15] F. Laroussinie and N. Markey. Augmenting ATL with strategy contexts. Information and Computation, 245:98--123, December 2015. [GHKS15] V. Germanos, S. Haar, V. Khomenko, and S. Schwoon. Diagnosability under Weak Fairness. ACM Transactions in Embedded Computing Systems, 14(4:69), December 2015. [BGH+15] Th. Brihaye, G. Geeraerts, A. Haddad, E. Lefaucheux, and B. Monmege. Simple Priced Timed Games Are Not That Simple. In Proceedings of the 35th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'15), volume 45 of Leibniz International Proceedings in Informatics, pages 278--292, Bangalore, India, December 2015. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.FSTTCS.2015.278. [BHH+15] S. Böhm, S. Haar, S. Haddad, P. Hofman, and S. Schwoon. Active Diagnosis with Observable Quiescence. In Proceedings of the 54th IEEE Conference on Decision and Control (CDC'15), pages 1663--1668, Osaka, Japan, December 2015. IEEE Control System Society. doi: 10.1109/CDC.2015.7402449. [BV15b] D. Berwanger and M. Van den Bogaard. Games with Delays. A Frankenstein Approach. In Proceedings of the 35th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'15), volume 45 of Leibniz International Proceedings in Informatics, pages 307--319, Bangalore, India, December 2015. Leibniz-Zentrum für Informatik. [KS15a] P. Karandikar and Ph. Schnoebelen. Decidability in the logic of subsequences and supersequences. In Proceedings of the 35th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'15), volume 45 of Leibniz International Proceedings in Informatics, pages 84--97, Bangalore, India, December 2015. Leibniz-Zentrum für Informatik. P. Bouyer, P. Gardy, and N. Markey. Weighted strategy logic with boolean goals over one-counter games. In Proceedings of the 35th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'15), volume 45 of Leibniz International Proceedings in Informatics, pages 69--83, Bangalore, India, December 2015. Leibniz-Zentrum für Informatik. [Fra15b] N. Francis. View-based Query Determinacy and Rewritings over Graph Databases. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2015. [FSS15] N. Francis, L. Segoufin, and C. Sirangelo. Datalog Rewritings of Regular Path Queries using Views. Logical Methods in Computer Science, 11(4:14), December 2015. doi: 10.2168/LMCS-11(4:14)2015. [Gon15] M. González. Constructions d'Information Parfaite pour certains Jeux à Information Imparfaite. Quelques Algorithmes. Rapport de Master, Université Pierre et Marie Curie, Paris, France, December 2015. [ABV15] S. Abiteboul, P. Bourhis, and V. Vianu. Highly Expressive Query Languages for Unordered Data Trees. Theory of Computing Systems, 57(4):927--966, November 2015. [AAD+15] S. Abiteboul, Y. Amsterdamer, D. Deutch, T. Milo, and P. Senellart. Optimal Probabilistic Generation of XML Documents. Theory of Computing Systems, 57(4):806--842, November 2015. [MAS15] D. Montoya, S. Abiteboul, and P. Senellart. Hup-Me: Inferring and Reconciling a Timeline of User Activity with Smartphone and Personal Data. In Proceedings of the 23rd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS'15), pages 62:1--4, Seattle, Washington, USA, November 2015. [CHH15] D. Chistikov, C. Haase, and S. Halfon. Context-Free Commutative Grammars with Integer Counters and Resets. Research Report 1511-04893, Computing Research Repository, November 2015. 31 pages. [HT15] S. Haar and S. Theissing. A Hybrid-Dynamical Model for Passenger-flow in Transportation Systems. In Proceedings of the 5th IFAC Conference on Analysis and Design of Hybrid Systems (ADHS'15), volume 48 of IFAC-PapersOnLine, pages 236--241, Atlanta, Georgia, USA, October 2015. Elsevier Science Publishers. [BMV15] D. Berwanger, A. B. Mathew, and M. Van den Bogaard. Hierarchical Information Patterns and Distributed Strategy Synthesis. In Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15), volume 9364 of Lecture Notes in Computer Science, pages 378--393, Shanghai, China, October 2015. Springer. [PRC+15] H. Ponce de León, C. Rodríguez, J. Carmona, K. Heljanko, and S. Haar. Unfolding-Based Process Discovery. In Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15), volume 9364 of Lecture Notes in Computer Science, Shanghai, China, October 2015. Springer. [Loz15] É. Lozes. A Type-Directed Negation Elimination. In Proceedings of the 10th Workshop on Fixed Points in Computer Science (FICS'15), volume 191 of Electronic Proceedings in Theoretical Computer Science, pages 132--142, Berlin, Germany, September 2015. A. Dallon. Verification of Cryptographic Protocols : a bound on the number of agents. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2015. 38 pages. [MDB15] N. Markey, L. Doyen, and D. Berwanger. Models for large-scale systems. Cassting deliverable D1.3 (FP7-ICT-601148), September 2015. 17 pages. [MLB+15b] A. Methni, M. Lemerre, B. Ben Hedia, S. Haddad, and K. Barkaoui. State Space Reduction Strategie for Model Checking Concurrent C Programs. In Proceedings of the 9th Workshop on Verification and Evaluation of Computer and Communication Systems(VECoS'15), volume 1431 of CEUR Workshop Proceedings, pages 65--76, Bucharest, Romania, September 2015. RWTH Aachen, Germany. [CCD15c] R. Chrétien, V. Cortier, and S. Delaune. From security protocols to pushdown automata. ACM Transactions on Computational Logic, 17(1:3), September 2015. [CCD15a] R. Chrétien, V. Cortier, and S. Delaune. Checking trace equivalence: How to get rid of nonces? In Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS'15), Lecture Notes in Computer Science, pages 230--251, Vienna, Austria, September 2015. Springer. [FGM+15] L. Fribourg, É. Goubault, S. Mohamed, M. Mrozek, and S. Putot. A Topological Method for Finding Invariants of Continuous Systems. In Proceedings of the 9th Workshop on Reachability Problems in Computational Models (RP'15), volume 9328 of Lecture Notes in Computer Science, pages 63--75, Warsaw, Poland, September 2015. Springer. R. Lazić and S. Schmitz. The Ideal View on Rackoff's Coverability Technique. In Proceedings of the 9th Workshop on Reachability Problems in Computational Models (RP'15), volume 9328 of Lecture Notes in Computer Science, pages 76--88, Warsaw, Poland, September 2015. Springer. [BHP+15] B. Bérard, S. Haddad, C. Picaronny, M. Safey El Din, and M. Sassolas. Polynomial Interrupt Timed Automata. In Proceedings of the 9th Workshop on Reachability Problems in Computational Models (RP'15), volume 9328 of Lecture Notes in Computer Science, pages 20--32, Warsaw, Poland, September 2015. Springer. P. Bouyer, E. Fang, and N. Markey. Permissive strategies in timed automata and games. In Proceedings of the 15th International Workshop on Automated Verification of Critical Systems (AVoCS'15), volume 72 of Electronic Communications of the EASST, Edinburgh, UK, September 2015. European Association of Software Science and Technology. doi: 10.14279/tuj.eceasst.72.1015. [Bol15c] B. Bollig. Towards Formal Verification of Distributed Algorithms. In Proceedings of the 22nd International Symposium on Temporal Representation and Reasoning (TIME'15), page 3, Kassel, Germany, September 2015. IEEE Computer Society Press. doi: 10.1109/TIME.2015.23. [RG15] K. Rafes and C. Germain. A platform for scientific data sharing. In Actes de la 31ème Conférence sur la Gestion de Données -- Principes, Technologies et Applications (BDA'15), Île de Porquerolles, France, September 2015. P. Bouyer, N. Markey, M. Randour, K. G. Larsen, and S. Laursen. Average-energy games. In Proceedings of the 6th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'15), volume 193 of Electronic Proceedings in Theoretical Computer Science, pages 1--15, Genova, Italy, September 2015. [LMS15] F. Laroussinie, N. Markey, and A. Sangnier. ATL_sc with partial observation. In Proceedings of the 6th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'15), volume 193 of Electronic Proceedings in Theoretical Computer Science, pages 43--57, Genova, Italy, September 2015. [BDS15] D. Baelde, A. Doumane, and A. Saurin. Least and Greatest Fixed Points in Ludics. In Proceedings of the 24th Annual EACSL Conference on Computer Science Logic (CSL'15), volume 41 of Leibniz International Proceedings in Informatics, pages 549--566, Berlin, Germany, September 2015. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.CSL.2015.549. P. Bouyer, N. Markey, N. Perrin, and P. Schlehuber. Timed automata abstraction of switched dynamical systems using control funnels. In Proceedings of the 13th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'15), volume 9268 of Lecture Notes in Computer Science, pages 60--75, Madrid, Spain, September 2015. Springer. É. André and N. Markey. Language Preservation Problems in Parametric Timed Automata. In Proceedings of the 13th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'15), volume 9268 of Lecture Notes in Computer Science, pages 27--43, Madrid, Spain, September 2015. Springer. C. Aiswarya, B. Bollig, and P. Gastin. An Automata-Theoretic Approach to the Verification of Distributed Algorithms. In Proceedings of the 26th International Conference on Concurrency Theory (CONCUR'15), volume 42 of Leibniz International Proceedings in Informatics, pages 340--353, Madrid, Spain, September 2015. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.CONCUR.2015.340. D. Baelde, S. Delaune, and L. Hirschi. Partial Order Reduction for Security Protocols. In Proceedings of the 26th International Conference on Concurrency Theory (CONCUR'15), volume 42 of Leibniz International Proceedings in Informatics, pages 497--510, Madrid, Spain, September 2015. Leibniz-Zentrum für Informatik. P. Bouyer, S. Jaziri, and N. Markey. On the Value Problem in Weighted Timed Games. In Proceedings of the 26th International Conference on Concurrency Theory (CONCUR'15), volume 42 of Leibniz International Proceedings in Informatics, pages 311--324, Madrid, Spain, September 2015. Leibniz-Zentrum für Informatik. [BDK15] D. Baelde, S. Delaune, and S. Kremer. Decision procedures for equivalence based properties (part II). Deliverable VIP 3.2 (ANR-11-JS02-0006), September 2015. 9 pages. [DK15] S. Delaune and S. Kremer. Composition results for equivalence-based security properties. Deliverable VIP 3.1 (ANR-11-JS02-0006), September 2015. 6 pages. Th. Place and L. Segoufin. Deciding definability in FO^2(<_h,<_v) on trees. Logical Methods in Computer Science, 11(3:5), September 2015. [DS15] A. Dawar and L. Segoufin. Capturing MSO with one quantifier. In Fields of Logic and Computation II -- Essays Dedicated to Yuri Gurevich on the Occasion of His 75th Birthday, volume 9300 of Lecture Notes in Computer Science, pages 142--152. Springer, September 2015. [Abi15] S. Abiteboul. The Story of Webdamlog. In Proceedings of the 19th East-European Conference on Advances in Databases and Information Systems (ADBIS'15), Poitiers, France, September 2015. M. Fortin. Verification of distributed systems with parameterized network topology. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2015. [LL15] M. Lange and É. Lozes. Conjunctive Visibly-Pushdown Path Queries. In Proceedings of the 20th International Symposium on Fundamentals of Computation Theory (FCT'15), volume 9210 of Lecture Notes in Computer Science, pages 327--338, Gdańsk, Poland, August 2015. Springer. [AGMK15] S. Akshay, P. Gastin, M. Mukund, and K. N. Kumar. Checking conformance for time-constrained scenario-based specifications. Theoretical Computer Science, 594:24--43, August 2015. P. Bouyer. On the optimal reachability problem in weighted timed automata and games. In Proceedings of the 7th Workshop on Non-Classical Models of Automata and Applications (NCMA'15), volume 318 of books@ocg.at, pages 11--36, Porto, Portugal, August 2015. Austrian Computer Society. [Bol15a] B. Bollig. Automata and Logics for Concurrent Systems: Five Models in Five Pages. In Proceedings of the 20th International Conference on Implementation and Application of Automata (CIAA'15), volume 9223 of Lecture Notes in Computer Science, pages 3--12, Umeå, Sweden, August 2015. Springer-Verlag. [BBD+15] P. Ballarini, B. Barbot, M. Duflot, S. Haddad, and N. Pekergin. HASL: A New Approach for Performance Evaluation and Model Checking from Concepts to Experimentation. Performance Evaluation, 90:53--77, August 2015. doi: 10.1016/j.peva.2015.04.003. J. Goubault-Larrecq. Formal balls. Invited talk, Domains XII workshop, Cork, Ireland, August 2015. [Rei15] J. Reichert. Décidabilité et complexité de jeux d'accessibilité sur des systèmes à compteurs. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2015. [BV15a] D. Berwanger and M. Van den Bogaard. Consensus Game Acceptors. In Proceedings of the 19th International Conference on Developments in Language Theory (DLT'15), volume 9168 of Lecture Notes in Computer Science, pages 108--119, Liverpool, UK, July 2015. Springer. [HPRV15] S. Haar, S. Perchy, C. Rueda, and F. Valencia. An Algebraic View of SpaceashBelief and ExtrusionashUtterance for ConcurrencyashEpistemic Logic. In Proceedings of the 17th International Conference on Principles and Practice of Declarative Programming (PPDP'15), pages 161--172, Siena, Italy, July 2015. ACM Press. [CDV15] K. Chatterjee, L. Doyen, and M. Vardi. The Complexity of Synthesis from Probabilistic Components. In Proceedings of the 42nd International Colloquium on Automata, Languages and Programming (ICALP'15) -- Part II, volume 9135 of Lecture Notes in Computer Science, pages 108--120, Kyoto, Japan, July 2015. Springer. [JLS15] M. Jurdziński, R. Lazić, and S. Schmitz. Fixed-Dimensional Energy Games are in Pseudo Polynomial Time. In Proceedings of the 42nd International Colloquium on Automata, Languages and Programming (ICALP'15) -- Part II, volume 9135 of Lecture Notes in Computer Science, pages 260--272, Kyoto, Japan, July 2015. Springer. [CCD15b] R. Chrétien, V. Cortier, and S. Delaune. Decidability of trace equivalence for protocols with nonces. In Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF'15), pages 170--184, Verona, Italy, July 2015. IEEE Computer Society Press. [RRS15a] M. Randour, J.-F. Raskin, and O. Sankur. Percentile Queries in Multi-Dimensional Markov Decision Processes. In Proceedings of the 27th International Conference on Computer Aided Verification (CAV'15) -- Part I, volume 9206 of Lecture Notes in Computer Science, pages 123--139, San Francisco, CA, USA, July 2015. Springer. C. Haase and S. Kiefer. The Odds of Staying on Budget. In Proceedings of the 42nd International Colloquium on Automata, Languages and Programming (ICALP'15) -- Part II, volume 9135 of Lecture Notes in Computer Science, pages 234--246, Kyoto, Japan, July 2015. Springer. J. Dubut, É. Goubault, and J. Goubault-Larrecq. Natural Homology. In Proceedings of the 42nd International Colloquium on Automata, Languages and Programming (ICALP'15) -- Part II, volume 9135 of Lecture Notes in Computer Science, pages 171--183, Kyoto, Japan, July 2015. Springer. [LS15c] J. Leroux and S. Schmitz. Demystifying Reachability in Vector Addition Systems. In Proceedings of the 30th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'15), pages 56--67, Kyoto, Japan, July 2015. IEEE Press. doi: 10.1109/LICS.2015.1. [BFG+15] M. Blondin, A. Finkel, S. Göller, C. Haase, and P. McKenzie. Reachability in Two-Dimensional Vector Addition Systems with States is PSPACE-Complete. In Proceedings of the 30th Annual ACM/IEEE Symposium on Logic In Computer Science (LICS'15), pages 32--43, Kyoto, Japan, July 2015. IEEE Press. doi: 10.1109/LICS.2015.14. R. Lazić and S. Schmitz. Non-Elementary Complexities for Branching VASS, MELL, and Extensions. ACM Transactions on Computational Logic, 16(3:20), July 2015. [APS15] K. Athanasiou, H. Ponce de León, and S. Schwoon. Test Case Generation for Concurrent Systems Using Event Structures. In Proceedings of the 9th International Conference on Tests and Proofs (TAP'15), volume 9154 of Lecture Notes in Computer Science, pages 19--37, L'Aquila, Italy, July 2015. Springer. [BBMU15] P. Bouyer, R. Brenguier, N. Markey, and M. Ummels. Pure Nash Equilibria in Concurrent Games. Logical Methods in Computer Science, 11(2:9), June 2015. [CLMT15] K. Chatterjee, S. Lafortune, N. Markey, and W. Thomas. Non-Zero-Sum-Games and Control (Dagstuhl Seminar 15061). Dagstuhl Reports, 5(2):1--25, June 2015. doi: 10.4230/DagRep.5.2.1. [Bol15b] B. Bollig. Automata and Logics for Concurrent Systems: Realizability and Verification. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, June 2015. [BHHP15] B. Barbot, S. Haddad, M. Heiner, and C. Picaronny. Rare Event Handling in Signalling Cascades. International Journal on Advances in Systems and Measurements, 8(1-2):69--79, June 2015. [RNG15] K. Rafes, J. Nauroy, and C. Germain. Certifying the interoperability of RDF database systems. In Proceedings of the 2nd Workshop on Linked Data Quality (LDQ'15), volume 1376 of CEUR Workshop Proceedings, Portorož, Slovenia, June 2015. RWTH Aachen, Germany. É. André, Th. Chatain, and C. Rodríguez. Preserving Partial Order Runs in Parametric Time Petri Nets. In Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD'15), pages 120--129, Brussels, Belgium, June 2015. IEEE Computer Society Press. doi: 10.1109/ACSD.2015.16. [CHKS15] Th. Chatain, S. Haar, M. Koutny, and S. Schwoon. Non-Atomic Transition Firing in Contextual Nets. In Proceedings of the 36th International Conference on Applications and Theory of Petri Nets (PETRI NETS'15), volume 9115 of Lecture Notes in Computer Science, pages 117--136, Brussels, Belgium, June 2015. Springer. S. Demri, A. K. Dhar, and A. Sangnier. Taming Past LTL and Flat Counter Systems. Information and Computation, 242:306--339, June 2015. [CDRR15] K. Chatterjee, L. Doyen, M. Randour, and J.-F. Raskin. Looking at Mean-Payoff and Total-Payoff through Windows. Information and Computation, 242:25--52, June 2015. [BtCS15] V. Bárány, B. ten Cate, and L. Segoufin. Guarded nagation. Journal of the ACM, 62(3:22), June 2015. S. Haar and R. Meyer, editors. Proceedings of the 15th International Conference on Application of Concurrency to System Design (ACSD'15), Brussels, Belgium, June 2015. IEEE Computer Society Press. F. Kordon, H. Garavel, L. M. Hillah, F. Hulin-Hubard, A. Linard, M. Beccuti, A. Hamez, E. Lopez-Bobeda, L. Jezequel, J. Meijer, E. Paviot-Adet, C. Rodriguez, C. Rohr, J. Srba, Y. Thierry-Mieg, and K. Wolf. Complete Results for the 2015 Edition of the Model Checking Contest, June 2015. A. Finkel and J. Leroux. Recent and simple algorithms for Petri nets. Software & System Modeling, 14(2):719--725, May 2015. [KS15b] P. Karandikar and Ph. Schnoebelen. Generalized Post Embedding Problems. Theory of Computing Systems, 56(4):697--716, May 2015. N. Markey and A. Delaborde. Annual report for Year 2. Cassting deliverable D6.3 (FP7-ICT-601148), May 2015. 34 pages. [ADE+15] S. Abiteboul, X. L. Dong, O. Etzioni, D. Srivastava, G. Weikum, J. Stoyanovich, and F. M. Suchanek. The elephant in the room: getting value from Big Data. In Proceedings of the 18th International Workshop on the Web and Databases (WebDB'15), pages 1--5, Melbourne, Australia, May 2015. ACM Press. [MSAM15] V. Z. Moffitt, J. Stoyanovich, S. Abiteboul, and G. Miklau. Collaborative Access Control in WebdamLog. In Proceedings of the ACM SIGMOD Internaitonal Conference on Management of Data (SIGMOD'15), pages 197--211, Melbourne, Australia, May-June 2015. ACM Press. doi: 10.1109/DSAA.2015.7344775. [AAK15] S. Abiteboul, B. André, and D. Kaplan. Managing your digital life. Communications of the ACM, 58(5):32--35, May 2015. [GLSM15] J. Goubault-Larrecq, P.-A. Sentucq, and F. Majorczyk. Etat d'avancement intermédiaire des travaux engagés sur OrchIDS. Rapport intermédiaire du contrat DGA-INRIA Orchids, May 2015. P. Jancar, P. Karandikar, and Ph. Schnoebelen. On Reachability for Unidirectional Channel Systems Extended with Regular Tests. Logical Methods in Computer Science, 11(2:2), April 2015. [KKS15] P. Karandikar, M. Kufleitner, and Ph. Schnoebelen. On the index of Simon's congruence for piecewise testability. Information Processing Letters, 15(4):515--519, April 2015. [FKM15] L. Fribourg, U. Kühne, and N. Markey. Game-based Synthesis of Distributed Controllers for Sampled Switched Systems. In Proceedings of the 2nd International Workshop on Synthesis of Continuous Parameters (SYNCOP'15), volume 44 of Open Access Series in Informatics, pages 47--61, London, UK, April 2015. Leibniz-Zentrum für Informatik. doi: 10.4230/OASIcs.SynCoP.2015.47. A. Le Coënt, F. De Vuyst, Ch. Rey, L. Chamoin, and L. Fribourg. Guaranteed control of switched control systems using model order reduction and state-space bisection. In Proceedings of the 2nd International Workshop on Synthesis of Continuous Parameters (SYNCOP'15), volume 44 of Open Access Series in Informatics, pages 32--46, London, UK, April 2015. Leibniz-Zentrum für Informatik. [ACD15] M. Arapinis, V. Cheval, and S. Delaune. Composing security protocols: from confidentiality to privacy. In Proceedings of the 4th International Conference on Principles of Security and Trust (POST'15), volume 9036 of Lecture Notes in Computer Science, pages 324--343, London, UK, April 2015. Springer. [VCD+15] Y. Velner, K. Chatterjee, L. Doyen, T. A. Henzinger, A. M. Rabinovich, and J.-F. Raskin. The complexity of multi-mean-payoff and multi-energy games. Information and Computation, 241:177--196, April 2015. [LV15] É. Lozes and J. Villard. Shared contract-obedient channels. Science of Computer Programming, 100:28--60, March 2015. doi: 10.1016/j.scico.2014.09.008. [GDML15] G. Geeraerts, S. Dehouck, N. Markey, and K. G. Larsen. Efficient algorithms for multi-player games with quantitative aspects. Cassting deliverable D2.1 (FP7-ICT-601148), March 2015. 22 pages. S. Demri and M. Deters. Two-variable separation logic and its inner circle. ACM Transactions on Computational Logic, 16(2:15), March 2015. A. Koutsos and V. Vianu. Process-Centric Views of Data-Driven Business Artifacts. In Proceedings of the 18th International Conference on Database Theory (ICDT'15), volume 31 of Leibniz International Proceedings in Informatics, pages 247--264, Brussels, Belgium, March 2015. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.ICDT.2015.247. [Fra15a] N. Francis. Asymptotic Determinacy of Path Queries using Union-of-Paths Views. In Proceedings of the 18th International Conference on Database Theory (ICDT'15), volume 31 of Leibniz International Proceedings in Informatics, pages 44--59, Brussels, Belgium, March 2015. Leibniz-Zentrum für Informatik. Best student paper award. [GJL15] S. Göller, J. C. Jung, and M. Lohrey. The Complexity of Decomposing Modal and First-Order Theories. ACM Transactions on Computational Logic, 16(1:9), March 2015. L. Segoufin. Constant Delay Enumeration for Conjunctive Queries. SIGMOD Records, 44(1):10--17, March 2015. [Kar15] P. Karandikar. Subwords: automata, embedding problems, and verification. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France and Chennai Mathematical Institute, India, February 2015. J. Goubault-Larrecq. Full Abstraction for Non-Deterministic and Probabilistic Extensions of PCF I: the Angelic Cases. Journal of Logic and Algebraic Methods in Programming, 84(1):155--184, January 2015. P. Bouyer, N. Markey, and O. Sankur. Robust Reachability in Timed Automata and Games: A Game-based Approach. Theoretical Computer Science, 563:43--74, January 2015. J. Goubault-Larrecq. A short proof of the Schröder-Simpson theorem. Mathematical Structures in Computer Science, 25(1):1--5, January 2015. [KDH15] M. Koutny, J. Desel, and S. Haddad, editors. Transactions on Petri Nets and Other Models of Concurrency X, volume 9410 of Lecture Notes in Computer Science. Springer, 2015. [MLB+15a] A. Methni, M. Lemerre, B. Ben Hedia, S. Haddad, and K. Barkaoui. Specifying and Verifying Concurrent C Programs with TLA+. In Proceedings of the 3rd International Workshop on Formal Techniques for Safety-Critical Systems, Nov. 2014 (FTSCS'14), volume 476 of Communications in Computer and Information Science, pages 206--222, Luxembourg, 2015. Springer. [FH15] E. Fraca and S. Haddad. Complexity Analysis of Continuous Petri Nets. Fundamenta Informaticae, 137(1):1--28, 2015. [BH15] N. Bertrand and S. Haddad. Contrôle, probabilités et observation partielle. In Informatique Mathématique. Une photographie en 2015, chapter 5, pages 177--227. CNRS Éditions, 2015. [Sce15] G. Scerri. Proofs of security protocols revisited. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2015. S. Demri and M. Deters. Separation Logics and Modalities: A Survey. Journal of Applied Non-Classical Logics, 25(1):50--99, 2015. doi: 10.1080/11663081.2015.1018801. [RRS15b] M. Randour, J.-F. Raskin, and O. Sankur. Variations on the Stochastic Shortest Path Problem. In Proceedings of the 16th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'15), volume 8931 of Lecture Notes in Computer Science, pages 1--18, Mumbai, India, January 2015. Springer. [BFCH14] M. Beccuti, G. Franceschinis, D. Codetta-Raiteri, and S. Haddad. Computing Optimal Repair Strategies by Means of NdRFT Modeling and Analysis. The Computer Journal, 57(12):1870--1892, December 2014. doi: 10.1093/comjnl/bxt134. [GLS14] A. Gheerbrant, L. Libkin, and C. Sirangelo. Naïve Evaluation of Queries over Incomplete Databases. ACM Transactions on Database Systems, 39(4:31), December 2014. [Sir14] C. Sirangelo. Representing and querying incomplete information: a data interoperability perspective. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, December 2014. [LLV14] M. Lange, É. Lozes, and M. Vargas Guzmán. Model-checking process equivalences. Theoretical Computer Science, 560(3):326--347, December 2014. [BHLM14] B. Bollig, P. Habermehl, M. Leucker, and B. Monmege. A Robust Class of Data Languages and an Application to Learning. Logical Methods in Computer Science, 10(4:19), December 2014. [HSS14] C. Haase, S. Schmitz, and Ph. Schnoebelen. The Power of Priority Channel Systems. Logical Methods in Computer Science, 10(4:4), December 2014. [AG14] C. Aiswarya and P. Gastin. Reasoning about distributed systems: WYSIWYG. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 11--30, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik. N. Bertrand, S. Haddad, and E. Lefaucheux. Foundation of Diagnosis and Predictability in Probabilistic Systems. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 417--429, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik. [BGK14] B. Bollig, P. Gastin, and A. Kumar. Parameterized Communicating Automata: Complementation and Model Checking. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 625--637, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik. [CMS14] R. Chadha, U. Mathur, and S. Schwoon. Computing Information Flow Using Symbolic Model-Checking. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 505--516, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik. C. David, N. Francis, and F. Murlak. Consistency of injective tree patterns. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 279--290, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik. [DJL+14] L. Doyen, L. Juhl, K. G. Larsen, N. Markey, and M. Shirmohammadi. Synchronizing words for weighted and timed automata. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 121--132, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik. P. Bouyer, N. Markey, and D. Stan. Mixed Nash Equilibria in Concurrent Games. In Proceedings of the 34th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'14), volume 29 of Leibniz International Proceedings in Informatics, pages 351--363, New Dehli, India, December 2014. Leibniz-Zentrum für Informatik. [BBB+14] N. Bertrand, P. Bouyer, Th. Brihaye, Q. Menet, C. Baier, M. Größer, and M. Jurdziński. Stochastic Timed Automata. Logical Methods in Computer Science, 10(4:6), December 2014. [BCGZ14] B. Bollig, A. Cyriac, P. Gastin, and M. Zeitoun. Temporal logics for concurrent recursive programs: Satisfiability and model checking. Journal of Applied Logic, 12(4):395--416, December 2014. doi: 10.1016/j.jal.2014.05.001. [CDR14] V. Cheval, S. Delaune, and M. D. Ryan. Tests for establishing security properties. In Revised Selected Papers of the 9th Symposium on Trustworthy Global Computing (TGC'14), volume 8902 of Lecture Notes in Computer Science, pages 82--96, Rome, Italy, December 2014. Springer. [FKS14] L. Fribourg, U. Kühne, and R. Soulat. Finite Controlled Invariants for Sampled Switched Systems. Formal Methods in System Design, 45(3):303--329, December 2014. F. Laroussinie and N. Markey. Quantified CTL: Expressiveness and Complexity. Logical Methods in Computer Science, 10(4:17), December 2014. [Shi14] M. Shirmohammadi. Qualitative Analysis of Synchronizing Probabilistic Systems. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France and Université Libre de Bruxelles, Belgium, December 2014. J. Goubault-Larrecq. Détection d'intrusions avec OrchIDS. Matinale de l'innovation Logiciels Libres et Sécurité, Paris, France, December 2014. [GPPS14] C. Gardent, G. Perrier, Y. Parmentier, and S. Schmitz. Lexical Disambiguation in LTAG using Left Context. In Proceedings of the 5th Language & Technology Conference (LTC'11), volume 8387 of Lecture Notes in Artificial Intelligence, Poznań, Poland, November 2014. Springer. [BC14] G. Bana and H. Comon-Lundh. A Computationally Complete Symbolic Attacker for Equivalence Properties. In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS'14), pages 609--620, Scottsdale, Arizona, USA, November 2014. ACM Press. [Pon14] H. Ponce de León. Testing Concurrent Systems Through Event Structures. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2014. [Bar14] B. Barbot. Acceleration for Statistical Model Checking. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2014. [CHJ+14] Th. Chatain, S. Haar, L. Jezequel, L. Paulevé, and S. Schwoon. Characterization of Reachable Attractors Using Petri Net Unfoldings. In Proceedings of the 12th Conference on Computational Methods in System Biology (CMSB'14), volume 8859 of Lecture Notes in Bioinformatics, pages 129--142, Manchester, UK, November 2014. Springer-Verlag. [PHL14b] H. Ponce de León, S. Haar, and D. Longuet. Model-Based Testing for Concurrent Systems with Labeled Event Structures. Software Testing, Verification and Reliability, 24(7):558--590, November 2014. doi: 10.1002/stvr.1543. [AGNK14] C. Aiswarya, P. Gastin, and K. Narayan Kumar. Verifying Communicating Multi-pushdown Systems via Split-width. In Proceedings of the 12th International Symposium on Automated Technology for Verification and Analysis (ATVA'14), volume 8837 of Lecture Notes in Computer Science, pages 1--17, Sydney, Australia, November 2014. Springer. P. Bouyer, P. Gardy, and N. Markey. Quantitative verification of weighted Kripke structures. In Proceedings of the 12th International Symposium on Automated Technology for Verification and Analysis (ATVA'14), volume 8837 of Lecture Notes in Computer Science, pages 64--80, Sydney, Australia, November 2014. Springer. [MV14b] N. Markey and S. Vester. Symmetry Reduction in Infinite Games with Finite Branching. In Proceedings of the 12th International Symposium on Automated Technology for Verification and Analysis (ATVA'14), volume 8837 of Lecture Notes in Computer Science, pages 281--296, Sydney, Australia, November 2014. Springer. M. Arnaud, V. Cortier, and S. Delaune. Modeling and Verifying Ad Hoc Routing Protocols. Information and Computation, 238:30--67, November 2014. [BCD14] S. Bursuc, H. Comon-Lundh, and S. Delaune. Deducibility constraints and blind signatures. Information and Computation, 238:106--127, November 2014. P. Karandikar, M. Niewerth, and Ph. Schnoebelen. On the state complexity of closures and interiors of regular languages with subwords. Research Report 1406.0690, Computing Research Repository, November 2014. 24 pages. [MCGS14] N. Markey, N. Chaturvedi, G. Geeraerts, and J. Srba. Efficient strategy synthesis for complex objectives. Cassting deliverable D2.4 (FP7-ICT-601148), October 2014. 20 pages. B. Barbot, S. Haddad, M. Heiner, and C. Picaronny. Rare Event Handling in Signalling Cascades. In Proceedings of the 6th International Conference on Advances in System Simulation (SIMUL'14), pages 126--131, Nice, France, October 2014. XPS. [AFG14] S. Abiteboul, L. Fribourg, and J. Goubault-Larrecq. Gérard Berry : un informaticien médaille d'or du CNRS 2014. 1024 -- Bulletin de la société informatique de France, 4:139--142, October 2014. [MA14] D. Montoya and S. Abiteboul. Inférence d'itinéraires multimodaux à partir de données smartphone. In Actes de la 30ème Conférence sur la Gestion de Données -- Principes, Technologies et Applications (BDA'14), pages 38--42, Autrans, France, October 2014. E. Lefaucheux. Détection de fautes dans les systèmes probabilistes. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014. 35 pages. J. Dubut. Homologie dirigée. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014. 35 pages. S. Halfon. Non Primitive Recursive Complexity Classes. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014. 21 pages. S. Demri, A. K. Dhar, and A. Sangnier. Equivalence Between Model-Checking Flat Counter Systems and Presburger Arithmetic. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 85--97, Oxford, UK, September 2014. Springer. R. Chrétien and S. Delaune. Le bitcoin, une monnaie 100% numérique. Interstices, September 2014. S. Schmitz. Complexity Bounds for Ordinal-Based Termination. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 1--19, Oxford, UK, September 2014. Springer. [BGS14] B. Bollig, P. Gastin, and J. Schubert. Parameterized Verification of Communicating Automata under Context Bounds. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 45--57, Oxford, UK, September 2014. Springer. S. Haddad and B. Monmege. Reachability in MDPs: Refining Convergence of Value Iteration. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 125--137, Oxford, UK, September 2014. Springer. J. Leroux and Ph. Schnoebelen. On Functions Weakly Computable by Petri Nets and Vector Addition Systems. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 190--202, Oxford, UK, September 2014. Springer. C. Haase and S. Halfon. Integer Vector Addition Systems with States. In Proceedings of the 8th Workshop on Reachability Problems in Computational Models (RP'14), volume 8762 of Lecture Notes in Computer Science, pages 112--124, Oxford, UK, September 2014. Springer. [BMP14] L. Brandán Briones, A. Madalinski, and H. Ponce de León. Distributed Diagnosability Analysis with Petri Nets. In Proceedings of the 25th International Workshop on Principles of Diagnosis (DX'14), Graz, Austria, September 2014. [CGNK14] A. Cyriac, P. Gastin, and K. Narayan Kumar. Controllers for the Verification of Communicating Multi-Pushdown Systems. In Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in Computer Science, pages 297--311, Rome, Italy, September 2014. Springer. R. Chrétien, V. Cortier, and S. Delaune. Typing messages for free in security protocols: the case of equivalence properties. In Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in Computer Science, pages 372--386, Rome, Italy, September 2014. Springer. [DMS14b] L. Doyen, Th. Massart, and M. Shirmohammadi. Robust Synchronization in Markov Decision Processes. In Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in Computer Science, pages 234--248, Rome, Italy, September 2014. Springer. [BMM14] P. Bouyer, N. Markey, and R. M. Matteplackel. Averaging in LTL. In Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), volume 8704 of Lecture Notes in Computer Science, pages 266--280, Rome, Italy, September 2014. Springer. [PHL14a] H. Ponce de León, S. Haar, and D. Longuet. Distributed testing of concurrent systems: vector clocks to the rescue. In Proceedings of the 11th International Colloquium on Theoretical Aspects of Computing (ICTAC'14), volume 8687 of Lecture Notes in Computer Science, pages 369--387, Bucharest, Romania, September 2014. Springer. [Dou14] A. Doumane. Études des automates en ludique. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014. J. Goubault-Larrecq. Noetherian spaces. Invited talk, Continuity, Computability, Constructivity workshop (CCC), Ljubljana, Slovenia, September 2014. [Jaz14] S. Jaziri. Robustness issues in priced timed automata. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2014. [CS14] J.-B. Courtois and S. Schmitz. Alternating Vector Addition Systems with States. In Proceedings of the 39th International Symposium on Mathematical Foundations of Computer Science (MFCS'14) -- Part I, volume 8634 of Lecture Notes in Computer Science, pages 220--231, Budapest, Hungary, August 2014. Springer. P. Karandikar and Ph. Schnoebelen. On the state complexity of closures and interiors of regular languages with subwords. In Proceedings of the 16th Workshop on Descriptional Complexity of Formal Systems (DCFS'14), volume 8614 of Lecture Notes in Computer Science, pages 234--245, Turku, Finland, August 2014. Springer-Verlag. [SLS+14] Y. Sun, G. Lipari, R. Soulat, L. Fribourg, and N. Markey. Component-Based Analysis of Hierarchical Scheduling using Linear Hybrid Automata. In Proceedings of the 20th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'14), Chongqing, China, August 2014. IEEE Computer Society Press. doi: 10.1109/RTCSA.2014.6910502. S. Demri and M. Deters. The effects of modalities in separation logics (extended abstract). In Proceedings of the 10th Conference on Advances in Modal Logics (AiML'14), pages 134--138, Groningen, The Netherlands, August 2014. College Publications. S. Demri, D. Kapur, and C. Weidenbach, editors. Proceedings of the 7th International Joint Conference on Automated Reasoning (IJCAR'14), volume 8562 of Lecture Notes in Computer Science, Vienna, Austria, July 2014. Springer. [CKM14] M. Cadilhac, A. Krebs, and P. McKenzie. Extremely uniform branching programs. In Proceedings of the 6th Workshop on Non-Classical Models of Automata and Applications (NCMA'14), volume 304 of books@ocg.at, pages 73--83, Kassel, Germany, July 2014. Austrian Computer Society. [BFS14] F. Bouchy, A. Finkel, and P. San Pietro. Dense-choice Counter Machines Revisited. Theoretical Computer Science, 542:17--31, July 2014. K. Chatterjee and L. Doyen. Games with a Weak Adversary. In Proceedings of the 41st International Colloquium on Automata, Languages and Programming (ICALP'14) -- Part II, volume 8573 of Lecture Notes in Computer Science, pages 110--121, Copenhagen, Denmark, July 2014. Springer. M. Blondin, A. Finkel, and P. McKenzie. Handling Infinitely Branching WSTS. In Proceedings of the 41st International Colloquium on Automata, Languages and Programming (ICALP'14) -- Part II, volume 8573 of Lecture Notes in Computer Science, pages 13--25, Copenhagen, Denmark, July 2014. Springer. S. Demri and M. Deters. Expressive Completeness of Separation Logic With Two Variables and No Separating Conjunction. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press. [BGMZ14a] B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. Logical Characterization of Weighted Pebble Walking Automata. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press. C. Haase. Subclasses of Presburger Arithmetic and the Weak EXP Hierarchy. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press. B. Bollig. Logic for Communicating Automata with Parameterized Topology. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press. S. Schmitz. Implicational Relevance Logic is 2-ExpTime-Complete. In Proceedings of the Joint 25th International Conference on Rewriting Techniques and Applications and 12th International Conference on Typed Lambda-Calculi and Applications (RTA/ TLCA'14), volume 8560 of Lecture Notes in Computer Science, pages 395--409, Vienna, Austria, July 2014. Springer. R. Lazić and S. Schmitz. Non-Elementary Complexities for Branching VASS, MELL, and Extensions. In Proceedings of the Joint Meeting of the 23rd EACSL Annual Conference on Computer Science Logic and the 29th Annual ACM/ IEEE Symposium on Logic In Computer Science (CSL/LICS'14), Vienna, Austria, July 2014. ACM Press. J. Goubault-Larrecq. OrchIDS: on the value of rigor in intrusion detection. CPS Summer School, Grenoble, France, July 2014. A. Durand, N. Schweikardt, and L. Segoufin. Enumerating answers to first-order queries over databases of low degree. In Proceedings of the 33rd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'14), pages 121--131, Snowbird, Utah, USA, June 2014. ACM Press. [JLMX14] S. Jaziri, K. G. Larsen, R. Mardare, and B. Xue. Adequacy and Complete Axiomatization for Timed Modal Logic. In Proceedings of the 30th Conference on Mathematical Foundations of Programming Semantics (MFPS'14), volume 308 of Electronic Notes in Theoretical Computer Science, pages 183--210, Ithaca, New York, USA, June 2014. Elsevier Science Publishers. J. Goubault-Larrecq and A. Jung. QRB, QFS, and the Probabilistic Powerdomain. In Proceedings of the 30th Conference on Mathematical Foundations of Programming Semantics (MFPS'14), volume 308 of Electronic Notes in Theoretical Computer Science, pages 167--182, Ithaca, New York, USA, June 2014. Elsevier Science Publishers. [ADK14] M. Arapinis, S. Delaune, and S. Kremer. Dynamic Tags for Security Protocols. Logical Methods in Computer Science, 10(2:11), June 2014. A. Finkel and J. Leroux. Neue, einfache Algorithmen für Petrinetze. Informatik Spektrum, 37(3):229--236, June 2014. [KH14] F. Kordon and F. Hulin-Hubard. BenchKit, a Tool for Massive Concurrent Benchmarking. In Proceedings of the 14th International Conference on Application of Concurrency to System Design (ACSD'14), pages 159--165, Tunis, Tunisia, June 2014. IEEE Computer Society Press. V. Germanos, S. Haar, V. Khomenko, and S. Schwoon. Diagnosability under Weak Fairness. In Proceedings of the 14th International Conference on Application of Concurrency to System Design (ACSD'14), pages 132--141, Tunis, Tunisia, June 2014. IEEE Computer Society Press. doi: 10.1109/ACSD.2014.9. S. Demri, D. Galmiche, D. Larchey-Wendling, and D. Méry. Separation Logic with One Quantified Variable. In Proceedings of the 9th International Computer Science Symposium in Russia (CSR'14), volume 8476 of Lecture Notes in Computer Science, pages 125--138, Moscow, Russia, June 2014. Springer. J. Goubault-Larrecq. Exponentiable streams and prestreams. Applied Categorical Structures, 22(3):515--549, June 2014. Errata 1: http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum.pdf; Errata 2: http://www.lsv.fr/Publis/PAPERS/PDF/GL-acs13-erratum2.pdf. F. Kordon, H. Garavel, L.-M. Hillah, F. Hulin-Hubard, A. Linard, M. Beccuti, S. Evangelista, A. Hamez, N. Lohmann, E. Lopez, E. Paviot-Adet, C. Rodriguez, C. Rohr, and J. Srba. Results for the MCC @ Petri Nets 2014, June 2014. [FFL+14] G. Feld, L. Fribourg, D. Labrousse, B. Revol, and R. Soulat. Correct-by-design Control Synthesis for Multilevel Converters using State Space Decomposition. In Proceedings of the 2nd French-Singaporean Workshop on Formal Methods and Applications (FSFMA'14), volume 156 of Electronic Proceedings in Theoretical Computer Science, pages 5--16, Singapore, May 2014. [MV14a] N. Markey and S. Valette. Annual report for Year 1. Cassting deliverable D6.2 (FP7-ICT-601148), May 2014. 38 pages. P. Gastin and B. Monmege. Adding Pebbles to Weighted Automata -- Easy Specification & Efficient Evaluation. Theoretical Computer Science, 534:24--44, May 2014. [GLSM14b] J. Goubault-Larrecq, P.-A. Sentucq, and F. Majorczyk. Techniques et méthodes de génération de signatures pour la détection d'intrusions. Fourniture 2 du contrat DGA-INRIA Orchids, May 2014. [GLSM14a] J. Goubault-Larrecq, P.-A. Sentucq, and F. Majorczyk. Politiques de sécurité système. Fourniture 1 du contrat DGA-INRIA Orchids, May 2014. [SLAF14] Y. Sun, G. Lipari, É. André, and L. Fribourg. Toward Parametric Timed Interfaces for Real-Time Components. In Proceedings of the 1st International Workshop on Synthesis of Continuous Parameters (SYNCOP'14), volume 145 of Electronic Proceedings in Theoretical Computer Science, pages 49--64, Grenoble, France, April 2014. K. Chatterjee and L. Doyen. Partial-Observation Stochastic Games: How to Win when Belief Fails. ACM Transactions on Computational Logic, 15(2:16), April 2014. [SL14] Y. Sun and G. Lipari. A Weak Simulation Relation for Real-Time Schedulability Analysis of Global Fixed Priority Scheduling Using Linear Hybrid Automata. Research Report LSV-14-06, Laboratoire Spécification et Vérification, ENS Cachan, France, April 2014. 17 pages. [CDNV14] K. Chatterjee, L. Doyen, S. Nain, and M. Y. Vardi. The Complexity of Partial-Observation Stochastic Parity Games with Finite-Memory Strategies. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 242--257, Grenoble, France, April 2014. Springer. [CDGO14] K. Chatterjee, L. Doyen, H. Gimbert, and Y. Oualhadj. Perfect-Information Stochastic Mean-Payoff Parity Games. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 210--225, Grenoble, France, April 2014. Springer. [DMS14a] L. Doyen, Th. Massart, and M. Shirmohammadi. Limit Synchronization in Markov Decision Processes. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 58--72, Grenoble, France, April 2014. Springer. [Mar14] N. Markey. Cassting: Synthesizing Complex Systems Using Non-Zero-Sum Games. ERCIM News, 97:25--26, April 2014. D. Baelde, S. Delaune, and L. Hirschi. A reduced semantics for deciding trace equivalence using constraint systems. In Proceedings of the 3rd International Conference on Principles of Security and Trust (POST'14), volume 8414 of Lecture Notes in Computer Science, pages 1--21, Grenoble, France, April 2014. Springer. [BM14a] D. Berwanger and A. B. Mathew. Games with Recurring Certainty. In Proceedings of the 2nd International Workshop on Strategic Reasoning (SR'14), volume 146 of Electronic Proceedings in Theoretical Computer Science, pages 91--96, Grenoble, France, April 2014. [CDFR14b] K. Chatterjee, L. Doyen, E. Filiot, and J.-F. Raskin. Doomsday Equilibria for Omega-Regular Games. In Proceedings of the 2nd International Workshop on Strategic Reasoning (SR'14), volume 146 of Electronic Proceedings in Theoretical Computer Science, pages 43--48, Grenoble, France, April 2014. P. Bouyer, N. Markey, and S. Vester. Nash Equilibria in Symmetric Games with Partial Observation. In Proceedings of the 2nd International Workshop on Strategic Reasoning (SR'14), volume 146 of Electronic Proceedings in Theoretical Computer Science, pages 49--55, Grenoble, France, April 2014. [AGH+14] T. Antonopoulos, N. Gorogiannis, C. Haase, M. Kanovich, and J. Ouaknine. Foundations for Decision Problems in Separation Logic with General Inductive Predicates. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 411--425, Grenoble, France, April 2014. Springer. [BFH+14] N. Bertrand, É. Fabre, S. Haar, S. Haddad, and L. Hélouët. Active diagnosis for probabilistic systems. In Proceedings of the 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), volume 8412 of Lecture Notes in Computer Science, pages 29--42, Grenoble, France, April 2014. Springer. [ABG+14b] S. Akshay, B. Bollig, P. Gastin, M. Mukund, and K. Narayan Kumar. Distributed Timed Automata with Independently Evolving Clocks. Fundamenta Informaticae, 130(4):377--407, April 2014. doi: 10.3233/FI-2014-996. [BGMZ14b] B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. Pebble Weighted Automata and Weighted Logics. ACM Transactions on Computational Logic, 15(2:15), April 2014. [MBL14] N. Markey, Th. Brihaye, and K. G. Larsen. Robustness of collective adaptive systems. Cassting deliverable D3.1 (FP7-ICT-601148), March 2014. 17 pages. [BM14b] Th. Brihaye and N. Markey. Solution concepts for collective adaptive systems. Cassting deliverable D1.4 (FP7-ICT-601148), March 2014. 13 pages. L. Segoufin. A glimpse on constant delay enumeration. In Proceedings of the 31st Annual Symposium on Theoretical Aspects of Computer Science (STACS'14), volume 25 of Leibniz International Proceedings in Informatics, pages 13--27, Lyon, France, March 2014. Leibniz-Zentrum für Informatik. [ADV14] S. Abiteboul, D. Deutch, and V. Vianu. Deduction with Contradictions in Datalog. In Proceedings of the 17th International Conference on Database Theory (ICDT'14), pages 143--154, Athens, Greece, March 2014. doi: 10.5441/002/icdt.2014.17. [EM14] Y. Elias and P. McKenzie. On Generalized Addition Chains. INTEGERS -- Electronic Journal of Combinatorial Number Theory, 14(A16), March 2014. N. Francis, L. Segoufin, and C. Sirangelo. Datalog Rewritings of Regular Path Queries using Views. In Proceedings of the 17th International Conference on Database Theory (ICDT'14), pages 107--118, Athens, Greece, March 2014. [BLM14] P. Bouyer, K. G. Larsen, and N. Markey. Lower-Bound Constrained Runs in Weighted Timed Automata. Performance Evaluation, 73:91--109, March 2014. [HHM14] S. Haddad, R. Hennicker, and M. H. Møller. Specification of Asynchronous Component Systems with Modal IashO-Petri Nets. In Revised Selected Papers of the 8th Symposium on Trustworthy Global Computing (TGC'13), volume 8358 of Lecture Notes in Computer Science, pages 219--234, Buenos Aires, Argentina, March 2014. Springer. A. Finkel. REACHARD -- Compte-rendu intermédiaire. Deliverable D3 Reachard (ANR-11-BS02-001), February 2014. 18 pages. [Bra14] J. Brault-Baron. Hypergraph Acyclicity Revisited. Research Report 1403.7076, Computing Research Repository, February 2014. 32 pages. [Sou14] R. Soulat. Synthesis of Correct-by-Design Schedulers for Hybrid Systems. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2014. L. Fribourg, É. Goubault, S. Mohamed, S. Putot, and R. Soulat. Synthesis of robust boundary control for systems governed by semi-discrete differential equations. Research Report LSV-14-03, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2014. 8 pages. [SBM14] O. Sankur, P. Bouyer, and N. Markey. Shrinking Timed Automata. Information and Computation, 234:107--132, February 2014. [KL14] S. Kumar and G. Lipari. Latency Analysis of Network-On-Chip-based Many-Core Processors. In Proceedings of the 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP'14), pages 432--439, Turin, Italy, February 2014. IEEE Computer Society Press. doi: 10.1109/PDP.2014.107. [ABG+14a] A. Adjé, O. Bouissou, J. Goubault-Larrecq, É. Goubault, and S. Putot. Static Analysis of Programs with Imprecise Probabilistic Inputs. In Revised Selected Papers of the 5th IFIP TC2/WG2.3 Conference Verified Software---Theories, Tools, and Experiments (VSTTE'13), volume 8164 of Lecture Notes in Computer Science, pages 22--47, Atherton, California, USA, 2014. Springer. [BFHP14] L. Bernardinello, C. Ferigato, S. Haar, and L. Pomello. Closed Sets in Occurrence Nets with Conflicts. Fundamenta Informaticae, 133(4):323--344, 2014. [KHY14] M. Koutny, S. Haddad, and A. Yakovlev, editors. Transactions on Petri Nets and Other Models of Concurrency IX, volume 8910 of Lecture Notes in Computer Science. Springer, 2014. Th. Chatain and S. Haar. A Canonical Contraction for Safe Petri Nets. In Transactions on Petri Nets and Other Models of Concurrency IX, volume 8910 of Lecture Notes in Computer Science, pages 83--98. Springer, 2014. J. Goubault-Larrecq and R. Segala. Random Measurable Selections. In Horizons of the Mind. A Tribute to Prakash Panangaden, volume 8464 of Lecture Notes in Computer Science, pages 343--362. Springer, 2014. [CDFR14a] K. Chatterjee, L. Doyen, E. Filiot, and J.-F. Raskin. Doomsday Equilibria for Omega-Regular Games. In Proceedings of the 15th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'14), volume 8318 of Lecture Notes in Computer Science, pages 78--97, San Diego, California, USA, January 2014. Springer. [Cyr14] A. Cyriac. Verification of Communicating Recursive Programs via Split-width. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2014. [BCG+14] D. Baelde, K. Chaudhuri, A. Gacek, D. Miller, G. Nadathur, A. Tiu, and Y. Wang. Abella: A System for Reasoning about Relational Specifications. Journal of Formalized Reasoning, 7(2):1--89, 2014. doi: 10.6092/issn.1972-5787/4650. [Cha13] Th. Chatain. Concurrency in Real-Time Distributed Systems, from Unfoldings to Implementability. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, December 2013. [Rod13] C. Rodríguez. Verification Based on Unfoldings of Petri Nets with Read Arcs. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2013. S. Schwoon. Efficient verification of sequential and concurrent systems. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, December 2013. [Ant13] É. Antoine. Distributed data management with a declarative rule-based language: Webdamlog. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2013. [BLBL13] M. Bambagini, J. Lelli, G. Buttazzo, and G. Lipari. On the Energy-Aware Partitioning of Real-Time Tasks on Homogeneous Multi-Processor Systems. In Proceedings of the 4th International Conference on Energy-Aware Computing Systems and Applications (ICEAC'14),, pages 69--74, Istanbul, Turkey, December 2013. IEEE Circuits and Systems Society. doi: 10.1109/ICEAC.2013.6737640. S. Haar, S. Haddad, T. Melliti, and S. Schwoon. Optimal Constructions for Active Diagnosis. In Proceedings of the 33rd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'13), volume 24 of Leibniz International Proceedings in Informatics, pages 527--539, Guwahati, India, December 2013. Leibniz-Zentrum für Informatik. [EJS13] J. Esparza, L. Jezequel, and S. Schwoon. Computation of summaries using net unfoldings. In Proceedings of the 33rd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'13), volume 24 of Leibniz International Proceedings in Informatics, pages 225--236, Guwahati, India, December 2013. Leibniz-Zentrum für Informatik. [CDKR13] C. Chevalier, S. Delaune, S. Kremer, and M. D. Ryan. Composition of Password-based Protocols. Formal Methods in System Design, 43(3):369--413, December 2013. [BS13c] D. Berwanger and O. Serre. Théorie des jeux en informatique. Technique et Science Informatiques, 32(9-10), December 2013. [BC13a] S. Balaguer and Th. Chatain. Avoiding Shared Clocks in Networks of Timed Automata. Logical Methods in Computer Science, 9(4:13), November 2013. doi: 10.2168/LMCS-9(4:13)2013. R. Chrétien and S. Delaune. La protection des informations sensibles. Pour La Science, 433:70--77, November 2013. H. Ponce de León, S. Haar, and D. Longuet. Unfolding-based Test Selection for Concurrent Conformance. In Proceedings of the 25th IFIP International Conference on Testing Software and Systems (ICTSS'13), Lecture Notes in Computer Science, pages 98--113, Istanbul, Turkey, November 2013. Springer. [KS13c] W. Kazana and L. Segoufin. Enumeration of monadic second-order queries on trees. ACM Transactions on Computational Logic, 14(4), November 2013. [CFM13] M. Cadilhac, A. Finkel, and P. McKenzie. Unambiguous Contrained Automata. International Journal of Foundations of Computer Science, 24(7):1099--1116, November 2013. [BS13a] N. Bertrand and Ph. Schnoebelen. Computable fixpoints in well-structured symbolic model checking. Formal Methods in System Design, 43(2):233--267, October 2013. [MLS+13] N. Markey, K. G. Larsen, A. Skou, D. Lux, J. Rozenkilde, K. L. Pedersen, and S. M. Sørensen. Description of case studies. Cassting deliverable D4.1 (FP7-ICT-601148), October 2013. 19 pages. B. Monmege. Spécification et vérification de propriétés quantitatives : expressions, logiques, et automates. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2013. [PLML13] A. Parri, J. Lelli, M. Marinoni, and G. Lipari. Design and Implementation of the Multiprocessor Bandwidth Inheritance Protocol on Linux. In Proceedings of the 15th Real-Time Linux Workshop (RTLWS'13), pages 41--54, Lugano-Manno, Switzerland, October 2013. Open Source Automation Development Lab (OSADL). [SSL+13] Y. Sun, R. Soulat, G. Lipari, É. André, and L. Fribourg. Parametric Schedulability Analysis of Fixed Priority Real-Time Distributed Systems. In Preproceedings of the 2nd International Workshop on Formal Techniques for Safety-Critical Systems (FTSCS'13), pages 179--194, Queenstown, New Zealand, October 2013. [PBB13] H. Ponce de León, G. Bonigo, and L. Brandán Briones. Distributed Analysis of Diagnosability in Concurrent Systems. In Proceedings of the 24th International Workshop on Principles of Diagnosis (DX'13), Jerusalem, Israel, October 2013. [ABD+13] É. André, B. Barbot, C. Démoulins, L. M. Hillah, F. Hulin-Hubard, F. Kordon, A. Linard, and L. Petrucci. A Modular Approach for Reusing Formalisms in Verification Tools of Concurrent Systems. In Proceedings of the 15th International Conference on Formal Engineering Methods (ICFEM'13), Lecture Notes in Computer Science, pages 199--214, Queenstown, New Zealand, October-November 2013. Springer. [BDG+13] Th. Brihaye, L. Doyen, G. Geeraerts, J. Ouaknine, J.-F. Raskin, and J. Worrell. Time-Bounded Reachability for Monotonic Hybrid Automata: Complexity and Fixed Points. In Proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis (ATVA'13), volume 8172 of Lecture Notes in Computer Science, pages 55--70, Hanoi, Vietnam, October 2013. Springer. K. Chatterjee, L. Doyen, M. Randour, and J.-F. Raskin. Looking at Mean-Payoff and Total-Payoff through Windows. In Proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis (ATVA'13), volume 8172 of Lecture Notes in Computer Science, pages 118--132, Hanoi, Vietnam, October 2013. Springer. [RS13a] C. Rodríguez and S. Schwoon. Cunf: A Tool for Unfolding and Verifying Petri Nets with Read Arcs. In Proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis (ATVA'13), volume 8172 of Lecture Notes in Computer Science, pages 492--495, Hanoi, Vietnam, October 2013. Springer. [AFS13a] É. André, L. Fribourg, and R. Soulat. Merge and Conquer: State Merging in Parametric Timed Automata. In Proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis (ATVA'13), volume 8172 of Lecture Notes in Computer Science, pages 381--396, Hanoi, Vietnam, October 2013. Springer. K. Chatterjee, L. Doyen, and Th. A. Henzinger. A survey of partial-observation stochastic parity games. Formal Methods in System Design, 43(2):268--284, October 2013. [GO13] J. Goubault-Larrecq and J. Olivain. On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case. In Revised Selected Papers of the 6th International Symposium on Foundations and Practice of Security (FPS'13), volume 8352 of Lecture Notes in Computer Science, pages 3--16, La Rochelle, France, October 2013. Springer. [AV13b] S. Abiteboul and V. Vianu. Models for Data-Centric Workflows. In In Search of Elegance in the Theory and Practice of Computation -- Essays Dedicated to Peter Buneman, volume 8000 of Lecture Notes in Computer Science, pages 1--12. Springer, September 2013. [tCS13] B. ten Cate and L. Segoufin. Unary negation. Logical Methods in Computer Science, 9(3:25), September 2013. [BCMV13] R. Bonnet, R. Chadha, P. Madhusudan, and M. Viswanathan. Reachability under contextual locking. Logical Methods in Computer Science, 9(3:21), September 2013. [BL13b] G. Buttazzo and G. Lipari. Ptask: An Educational C Library for Programming Real-Time Systems on Linux. In Proceedings of the 18th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA'13), Cagliari, Italy, September 2013. IEEE Industrial Electronics Society. doi: 10.1109/ETFA.2013.6648001. [Bro13] R. Brochenin. Separation Logic: Expressiveness, Complexity, Temporal Extension. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2013. [Kaz13] W. Kazana. Query Evaluation with Constant Delay. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2013. [Hir13a] L. Hirschi. Réduction d'entrelacements pour l'équivalence de traces. Research Report LSV-13-13, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2013. 22 pages. [BMS13b] P. Bouyer, N. Markey, and O. Sankur. Robustness in timed automata. In Proceedings of the 7th Workshop on Reachability Problems in Computational Models (RP'13), volume 8169 of Lecture Notes in Computer Science, pages 1--18, Uppsala, Sweden, September 2013. Springer. J. Reichert. On The Complexity of Counter Reachability Games. In Proceedings of the 7th Workshop on Reachability Problems in Computational Models (RP'13), volume 8169 of Lecture Notes in Computer Science, pages 196--208, Uppsala, Sweden, September 2013. Springer. B. Bérard, S. Haddad, A. Jovanovic, and D. Lime. Parametric Interrupt Timed Automata. In Proceedings of the 7th Workshop on Reachability Problems in Computational Models (RP'13), volume 8169 of Lecture Notes in Computer Science, pages 59--69, Uppsala, Sweden, September 2013. Springer. [FS13c] L. Fribourg and R. Soulat. Stability Controllers for Sampled Switched Systems. In Proceedings of the 7th Workshop on Reachability Problems in Computational Models (RP'13), volume 8169 of Lecture Notes in Computer Science, pages 135--145, Uppsala, Sweden, September 2013. Springer. [SHL+13] R. Soulat, G. Hérault, D. Labrousse, B. Revol, G. Feld, S. Lefebvre, and L. Fribourg. Use of a full wave correct-by-design command to control a multilevel modular converter. In Proceedings of the 15th European Conference on Power Electronics and Applications (EPE'13), Lille, France, September 2013. IEEE Power Electronics Society. doi: 10.1109/EPE.2013.6634448. S. Kremer, R. Künnemann, and G. Steel. Universally Composable Key-Management. In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS'13), volume 8134 of Lecture Notes in Computer Science, pages 327--344, Egham, U.K., September 2013. Springer. [AtCK13] S. Abiteboul, B. ten Cate, and Y. Katsis. On the equivalence of distributed systems with queries and communication. Journal of Computer and System Sciences, 79(6):739--762, September 2013. [BDD13] C. Barrett, S. Demri, and M. Deters. Witness runs for counter machines. In Proceedings of the 9th International Symposium on Frontiers of Combining Systems (FroCoS'13), volume 8152 of Lecture Notes in Artificial Intelligence, pages 120--150, Nancy, France, September 2013. Springer. D. Stan. Équilibres mixtes dans les jeux concurrents. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2013. 29 pages. [BF13] V. Braberman and L. Fribourg, editors. Proceedings of the 11th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'13), volume 8053 of Lecture Notes in Computer Science, Buenos Aires, Argentina, August 2013. Springer. [BL13a] S. Benedetto and G. Lipari. ADOK: A Minimal Object Oriented Real-Time Operating System in C++. In Proceedings of the 3rd Embedded Operating Systems Workshop (EWiLi'13), Toulouse, France, August 2013. J. Goubault-Larrecq. A Constructive Proof of the Topological Kruskal Theorem. In Proceedings of the 38th International Symposium on Mathematical Foundations of Computer Science (MFCS'13), volume 8087 of Lecture Notes in Computer Science, pages 22--41, Klosterneuburg, Austria, August 2013. Springer. F. Laroussinie and N. Markey. Satisfiability of ATL with strategy contexts. In Proceedings of the 4th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'13), volume 119 of Electronic Proceedings in Theoretical Computer Science, pages 208--223, Borca di Cadore, Italy, August 2013. [SS13] S. Schmitz and Ph. Schnoebelen. The Power of Well-Structured Systems. In Proceedings of the 24th International Conference on Concurrency Theory (CONCUR'13), volume 8052 of Lecture Notes in Computer Science, pages 5--24, Buenos Aires, Argentina, August 2013. Springer. [ABHH13] S. Akshay, N. Bertrand, S. Haddad, and L. Hélouët. The steady-state control problem for Markov decision processes. In Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST'13), pages 290--304, Buenos Aires, Argentina, August 2013. IEEE Computer Society Press. [CJ13] Th. Chatain and C. Jard. Back in Time Petri Nets. In Proceedings of the 11th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'13), volume 8053 of Lecture Notes in Computer Science, pages 91--105, Buenos Aires, Argentina, August 2013. Springer. [BMS13a] P. Bouyer, N. Markey, and O. Sankur. Robust Weighted Timed Automata and Games. In Proceedings of the 11th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'13), volume 8053 of Lecture Notes in Computer Science, pages 31--46, Buenos Aires, Argentina, August 2013. Springer. C. Haase, S. Schmitz, and Ph. Schnoebelen. The Power of Priority Channel Systems. In Proceedings of the 24th International Conference on Concurrency Theory (CONCUR'13), volume 8052 of Lecture Notes in Computer Science, pages 319--333, Buenos Aires, Argentina, August 2013. Springer. [SBMR13] O. Sankur, P. Bouyer, N. Markey, and P.-A. Reynier. Robust Controller Synthesis in Timed Automata. In Proceedings of the 24th International Conference on Concurrency Theory (CONCUR'13), volume 8052 of Lecture Notes in Computer Science, pages 546--560, Buenos Aires, Argentina, August 2013. Springer. [FGH13] A. Finkel, S. Göller, and C. Haase. Reachability in Register Machines with Polynomial Updates. In Proceedings of the 38th International Symposium on Mathematical Foundations of Computer Science (MFCS'13), volume 8087 of Lecture Notes in Computer Science, pages 409--420, Klosterneuburg, Austria, August 2013. Springer. [ BibTex | DOI | Web page | PS | PDF ] [Dem13] S. Demri. On selective unboundedness of VASS. Journal of Computer and System Sciences, 79(5):689--713, August 2013. [Hir13b] L. Hirschi. Reduction of interleavings for trace equivalence checking of security protocols. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2013. [Fan13] E. Fang. Permissive multi-strategies in timed games. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, August 2013. [GLS13a] A. Gheerbrant, L. Libkin, and C. Sirangelo. Reasoning About Pattern-Based XML Queries. In Proceedings of the 7th International Conference on Web Reasoning and Rule Systems (WRRS'13), volume 7994 of Lecture Notes in Computer Science, pages 4--18, Mannheim, Germany, July 2013. Springer. [FS13a] L. Fribourg and R. Soulat. Control of Switching Systems by Invariance Analysis: Application to Power Electronics. Wiley-ISTE, July 2013. 144 pages. [RS13b] C. Rodríguez and S. Schwoon. An Improved Construction of Petri Net Unfoldings. In Proceedings of the 1st French-Singaporean Workshop on Formal Methods and Applications (FSFMA'13), volume 31 of Open Access Series in Informatics, pages 47--52, Singapore, July 2013. Leibniz-Zentrum für Informatik. doi: 10.4230/OASIcs.FSFMA.2013.47. [HMY13] S. Haddad, L. Mokdad, and S. Youcef. Bounding models families for performance evaluation in composite Web services. Journal of Computational Science, 4(4):232--241, July 2013. doi: 10.1016/j.jocs.2011.11.003. S. Demri, A. K. Dhar, and A. Sangnier. On the Complexity of Verifying Regular Properties on Flat Counter Systems. In Proceedings of the 40th International Colloquium on Automata, Languages and Programming (ICALP'13) -- Part II, volume 7966 of Lecture Notes in Computer Science, pages 162--173, Riga, Latvia, July 2013. Springer. L. Fribourg. Control of Switching Systems by Invariance Analysis (Invited Talk). In Proceedings of the 1st French-Singaporean Workshop on Formal Methods and Applications (FSFMA'13), volume 31 of Open Access Series in Informatics, page 1, Singapore, July 2013. Leibniz-Zentrum für Informatik. doi: 10.4230/OASIcs.FSFMA.2013.1. L. Fribourg, U. Kühne, and R. Soulat. Constructing Attractors of Nonlinear Dynamical Systems by State Space Decomposition. In Proceedings of the 1st French-Singaporean Workshop on Formal Methods and Applications (FSFMA'13), volume 31 of Open Access Series in Informatics, pages 53--60, Singapore, July 2013. Leibniz-Zentrum für Informatik. [AHH+13] É. André, L. M. Hillah, F. Hulin-Hubard, F. Kordon, Y. Lembachar, A. Linard, and L. Petrucci. CosyVerif: An Open Source Extensible Verification Environment. In Proceedings of the 18th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'13), pages 33--36, Singapore, July 2013. IEEE Computer Society Press. doi: 10.1109/ICECCS.2013.15. [HRS13] S. Haar, C. Rodríguez, and S. Schwoon. Reveal Your Faults: It's Only Fair! In Proceedings of the 13th International Conference on Application of Concurrency to System Design (ACSD'13), pages 120--129, Barcelona, Spain, July 2013. IEEE Computer Society Press. [HKS13] S. Haar, C. Kern, and S. Schwoon. Computing the Reveals Relation in Occurrence Nets. Theoretical Computer Science, 493:66--79, July 2013. [McK13] P. McKenzie. Can chimps go it alone? In Proceedings of the 15th Workshop on Descriptional Complexity of Formal Systems (DCFS'13), volume 8031 of Lecture Notes in Computer Science, page 17, London, Ontario, Canada, July 2013. Springer-Verlag. R. Chrétien, V. Cortier, and S. Delaune. From security protocols to pushdown automata. In Proceedings of the 40th International Colloquium on Automata, Languages and Programming (ICALP'13) -- Part II, volume 7966 of Lecture Notes in Computer Science, pages 137--149, Riga, Latvia, July 2013. Springer. [CCP13] V. Cheval, V. Cortier, and A. Plet. Lengths may break privacy ---or how to check for equivalences with length. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in Computer Science, pages 708--723, Saint Petersburg, Russia, July 2013. Springer. [HIOP13] C. Haase, S. Ishtiaq, J. Ouaknine, and M. Parkinson. SeLoger: A Tool for Graph-Based Reasoning in Separation Logic. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in Computer Science, pages 790--795, Saint Petersburg, Russia, July 2013. Springer. [San13b] O. Sankur. Shrinktech: A Tool for the Robustness Analysis of Timed Automata. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in Computer Science, pages 1006--1012, Saint Petersburg, Russia, July 2013. Springer. [Bre13] R. Brenguier. PRALINE: A Tool for Computing Nash Equilibria in Concurrent Games. In Proceedings of the 25th International Conference on Computer Aided Verification (CAV'13), volume 8044 of Lecture Notes in Computer Science, pages 890--895, Saint Petersburg, Russia, July 2013. Springer. J. Goubault-Larrecq. A few pearls in the theory of quasi-metric spaces. Invited talk (semi-plenary speaker), Summer Topology Conference, North Bay, Ontario, CA, July 2013. [Gou13e] J. Goubault-Larrecq. A short proof of the Schröder-Simpson theorem. Invited talk, Workshop on Asymmetric Topology, Summer Topology Conference, North Bay, Ontario, CA, July 2013. S. Akshay, B. Bollig, and P. Gastin. Event-clock Message Passing Automata: A Logical Characterization and an Emptiness-Checking Algorithm. Formal Methods in System Design, 42(3):262--300, June 2013. P. Gastin and N. Sznajder. Fair Synthesis for Asynchronous Distributed Systems. ACM Transactions on Computational Logic, 14(2:9), June 2013. [AAM+13] S. Abiteboul, É. Antoine, G. Miklau, J. Stoyanovich, and J. Testard. Rule-based application development using Webdamlog. In Proceedings of the ACM SIGMOD Internaitonal Conference on Management of Data (SIGMOD'13), pages 965--968, New York, New York, USA, June 2013. ACM Press. K. Bansal and S. Demri. Model-checking bounded multi-pushdown systems. In Proceedings of the 8th International Computer Science Symposium in Russia (CSR'13), volume 7913 of Lecture Notes in Computer Science, pages 405--417, Ekaterinburg, Russia, June 2013. Springer. [VM13a] S. Valette and N. Markey. Cassting website. Cassting deliverable D6.1 (FP7-ICT-601148), June 2013. 10 pages. Th. Chatain and S. Haar. A Canonical Contraction for Safe Petri Nets. In Proceedings of the 7th International Workshop on Petri Nets and Software Engineering (PNSE'13), volume 969 of CEUR Workshop Proceedings, pages 25--39, Milano, Italy, June 2013. RWTH Aachen, Germany. [GHPR13] G. Geeraerts, A. Heußner, M. Praveen, and J.-F. Raskin. ω-Petri nets. In Proceedings of the 34th International Conference on Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927 of Lecture Notes in Computer Science, pages 49--69, Milano, Italy, June 2013. Springer. [BST13] M. Bojańczyk, L. Segoufin, and S. Toruńczyk. Verification of Database-driven Systems via Amalgamation. In Proceedings of the 32nd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'13), pages 63--74, New York, New York, USA, June 2013. ACM Press. [GLS13b] A. Gheerbrant, L. Libkin, and C. Sirangelo. When is Naïve Evaluation Possible? In Proceedings of the 32nd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'13), pages 75--86, New York, New York, USA, June 2013. ACM Press. [AV13a] S. Abiteboul and V. Vianu. Collaborative Data-Driven Workflows: Think Global, Act Local. In Proceedings of the 32nd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'13), pages 91--102, New York, New York, USA, June 2013. ACM Press. W. Kazana and L. Segoufin. Enumeration of First-Order Queries on Classes of Structures With Bounded Expansion. In Proceedings of the 32nd Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'13), pages 297--308, New York, New York, USA, June 2013. ACM Press. V. Cheval, V. Cortier, and S. Delaune. Deciding equivalence-based properties using constraint solving. Theoretical Computer Science, 492:1--39, June 2013. [CCS13] H. Comon-Lundh, V. Cortier, and G. Scerri. Tractable inference systems: an extension with a deducibility predicate. In Proceedings of the 24th International Conference on Automated Deduction (CADE'13), volume 7898 of Lecture Notes in Artificial Intelligence, pages 91--108, Lake Placid, New York, USA, June 2013. Springer. B. Bollig, D. Kuske, and R. Mennicke. The Complexity of Model Checking Multi-Stack Systems. In Proceedings of the 28th Annual IEEE Symposium on Logic in Computer Science (LICS'13), pages 163--170, New-Orleans, Louisiana, USA, June 2013. IEEE Computer Society Press. S. Demri, D. Figueira, and M. Praveen. Reasoning about Data Repetitions with Counter Systems. In Proceedings of the 28th Annual IEEE Symposium on Logic in Computer Science (LICS'13), pages 33--42, New-Orleans, Louisiana, USA, June 2013. IEEE Computer Society Press. [BS13d] A. Boral and S. Schmitz. Model Checking Parse Trees. In Proceedings of the 28th Annual IEEE Symposium on Logic in Computer Science (LICS'13), pages 153--162, New-Orleans, Louisiana, USA, June 2013. IEEE Computer Society Press. B. Bollig, P. Habermehl, M. Leucker, and B. Monmege. A Fresh Approach to Learning Register Automata. In Proceedings of the 17th International Conference on Developments in Language Theory (DLT'13), volume 7907 of Lecture Notes in Computer Science, pages 118--130, Marne-la-Vallée, France, June 2013. Springer. [RSK13] C. Rodríguez, S. Schwoon, and V. Khomenko. Contextual Merged Processes. In Proceedings of the 34th International Conference on Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927 of Lecture Notes in Computer Science, pages 29--48, Milano, Italy, June 2013. Springer. E. Fraca and S. Haddad. Complexity Analysis of Continuous Petri Nets. In Proceedings of the 34th International Conference on Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927 of Lecture Notes in Computer Science, pages 170--189, Milano, Italy, June 2013. Springer. S. Haddad, R. Hennicker, and M. H. Møller. Channel Properties of Asynchronously Composed Petri Nets. In Proceedings of the 34th International Conference on Applications and Theory of Petri Nets (PETRI NETS'13), volume 7927 of Lecture Notes in Computer Science, pages 369--388, Milano, Italy, June 2013. Springer. [AR13] A. Arul and J. Reichert. The Complexity of Robot Games on the Integer Line. In Proceedings of the 11th International Workshop on Quantitative Aspects of Programming Languages (QAPl'13), volume 117 of Electronic Proceedings in Theoretical Computer Science, pages 132--148, Rome, Italy, June 2013. [BS13b] N. Bertrand and Ph. Schnoebelen. Solving stochastic Büchi games on infinite arenas with a finite attractor. In Proceedings of the 11th International Workshop on Quantitative Aspects of Programming Languages (QAPl'13), volume 117 of Electronic Proceedings in Theoretical Computer Science, pages 116--131, Rome, Italy, June 2013. J. Goubault-Larrecq. OrchIDS, ou : de l'importance de la sémantique. Séminaire DGA Innosciences. DGA, Bagneux, June 2013. [BCH13a] S. Balaguer, Th. Chatain, and S. Haar. Building Occurrence Nets from Reveals Relations. Fundamenta Informaticae, 123(3):245--272, May 2013. [FS13b] L. Fribourg and R. Soulat. Limit Cycles of Controlled Switched Systems: Existence, Stability, Sensitivity. In Proceedings of the 3rd International Workshop on New Computational Methods for Inverse Problems (NCMIP'13), volume 464 of Journal of Physics: Conference Series, Cachan, France, May 2013. IOS Press. doi: 10.1088/1742-6596/464/1/012007. [San13a] O. Sankur. Robustness in Timed Automata: Analysis, Synthesis, Implementation. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2013. [ABB+13] E. G. Amparore, B. Barbot, M. Beccuti, S. Donatelli, and G. Franceschinis. Simulation-based Verification of Hybrid Automata Stochastic Logic Formulas for Stochastic Symmetric Nets. In Proceedings of the 1st ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS'13), pages 253--264, Montreal, Canada, May 2013. ACM Press. [AFS13b] É. André, L. Fribourg, and J. Sproston. An Extension of the Inverse Method to Probabilistic Timed Automata. Formal Methods in System Design, 42(2):119--145, April 2013. [VM13b] S. Valette and N. Markey. Minutes of the Kick-Off Meeting. Cassting deliverable D6.1 (FP7-ICT-601148), April 2013. 9 pages. L. Barguñó, C. Creus, G. Godoy, F. Jacquemard, and C. Vacher. Decidable Classes of Tree Automata Mixing Local and Global Constraints Modulo Flat Theories. Logical Methods in Computer Science, 9(2), April 2013. doi: 10.2168/LMCS-9(2:1)2013. [BCH+13c] B. Bollig, A. Cyriac, L. Hélouët, A. Kara, and Th. Schwentick. Dynamic Communicating Automata and Branching High-Level MSCs. In Proceedings of the 7th International Conference on Language and Automata Theory and Applications (LATA'13), volume 7810 of Lecture Notes in Computer Science, pages 177--189, Bilbao, Spain, April 2013. Springer. doi: 10.1109/REVET.2012.6195253. [CB13] V. Cheval and B. Blanchet. Proving More Observational Equivalences with ProVerif. In Proceedings of the 2nd International Conference on Principles of Security and Trust (POST'13), volume 7796 of Lecture Notes in Computer Science, pages 226--246, Rome, Italy, March 2013. Springer. R. Chrétien and S. Delaune. Formal analysis of privacy for routing protocols in mobile ad hoc networks. In Proceedings of the 2nd International Conference on Principles of Security and Trust (POST'13), volume 7796 of Lecture Notes in Computer Science, pages 1--20, Rome, Italy, March 2013. Springer. [BFHR13] R. Bonnet, A. Finkel, S. Haddad, and F. Rosa-Velardo. Ordinal Theory for Expressiveness of Well-Structured Transition Systems. Information and Computation, 224:1--22, March 2013. J. Goubault-Larrecq. Non-Hausdorff Topology and Domain Theory---Selected Topics in Point-Set Topology, volume 22 of New Mathematical Monographs. Cambridge University Press, March 2013. [BC13b] R. Bonnet and R. Chadha. Bounded Context-Switching and Reentrant Locking. In Proceedings of the 16th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'13), volume 7794 of Lecture Notes in Computer Science, pages 65--80, Rome, Italy, March 2013. Springer. [LGBB13] G. Lipari, L. George, E. Bini, and M. Bertogna. On the Average Complexity of the Processor Demand Analysis for Earliest Deadline Scheduling. In Real-Time Sytems: the past, the present, and the future -- Proceedings of a conference organized in celebration of Professor Alan Burns' sixtieth birthday, pages 75--86, York, UK, March 2013. CreateSpace Independent Publishing Platform. [LB13] G. Lipari and G. Buttazzo. Resource reservation for Mixed Criticality Systems. In Real-Time Sytems: the past, the present, and the future -- Proceedings of a conference organized in celebration of Professor Alan Burns' sixtieth birthday, pages 60--74, York, UK, March 2013. CreateSpace Independent Publishing Platform. [DKN+13] M. Duflot, M. Kwiatkowska, G. Norman, D. Parker, S. Peyronnet, C. Picaronny, and J. Sproston. Practical Applications of Probabilistic Model Checking to Communication Protocols. In Formal Methods for Industrial Critical Systems: A Survey of Applications, chapter 7, pages 133--150. John Wiley & Sons, Ltd. and IEEE Computer Society Press, March 2013. doi: 10.1002/9781118459898.ch7. [ABMW13] S. Abiteboul, P. Bourhis, A. Muscholl, and Z. Wu. Recursive queries on trees and data trees. In Proceedings of the 16th International Conference on Database Theory (ICDT'13), pages 93--104, Genoa, Italy, March 2013. ACM Press. B. Bollig, P. Gastin, and B. Monmege. Weighted Specifications over Nested Words. In Proceedings of the 16th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'13), volume 7794 of Lecture Notes in Computer Science, pages 385--400, Rome, Italy, March 2013. Springer. [BNS13] E. Bertsch, M.-J. Nederhof, and S. Schmitz. On LR Parsing with Selective Delays. In Proceedings of the 22nd International Conference on Compiler Construction (CC'13), volume 7791 of Lecture Notes in Computer Science, pages 244--263, Rome, Italy, March 2013. Springer. P. Karandikar and S. Schmitz. The Parametric Ordinal-Recursive Complexity of Post Embedding Problems. In Proceedings of the 16th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'13), volume 7794 of Lecture Notes in Computer Science, pages 273--288, Rome, Italy, March 2013. Springer. A. Finkel. REACHARD -- Compte-rendu intermédiaire. Deliverable D2 Reachard (ANR-11-BS02-001), March 2013. 9 pages. [BCH+13b] B. Bérard, F. Cassez, S. Haddad, D. Lime, and O. H. Roux. The Expressive Power of Time Petri Nets. Theoretical Computer Science, 474:1--20, February 2013. M. Baudet, V. Cortier, and S. Delaune. YAPA: A generic tool for computing intruder knowledge. ACM Transactions on Computational Logic, 14(1:4), February 2013. [FK13] L. Fribourg and U. Kühne. Parametric Verification and Test Coverage for Hybrid Automata using the Inverse Method. International Journal of Foundations of Computer Science, 24(2):233--249, February 2013. S. Haar and T. Masopust. Languages, Decidability, and Complexity. In Control of Discrete-Event Systems -- Automata and Petri Net Perspectives, volume 433 of Lecture Notes in Control and Information Sciences, pages 23--43. Springer, 2013. doi: 10.1007/978-1-4471-4276-8_2. [HF13] S. Haar and É. Fabre. Diagnosis with Petri Net Unfoldings. In Control of Discrete-Event Systems -- Automata and Petri Net Perspectives, volume 433 of Lecture Notes in Control and Information Sciences, pages 301--318. Springer, 2013. doi: 10.1007/978-1-4471-4276-8_15. [BBL+13] B. Bérard, P. Bouyer, K. G. Larsen, N. Markey, J. Mullins, O. Sankur, M. Sassolas, and C. Thrane. Measuring the robustness. Deliverable ImpRo 3.1, (ANR-10-BLAN-0317), January 2013. 59 pages. P. Bouyer, S. Faucou, S. Haar, A. Jovanivić, D. Lime, N. Markey, O. H. Roux, and O. Sankur. Control tasks for Timed System; Robustness issues. Deliverable ImpRo 5.1, (ANR-10-BLAN-0317), January 2013. 34 pages. [AS13] É. André and R. Soulat. The Inverse Method. Wiley-ISTE, January 2013. 176 pages. [HMN13] S. Haddad, J. Mairesse, and H.-T. Nguyen. Synthesis and Analysis of Product-form Petri Nets. Fundamenta Informaticae, 122(1-2):147--172, 2013. J. Goubault-Larrecq and J.-P. Jouannaud. The Blossom of Finite Semantic Trees. In Programming Logics -- Essays in Memory of Harald Ganzinger, volume 7797 of Lecture Notes in Computer Science, pages 90--122. Springer, January 2013. [Bon13] R. Bonnet. Theory of Well-Structured Transition Systems and Extended Vector-Addition Systems. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2013. [DR13] L. Doyen and A. Rabinovich. Robot games. Research Report LSV-13-02, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2013. 2 pages. S. Haar. What topology tells us about diagnosability in partial order semantics. Discrete Event Dynamic Systems: Theory and Applications, 22(4):383--402, December 2012. doi: 10.1007/s10626-011-0121-z. [CU12] R. Chadha and M. Ummels. The complexity of quantitative information flow in recursive programs. In Proceedings of the 32nd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'12), volume 18 of Leibniz International Proceedings in Informatics, pages 534--545, Hyderabad, India, December 2012. Leibniz-Zentrum für Informatik. [Ben12b] H. Benzina. Enforcing Virtualized Systems Security. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012. [Bal12] S. Balaguer. La concurrence dans les systèmes distribués temps-réel. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012. [FFL+12b] G. Feld, L. Fribourg, D. Labrousse, B. Revol, and R. Soulat. Correct-by-Design Control of 5-level and 7-level Power Converters. Research Report LSV-12-25, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012. 8 pages. L. Fribourg and R. Soulat. Controlled Recurrent Subspaces for Sampled Switched Linear Systems. Research Report LSV-12-24, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012. 11 pages. [Ves12] S. Vester. Symmetric Nash equilibria. Research Report LSV-12-23, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012. 51 pages. [Che12] V. Cheval. Automatic verification of cryptographic protocols: privacy-type properties. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2012. [CFM12b] M. Cadilhac, A. Finkel, and P. McKenzie. Bounded Parikh automata. International Journal of Foundations of Computer Science, 23(8):1691--1710, December 2012. [BGKR12] D. Berwanger, E. Grädel, L. Kaiser, and R. Rabinovich. Entanglement and the complexity of directed graphs. Theoretical Computer Science, 463:2--25, December 2012. [BFP12] R. Bonnet, A. Finkel, and M. Praveen. Extending the Rackoff technique to affine nets. In Proceedings of the 32nd Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'12), volume 18 of Leibniz International Proceedings in Informatics, Hyderabad, India, December 2012. Leibniz-Zentrum für Informatik. [BS12] D. Berwanger and O. Serre. Parity games on undirected graphs. Information Processing Letters, 112(23):928--932, December 2012. P. Gastin and N. Sznajder. Decidability of well-connectedness for distributed synthesis. Information Processing Letters, 112(24):963--968, December 2012. [BDF12] A. Bušić, H. Djafri, and J.-M. Fourneau. Bounded state space truncation and censored Markov chains. In Proceedings of the 51st IEEE Conference on Decision and Control (CDC'12), pages 5828--5833, Maui, Hawaii, USA, December 2012. IEEE Control System Society. [AvMSS12] M. Anderson, D. van Melkebeek, N. Schweikardt, and L. Segoufin. Locality from Circuit Lower Bounds. SIAM Journal on Computing, 41(6):1481--1523, November 2012. doi: 10.1137/110856873. R. Brenguier. Équilibres de Nash dans les Jeux Concurrents -- Application aux Jeux Temporisés. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2012. [BHP12b] B. Barbot, S. Haddad, and C. Picaronny. Importance Sampling for Model Checking of Continuous Time Markov Chains. In Proceedings of the 4th International Conference on Advances in System Simulation (SIMUL'12), pages 30--35, Lisbon, Portugal, November 2012. XPS. K. Chatterjee and L. Doyen. Energy parity games. Theoretical Computer Science, 458:49--60, November 2012. [FLC12] D. Faggioli, G. Lipari, and T. Cucinotta. Analysis and Implementation of the Multiprocessor Bandwidth Inheritance Protocol. Real-Time Systems, 48(6):789--825, November 2012. [DDG12] S. Demri, D. D'Souza, and R. Gascon. Temporal Logics of Repeating Values. Journal of Logic and Computation, 22(5):1059--1096, October 2012. doi: 10.1093/logcom/exr013. [CFM12a] M. Cadilhac, A. Finkel, and P. McKenzie. Affine Parikh automata. RAIRO Informatique Théorique et Applications, 46(4):511--545, October 2012. doi: 10.1051/ita/2012013. [DDMM12] Ph. Darondeau, S. Demri, R. Meyer, and Ch. Morvan. Petri Net Reachability Graphs: Decidability Status of FO Properties. Logical Methods in Computer Science, 8(4:9), October 2012. A. Adjé and J. Goubault-Larrecq. Concrete Semantics of Programs with Non-Deterministic and Random Inputs. Research Report cs.LO/1210.2605, Computing Research Repository, October 2012. 19 pages. [BGMZ12] B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. A Probabilistic Kleene Theorem. In Proceedings of the 10th International Symposium on Automated Technology for Verification and Analysis (ATVA'12), volume 7561 of Lecture Notes in Computer Science, pages 400--415, Thiruvananthapuram, India, October 2012. Springer. [SVMdM12] D. V. Simões De Sousa, H. Viana, N. Markey, and J. A. F. de Macêdo. Querying Trajectories through Model Checking based on Timed Automata. In Proceedings of the 27th Brazilian Symposium on Databases (SBBD'12), São Paulo, Brazil, October 2012. Sociedade Brasileira de Computação. [AGL12] A. Adjé and J. Goubault-Larrecq. Concrete semantics of programs with non-deterministic and random inputs. Fourniture du projet ANR CPP (Confidence, Proofs, and Probabilities), WP 2, version 1, October 2012. [FG12a] A. Finkel and J. Goubault-Larrecq. Forward Analysis for WSTS, Part II: Complete WSTS. Logical Methods in Computer Science, 8(3:28), September 2012. [Abi12b] S. Abiteboul. Sharing Distributed Knowledge on the Web (Invited Talk). In Proceedings of the 21st Annual EACSL Conference on Computer Science Logic (CSL'12), volume 16 of Leibniz International Proceedings in Informatics, pages 6--8, Fontainebleau, France, September 2012. Leibniz-Zentrum für Informatik. [BSS12] M. Bojańczyk, L. Segoufin, and H. Straubing. Piecewise testable tree languages. Logical Methods in Computer Science, 8(3:26), September 2012. R. Chrétien. Trace equivalence of protocols for an unbounded number of sessions. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2012. 30 pages. R. Künnemann and G. Steel. YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM. In Revised Selected Papers of the 8th Workshop on Security and Trust Management (STM'12), volume 7783 of Lecture Notes in Computer Science, pages 257--272, Pisa, Italy, September 2012. Springer. [FLP12] A. Finkel, J. Leroux, and I. Potapov, editors. Proceedings of the 6th International Wokshop on Reachability Problems (RP'12), volume 7550 of Lecture Notes in Computer Science, Bordeaux, France, September 2012. Springer. [SLBC12] R. M. Santos, G. Lipari, E. Bini, and T. Cucinotta. On-line schedulability tests for adaptive reservations in fixed priority scheduling. Real-Time Systems, 48(5):601--634, September 2012. P. Jančar, P. Karandikar, and Ph. Schnoebelen. Unidirectional channel systems can be tested. In Proceedings of the 7th IFIP International Conference on Theoretical Computer Science (IFIP TCS'12), volume 7604 of Lecture Notes in Computer Science, pages 149--163, Amsterdam, The Netherlands, September 2012. Springer. [RS12] C. Rodríguez and S. Schwoon. Verification of Petri Nets with Read Arcs. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 471--485, Newcastle, UK, September 2012. Springer. A. Cyriac, P. Gastin, and K. Narayan Kumar. MSO Decidability of Multi-Pushdown Systems via Split-Width. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 547--561, Newcastle, UK, September 2012. Springer. R. Brenguier, S. Göller, and O. Sankur. A Comparison of Succinctly Represented Finite-State Systems. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 147--161, Newcastle, UK, September 2012. Springer. B. Bérard, S. Haddad, M. Sassolas, and N. Sznajder. Concurrent Games on VASS with Inhibition. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 39--52, Newcastle, UK, September 2012. Springer. S. Balaguer and Th. Chatain. Avoiding Shared Clocks in Networks of Timed Automata. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 100--114, Newcastle, UK, September 2012. Springer. A. Da Costa, F. Laroussinie, and N. Markey. Quantified CTL: expressiveness and model checking. In Proceedings of the 23rd International Conference on Concurrency Theory (CONCUR'12), volume 7454 of Lecture Notes in Computer Science, pages 177--192, Newcastle, UK, September 2012. Springer. [FLMS12] L. Fribourg, D. Lesens, P. Moro, and R. Soulat. Robustness Analysis for Scheduling Problems using the Inverse Method. In Proceedings of the 19th International Symposium on Temporal Representation and Reasoning (TIME'12), pages 73--80, Leicester, UK, September 2012. IEEE Computer Society Press. [BBJM12] P. Bouyer, Th. Brihaye, M. Jurdziński, and Q. Menet. Almost-Sure Model-Checking of Reactive Timed Automata. In Proceedings of the 9th International Conference on Quantitative Evaluation of Systems (QEST'12), pages 138--147, London, UK, September 2012. IEEE Computer Society Press. doi: 10.1109/QEST.2012.10. P. Bouyer, K. G. Larsen, and N. Markey. Lower-Bound Constrained Runs in Weighted Timed Automata. In Proceedings of the 9th International Conference on Quantitative Evaluation of Systems (QEST'12), pages 128--137, London, UK, September 2012. IEEE Computer Society Press. [CFM12c] M. Cadilhac, A. Finkel, and P. McKenzie. Unambiguous Constrained Automata. In Proceedings of the 16th International Conference on Developments in Language Theory (DLT'12), volume 7410 of Lecture Notes in Computer Science, pages 239--250, Taipei, Taiwan, August 2012. Springer. [BKL12] D. Berwanger, L. Kaiser, and S. Leßenich. Solving Counter Parity Games. In Proceedings of the 37th International Symposium on Mathematical Foundations of Computer Science (MFCS'12), volume 7464 of Lecture Notes in Computer Science, pages 160--171, Bratislava, Slovakia, August 2012. Springer. [BBC+12] P. Baldan, A. Bruni, A. Corradini, B. König, C. Rodríguez, and S. Schwoon. Efficient unfolding of contextual Petri nets. Theoretical Computer Science, 449(1):2--22, August 2012. [BFK+12] R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, G. Steel, and J.-K. Tsay. Efficient Padding Oracle Attacks on Cryptographic Hardware. In Proceedings of the 32nd Annual International Cryptology Conference (CRYPTO'12), volume 7417 of Lecture Notes in Computer Science, pages 608--625, Santa Barbara, California, USA, August 2012. Springer. F. Carreiro and S. Demri. Beyond Regularity for Presburger Modal Logics. In Selected Papers from the 9th Workshop on Advances in Modal Logics (AiML'12), pages 161--182, Copenhagen, Denmark, August 2012. College Publications. [AFKS12] É. André, L. Fribourg, U. Kühne, and R. Soulat. IMITATOR 2.5: A Tool for Analyzing Robustness in Scheduling Problems. In Proceedings of the 18th International Symposium on Formal Methods (FM'12), volume 7436 of Lecture Notes in Computer Science, pages 33--36, Paris, France, August 2012. Springer. [AMH12] A. Agarwal, A. Madalinski, and S. Haar. Effective Verification of Weak Diagnosability. In Proceedings of the 8th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS'12), Mexico City, Mexico, August 2012. IFAC. doi: 10.3182/20120829-3-MX-2028.00083. S. Demri and P. Gastin. Specification and Verification using Temporal Logics. In Modern applications of automata theory, volume 2 of IISc Research Monographs, chapter 15, pages 457--494. World Scientific, July 2012. [BDH+12] D. Berwanger, A. Dawar, P. Hunter, S. Kreutzer, and J. Obdrzálek. The DAG-width of directed graphs. Journal of Combinatorial Theory, Series B, 102(4):900--923, July 2012. doi: 10.1016/j.jctb.2012.04.004. [FFL+12c] G. Feld, L. Fribourg, D. Labrousse, B. Revol, and R. Soulat. Numerical simulation and physical experimentation of a 5-level and 7-level power converter under a control designed by a formal method. Research Report LSV-12-16, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2012. 18 pages. É. Lozes. Separation Logic: Expressiveness and Copyless Message-Passing. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, July 2012. P. Gastin and B. Monmege. Adding Pebbles to Weighted Automata. In Proceedings of the 17th International Conference on Implementation and Application of Automata (CIAA'12), volume 7381 of Lecture Notes in Computer Science, pages 28--51, Porto, Portugal, July 2012. Springer-Verlag. [BMO+12] P. Bouyer, N. Markey, J. Ouaknine, Ph. Schnoebelen, and J. Worrell. On Termination and Invariance for Faulty Channel Systems. Formal Aspects of Computing, 24(4-6):595--607, July 2012. [BDL12a] B. Bollig, N. Decker, and M. Leucker. Frequency Linear-time Temporal Logic. In Proceedings of the 6th International Symposium on Theoretical Aspects of Software Engineering (TASE'12), pages 85--92, Beijing, China, July 2012. IEEE Computer Society Press. doi: 10.1109/TASE.2012.43. P. Bouyer, N. Markey, and O. Sankur. Robust Reachability in Timed Automata: A Game-based Approach. In Proceedings of the 39th International Colloquium on Automata, Languages and Programming (ICALP'12) -- Part II, volume 7392 of Lecture Notes in Computer Science, pages 128--140, Warwick, UK, July 2012. Springer. [Ben12a] H. Benzina. A Network Policy Model for Virtualized Systems. In Proceedings of the 17th IEEE Symposium on Computers and Communications (ISCC'12), pages 680--683, Nevsehir, Turkey, July 2012. IEEE Computer Society Press. doi: 10.1109/ISCC.2012.6249376. P. Karandikar and Ph. Schnoebelen. Cutting Through Regular Post Embedding Problems. In Proceedings of the 7th International Computer Science Symposium in Russia (CSR'12), volume 7353 of Lecture Notes in Computer Science, pages 229--240, Nizhni Novgorod, Russia, July 2012. Springer. [Abi12c] S. Abiteboul. Viewing the Web as a Distributed Knowledge Base. In Proceedings of the 2012 International Workshop Description Logic (DL'09), volume 846 of CEUR Workshop Proceedings, Rome, Italy, June 2012. RWTH Aachen, Germany. [CD12d] K. Chatterjee and L. Doyen. Partial-Observation Stochastic Games: How to Win when Belief Fails. In Proceedings of the 27th Annual IEEE Symposium on Logic in Computer Science (LICS'12), pages 175--184, Dubrovnik, Croatia, June 2012. IEEE Computer Society Press. [HP12] S. Haddad and L. Pomello, editors. Proceedings of the 33rd International Conference on Applications and Theory of Petri Nets (ICATPN'12), volume 7347 of Lecture Notes in Computer Science, Hamburg, Germany, June 2012. Springer. [FG12b] A. Finkel and J. Goubault-Larrecq. The Theory of WSTS: The Case of Complete WSTS. In Proceedings of the 33rd International Conference on Applications and Theory of Petri Nets (PETRI NETS'12), volume 7347 of Lecture Notes in Computer Science, pages 3--31, Hamburg, Germany, June 2012. Springer. [FFL+12a] G. Feld, L. Fribourg, D. Labrousse, S. Lefebvre, B. Revol, and R. Soulat. Control of Multilevel Power Converters using Formal Methods. Research Report LSV-12-14, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2012. 14 pages. [Dja12] H. Djafri. Approches numériques et statistiques pour le model checking des processus stochastiques. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2012. S. Haddad, S. Schmitz, and Ph. Schnoebelen. The Ordinal-Recursive Complexity of Timed-Arc Petri Nets, Data Nets, and Other Enriched Nets. In Proceedings of the 27th Annual IEEE Symposium on Logic in Computer Science (LICS'12), pages 355--364, Dubrovnik, Croatia, June 2012. IEEE Computer Society Press. [DDS12b] S. Demri, A. K. Dhar, and A. Sangnier. Taming Past LTL and Flat Counter Systems. In Proceedings of the 6th International Joint Conference on Automated Reasoning (IJCAR'12), volume 7364 of Lecture Notes in Artificial Intelligence, pages 179--193, Manchester, UK, June 2012. Springer-Verlag. M. Arapinis, V. Cheval, and S. Delaune. Verifying privacy-type properties in a modular way. In Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF'12), pages 95--109, Cambridge Massachusetts, USA, June 2012. IEEE Computer Society Press. [DKP12] S. Delaune, S. Kremer, and D. Pasailă. Security protocols, constraint systems, and group theories. In Proceedings of the 6th International Joint Conference on Automated Reasoning (IJCAR'12), volume 7364 of Lecture Notes in Artificial Intelligence, pages 164--178, Manchester, UK, June 2012. Springer-Verlag. S. Balaguer, Th. Chatain, and S. Haar. A Concurrency-Preserving Translation from Time Petri Nets to Networks of Timed Automata. Formal Methods in System Design, 40(3):330--355, June 2012. [BK12] B. Bollig and D. Kuske. An optimal construction of Hanf sentences. Journal of Applied Logic, 10(2):179--186, June 2012. [ABD12] S. Abiteboul, M. Bienvenu, and D. Deutch. Deduction in the Presence of Distribution and Contradictions. In Proceedings of the 15th International Workshop on the Web and Databases (WebDB'12), pages 31--36, Scottsdale, Arizona, USA, May 2012. [AAMS12] S. Abiteboul, Y. Amsterdamer, T. Milo, and P. Senellart. Auto-completion learning for XML. In Proceedings of the ACM SIGMOD Internaitonal Conference on Management of Data (SIGMOD'12), pages 669--672, Scottsdale, Arizona, USA, May 2012. ACM Press. [ABV12a] S. Abiteboul, P. Bourhis, and V. Vianu. Comparing workflow specification languages: A matter of views. ACM Transactions on Database Systems, 37(2:10), May 2012. H. Ponce de León, S. Haar, and D. Longuet. Conformance Relations for Labeled Event Structures. In Proceedings of the 6th International Conference on Tests and Proofs (TAP'12), volume 7305 of Lecture Notes in Computer Science, pages 83--98, Prague, Czech Republic, May-June 2012. Springer. [IL12] M. Izabachène and B. Libert. Divisible E-Cash in the Standard Model. In Proceedings of the 5th International Conference on Pairing-Based Cryptography (PAIRING'12), volume 7708 of Lecture Notes in Computer Science, pages 314--332, Cologne, Germany, May 2012. Springer. [Ben12c] H. Benzina. Towards Designing Secure Virtualized Systems. In Proceedings of the 2nd International Conference on Digital Information and Communication Technology and its Application (DICTAP'12), pages 250--255, Bangkok, Thailand, May 2012. IEEE Computer Society Press. doi: 10.1109/DICTAP.2012.6215385. [CD12e] H. Comon-Lundh and S. Delaune. Formal Security Proofs. In Software Safety and Security, volume 33 of NATO Science for Peace and Security Series -- D: Information and Communication Security, pages 26--63. IOS Press, May 2012. [CD12f] V. Cortier and S. Delaune. Decidability and combination results for two notions of knowledge in security protocols. Journal of Automated Reasoning, 48(4):441--487, April 2012. [ASV12] S. Abiteboul, P. Senellart, and V. Vianu. The ERC webdam on foundations of web data management. In Proceedings of the 21st World Wide Web Conference (WWW'12) -- Companion Volume, pages 211--214, Lyon, France, April 2012. ACM Press. [AAS12] S. Abiteboul, É. Antoine, and J. Stoyanovich. Viewing the Web as a Distributed Knowledge Base. In Proceedings of the 28th International Conference on Data Engineering (ICDE'12), pages 1--4, Washington, D.C., USA, April 2012. IEEE Computer Society Press. doi: 10.1109/ICDE.2012.150. [AFS12] É. André, L. Fribourg, and R. Soulat. Enhancing the Inverse Method with State Merging. In Proceedings of the 4th NASA Formal Methods Symposium (NFM'12), volume 7226 of Lecture Notes in Computer Science, pages 100--105, Norfolk, Virginia, USA, April 2012. Springer. [GMM12] P. Ganty, R. Majumdar, and B. Monmege. Bounded underapproximations. Formal Methods in System Design, 40(2):206--231, April 2012. H. Comon-Lundh, M. Hagiya, Y. Kawamoto, and H. Sakurada. Computational Soundness of Indistinguishability Properties without Computable Parsing. In Proceedings of the 8th International Conference on Information Security Practice and Experience (ISPEC'12), volume 7232 of Lecture Notes in Computer Science, pages 63--79, Hangzhou, China, April 2012. Springer. [BGGP12] O. Bouissou, É. Goubault, J. Goubault-Larrecq, and S. Putot. A Generalization of P-boxes to Affine Arithmetic, and Applications to Static Analysis of Programs. Computing, 94(2-4):189--201, March 2012. G. Bana and H. Comon-Lundh. Towards Unconditional Soundness: Computationally Complete Symbolic Attacker. In Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), volume 7215 of Lecture Notes in Computer Science, pages 189--208, Tallinn, Estonia, March 2012. Springer. H. Comon-Lundh, V. Cortier, and G. Scerri. Security proof with dishonest keys. In Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), volume 7215 of Lecture Notes in Computer Science, pages 149--168, Tallinn, Estonia, March 2012. Springer. V. Cortier, J. Degrieck, and S. Delaune. Analysing routing protocols: four nodes topologies are sufficient. In Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), volume 7215 of Lecture Notes in Computer Science, pages 30--50, Tallinn, Estonia, March 2012. Springer. [BHP12a] B. Barbot, S. Haddad, and C. Picaronny. Coupling and Importance Sampling for Statistical Model Checking. In Proceedings of the 18th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'12), volume 7214 of Lecture Notes in Computer Science, pages 331--346, Tallinn, Estonia, March 2012. Springer. [CMV12] R. Chadha, P. Madhusudan, and M. Viswanathan. Reachability under Contextual Locking. In Proceedings of the 18th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'12), volume 7214 of Lecture Notes in Computer Science, pages 437--450, Tallinn, Estonia, March 2012. Springer. [BCGNK12] B. Bollig, A. Cyriac, P. Gastin, and K. Narayan Kumar. Model Checking Languages of Data Words. In Proceedings of the 15th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'12), volume 7213 of Lecture Notes in Computer Science, pages 391--405, Tallinn, Estonia, March 2012. Springer. P. Bouyer, R. Brenguier, N. Markey, and M. Ummels. Concurrent games with ordered objectives. In Proceedings of the 15th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'12), volume 7213 of Lecture Notes in Computer Science, pages 301--315, Tallinn, Estonia, March 2012. Springer. A. Bouhoula and F. Jacquemard. Sufficient completeness verification for conditional and constrained TRS. Journal of Applied Logic, 10(1):127--143, March 2012. [ABV12b] S. Abiteboul, P. Bourhis, and V. Vianu. Highly expressive query languages for unordered data trees. In Proceedings of the 15th International Conference on Database Theory (ICDT'12), pages 46--60, Berlin, Germany, March 2012. ACM Press. S. Abiteboul, Y. Amsterdamer, D. Deutch, T. Milo, and P. Senellart. Finding optimal probabilistic generators for XML collections. In Proceedings of the 15th International Conference on Database Theory (ICDT'12), pages 127--139, Berlin, Germany, March 2012. ACM Press. [IHL+12] R. Iosif, P. Habermehl, S. Labbe, É. Lozes, and B. Yakobowski. Concurrent Programs with Simple Data Structures ash Sequential Programs with Composite Data Structures. Deliverable VERIDYC D 2 (ANR-09-SEGI-016), March 2012. M. Lange and É. Lozes. Model-Checking the Higher-Dimensional Modal μ-Calculus. In Proceedings of the 8th Workshop on Fixed Points in Computer Science (FICS'12), volume 77 of Electronic Proceedings in Theoretical Computer Science, pages 39--46, Tallinn, Estonia, March 2012. doi: 10.4204/EPTCS.77.6. [BCH12b] S. Balaguer, Th. Chatain, and S. Haar. Concurrent semantics for timed distributed systems. Deliverable ImpRo D 4.1 (ANR-2010-BLAN-0317), March 2012. L. Doyen. Games and Automata: From Boolean to Quantitative Verification. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, March 2012. R. Soulat. Scheduling with IMITATOR: Some Case Studies. Research Report LSV-12-05, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2012. 13 pages. [CCK12] R. Chadha, S. Ciobâcă, and S. Kremer. Automated verification of equivalence properties of cryptographic protocols. In Programming Languages and Systems --- Proceedings of the 22nd European Symposium on Programming (ESOP'12), volume 7211 of Lecture Notes in Computer Science, pages 108--127, Tallinn, Estonia, March 2012. Springer. [BLL+12] G. Belkacem, D. Labrousse, S. Lefebvre, P.-Y. Joubert, U. Kühne, L. Fribourg, R. Soulat, É. Florentin, and Ch. Rey. Distributed and Coupled Electrothermal Model of Power Semiconductor Devices. In Proceedings of the 1st International Conference on Renewable Energies and VEhicular Technology (REVET'12), pages 84--89, Hammamet, Tunisia, March 2012. IEEE Power & Energy Society. [KMT12] S. Kremer, A. Mercier, and R. Treinen. Reducing Equational Theories for the Decision of Static Equivalence. Journal of Automated Reasoning, 2(48):197--217, February 2012. [CDK12] S. Ciobâcă, S. Delaune, and S. Kremer. Computing knowledge in security protocols under convergent equational theories. Journal of Automated Reasoning, 48(2):219--262, February 2012. [DJLL12] S. Demri, M. Jurdziński, O. Lachish, and R. Lazić. The covering and boundedness problems for branching vector addition systems. Journal of Computer and System Sciences, 79(1):23--38, February 2012. [BHP12c] B. Barbot, S. Haddad, and C. Picaronny. Importance Sampling for Model Checking of Time-Bounded Until. Research Report LSV-12-04, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2012. 14 pages. [BHS12] B. Bérard, S. Haddad, and M. Sassolas. Interrupt Timed Automata: Verification and Expressiveness. Formal Methods in System Design, 40(1):41--87, February 2012. [BDL12b] R. Brochenin, S. Demri, and É. Lozes. On the Almighty Wand. Information and Computation, 211:106--137, February 2012. J. Goubault-Larrecq. QRB-Domains and the Probabilistic Powerdomain. Logical Methods in Computer Science, 8(1:14), 2012. P. Cabalar and S. Demri. Automata-Based Computation of Temporal Equilibrium Models. In Proceedings of the 21st International Workshop on Logic Program Synthesis and Transformation (LOPSTR'11), volume 7225 of Lecture Notes in Computer Science, pages 57--72, Odense, Denmark, 2012. Springer. [DDS12a] M. Dahl, S. Delaune, and G. Steel. Formal Analysis of Privacy for Anonymous Location Based Services. In Revised Selected Papaers of the Workshop on Theory of Security and Applications (TOSCA'11), volume 6993 of Lecture Notes in Computer Science, pages 98--112, Saarbrücken, Germany, January 2012. Springer. [JLTV12] F. Jacquemard, É. Lozes, R. Treinen, and J. Villard. Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus. In Revised Selected Papaers of the Workshop on Theory of Security and Applications (TOSCA'11), volume 6993 of Lecture Notes in Computer Science, pages 166--185, Saarbrücken, Germany, January 2012. Springer. [Abi12a] S. Abiteboul. Sciences des données: De la logique du premier ordre à la Toile. Leçons inaugurales du Collège de France. Fayard, 2012. É. Lozes and J. Villard. Reliable Contracts for Unreliable Half-Duplex Communications. In Revised Selected Papers of the 8th International Workshop on Web Services and Formal Methods (WS-FM'11), volume 7176 of Lecture Notes in Computer Science, pages 2--16, Clermont-Ferrand, France, 2012. Springer. S. Akshay, B. Bérard, P. Bouyer, S. Haar, S. Haddad, C. Jard, D. Lime, N. Markey, P.-A. Reynier, O. Sankur, and Y. Thierry-Mieg. Overview of Robustness in Timed Systems. Deliverable ImpRo D 2.1 (ANR-2010-BLAN-0317), January 2012. [AGG12] A. Adjé, S. Gaubert, and É. Goubault. Coupling policy iteration with semi-definite relaxation to compute accurate numerical invariants in static analysis. Logical Methods in Computer Science, 8(1:1), January 2012. [Fig12] D. Figueira. Alternating register automata on finite words and trees. Logical Methods in Computer Science, 8(1:22), 2012. [BFLZ12] R. Bonnet, A. Finkel, J. Leroux, and M. Zeitoun. Model Checking Vector Addition Systems with one zero-test. Logical Methods in Computer Science, 8(2:11), 2012. [EHH12] D. El Hog-Benzina, S. Haddad, and R. Hennicker. Refinement and Asynchronous Composition of Modal Petri Nets. In Transactions on Petri Nets and Other Models of Concurrency V, volume 6900 of Lecture Notes in Computer Science, pages 96--120. Springer, 2012. [ACK+11] S. Abiteboul, T.-H. H. Chan, E. Kharlamov, W. Nutt, and P. Senellart. Capturing continuous data and answering aggregate queries in probabilistic XML. ACM Transactions on Database Systems, 36(4:25), December 2011. [ACD11b] M. Arnaud, V. Cortier, and S. Delaune. Modeling and Verifying Ad Hoc Routing Protocols. Research Report LSV-11-24, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2011. 66 pages. [Arn11] M. Arnaud. Formal verification of secured routing protocols. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2011. [Cio11a] S. Ciobâcă. Automated Verification of Security Protocols with Appplications to Electronic Voting. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2011. É. Lozes and J. Villard. Sharing Contract-Obedient Endpoints. Research Report LSV-11-23, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2011. 42 pages. [ILV11] M. Izabachène, B. Libert, and D. Vergnaud. Block-wise P-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes. In Proceedings of the 13th IMA International Conference on Cryptography and Coding (IMACC'11), volume 7089 of Lecture Notes in Computer Science, pages 431--450, Oxford, UK, December 2011. Springer. Ph. Darondeau, S. Demri, R. Meyer, and Ch. Morvan. Petri Net Reachability Graphs: Decidability Status of FO Properties. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 140--151, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik. O. Sankur, P. Bouyer, and N. Markey. Shrinking Timed Automata. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 90--102, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik. C. Chevalier, S. Delaune, and S. Kremer. Transforming Password Protocols to Compose. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 204--216, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik. P. Bouyer, R. Brenguier, N. Markey, and M. Ummels. Nash Equilibria in Concurrent Games with Büchi Objectives. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 375--386, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik. [BKP11] D. Berwanger, L. Kaiser, and B. Puchala. Perfect-Information Construction for Coordination in Games. In Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), volume 13 of Leibniz International Proceedings in Informatics, pages 387--398, Mumbai, India, December 2011. Leibniz-Zentrum für Informatik. [AGM11] S. Abiteboul, G. Gottlob, and M. Manna. Distributed XML design. Journal of Computer and System Sciences, 77(6):936--964, November 2011. Th. Place and L. Segoufin. A decidable characterization of locally testable tree languages. Logical Methods in Computer Science, 7(4:03), November 2011. F. Jacquemard. Extended Tree Automata for the Verification of Infinite State Systems. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, November 2011. [ECGJ11] J. Echeveste, A. Cont, J.-L. Giavitto, and F. Jacquemard. Formalisation des relations temporelles entre une partition et une performance musicale dans un contexte d'accompagnement automatique. In Actes du 8ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'11), volume 45 of Journal Européen des Systèmes Automatisés, pages 109--124, Lille, France, November 2011. Hermès. doi: 10.3166/jesa.45.109-124. [BHP11] B. Barbot, S. Haddad, and C. Picaronny. Échantillonnage préférentiel pour le model checking statistique. In Actes du 8ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'11), volume 45 of Journal Européen des Systèmes Automatisés, pages 237--252, Lille, France, November 2011. Hermès. [SGA11] F. M. Suchanek, D. Gross-Amblard, and S. Abiteboul. Watermarking for Ontologies. In Proceedings of the 10th International Semantic Web Conference (ISWC'11), volume 7031 of Lecture Notes in Computer Science, pages 697--713, Bonn, Germany, October 2011. Springer. K. Chatterjee and L. Doyen. Games and Markov Decision Processes with Mean-payoff Parity and Energy Parity Objectives. In Proceedings of the 7th Annual Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS'11), volume 7119 of Lecture Notes in Computer Science, Lednice, Czech Republic, October 2011. Springer. [BBD+11b] Th. Brihaye, V. Bruyère, L. Doyen, M. Ducobu, and J.-F. Raskin. Antichain-based QBF Solving. In Proceedings of the 9th International Symposium on Automated Technology for Verification and Analysis (ATVA'11), volume 6996 of Lecture Notes in Computer Science, pages 183--197, Taipei, Taiwan, October 2011. Springer. F. Jacquemard, Y. Kojima, and M. Sakai. Controlled Term Rewriting. In Proceedings of the 8th International Symposium on Frontiers of Combining Systems (FroCoS'11), volume 6989 of Lecture Notes in Artificial Intelligence, pages 179--194, Saarbrücken, Germany, October 2011. Springer. [FRS11] L. Fribourg, B. Revol, and R. Soulat. Synthesis of Switching Rules for Ensuring Reachability Properties of Sampled Linear Systems. In Proceedings of the 13th International Workshops on Verification of Infinite State Systems (INFINITY'11), volume 73 of Electronic Proceedings in Theoretical Computer Science, pages 35--48, Taipei, Taiwan, October 2011. M. Bersani and S. Demri. The complexity of reversal-bounded model-checking. In Proceedings of the 8th International Symposium on Frontiers of Combining Systems (FroCoS'11), volume 6989 of Lecture Notes in Artificial Intelligence, pages 71--86, Saarbrücken, Germany, October 2011. Springer. D. Berwanger, L. Kaiser, and S. Leßenich. Imperfect Recall and Counter Games. Research Report LSV-11-20, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2011. 21 pages. V. Cheval, H. Comon-Lundh, and S. Delaune. Trace Equivalence Decision: Negative Tests and Non-determinism. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11), pages 321--330, Chicago, Illinois, USA, October 2011. ACM Press. [BMOU11] P. Bouyer, N. Markey, J. Olschewski, and M. Ummels. Measuring Permissiveness in Parity Games: Mean-Payoff Parity Games Revisited. In Proceedings of the 9th International Symposium on Automated Technology for Verification and Analysis (ATVA'11), volume 6996 of Lecture Notes in Computer Science, pages 135--149, Taipei, Taiwan, October 2011. Springer. [CSV11a] R. Chadha, A. P. Sistla, and M. Viswanathan. Power of Randomization in Automata on Infinite Strings. Logical Methods in Computer Science, 7(3:22), September 2011. [KD11] A. Kumar Dhar. Counter Systems with Presburger-definable Reachability Sets: Decidability and Complexity. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2011. P. Chambart. Du Problème de sous-mot de Post et de la complexité des canaux non fiables. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2011. [Gal11] A. Galland. Distributed Data Management with Access Control. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2011. [UW11b] M. Ummels and D. Wojtczak. The Complexity of Nash Equilibria in Stochastic Multiplayer Games. Logical Methods in Computer Science, 7(3:20), September 2011. [Da 11] A. Da Costa. Propriétés de jeux multi-agents. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2011. [Pas11b] D. Pasailă. Verifying equivalence properties of security protocols. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2011. [Deg11] J. Degrieck. Réduction de graphes pour l'analyse de protocoles de routage sécurisés. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2011. M. Cadilhac, A. Finkel, and P. McKenzie. Bounded Parikh Automata. In Proceedings of the 8th International Conference WORDS (WORDS'11), volume 63 of Electronic Proceedings in Theoretical Computer Science, pages 93--102, Prague, Czech Republic, September 2011. doi: 10.4204/EPTCS.63.13. R. Focardi, F. L. Luccio, and G. Steel. An Introduction to Security API Analysis. In Foundations of Security Analysis and Design -- FOSAD Tutorial Lectures (FOSAD'VI), volume 6858 of Lecture Notes in Computer Science, pages 35--65. Springer, September 2011. P. Bouyer, N. Markey, and O. Sankur. Robust Model-Checking of Timed Automata via Pumping in Channel Machines. In Proceedings of the 9th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'11), volume 6919 of Lecture Notes in Computer Science, pages 97--112, Aalborg, Denmark, September 2011. Springer. [Bon11a] R. Bonnet. Decidability of LTL Model Checking for Vector Addition Systems with one Zero-test. In Proceedings of the 5th Workshop on Reachability Problems in Computational Models (RP'11), volume 6945 of Lecture Notes in Computer Science, pages 85--95, Genova, Italy, September 2011. Springer. [FK11a] L. Fribourg and U. Kühne. Parametric Verification and Test Coverage for Hybrid Automata Using the Inverse Method. In Proceedings of the 5th Workshop on Reachability Problems in Computational Models (RP'11), volume 6945 of Lecture Notes in Computer Science, pages 191--204, Genova, Italy, September 2011. Springer. É. André and R. Soulat. Synthesis of Timing Parameters Satisfying Safety Properties. In Proceedings of the 5th Workshop on Reachability Problems in Computational Models (RP'11), volume 6945 of Lecture Notes in Computer Science, pages 31--44, Genova, Italy, September 2011. Springer. [CKV+11] R. Chadha, V. Korthikranthi, M. Viswanathan, G. Agha, and Y. Kwon. Model Checking MDPs with a Unique Compact Invariant Set of Distributions. In Proceedings of the 8th International Conference on Quantitative Evaluation of Systems (QEST'11), pages 121--130, Aachen, Germany, September 2011. IEEE Computer Society Press. [BDD+11a] P. Ballarini, H. Djafri, M. Duflot, S. Haddad, and N. Pekergin. COSMOS: a Statistical Model Checker for the Hybrid Automata Stochastic Logic. In Proceedings of the 8th International Conference on Quantitative Evaluation of Systems (QEST'11), pages 143--144, Aachen, Germany, September 2011. IEEE Computer Society Press. [BFH11] M. Beccuti, G. Franceschinis, and S. Haddad. MDWNsolver: A Framework to Design and Solve Markov Decision Petri Nets. International Journal of Performability Engineering, 7(5):417--428, September 2011. [UW11a] M. Ummels and D. Wojtczak. The Complexity of Nash Equilibria in Limit-Average Games. In Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in Computer Science, pages 482--496, Aachen, Germany, September 2011. Springer. B. Bollig. An automaton over data words that captures EMSO logic. In Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in Computer Science, pages 171--186, Aachen, Germany, September 2011. Springer. [RSB11] C. Rodríguez, S. Schwoon, and P. Baldan. Efficient contextual unfolding. In Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in Computer Science, pages 342--357, Aachen, Germany, September 2011. Springer. P. Bouyer, K. G. Larsen, N. Markey, O. Sankur, and C. Thrane. Timed automata can always be made implementable. In Proceedings of the 22nd International Conference on Concurrency Theory (CONCUR'11), volume 6901 of Lecture Notes in Computer Science, pages 76--91, Aachen, Germany, September 2011. Springer. [BFLM11] P. Bouyer, U. Fahrenberg, K. G. Larsen, and N. Markey. Quantitative analysis of real-time systems using priced timed automata. Communications of the ACM, 54(9):78--87, September 2011. [CDS11] K. Chatterjee, L. Doyen, and R. Singh. On Memoryless Quantitative Objectives. In Proceedings of the 18th International Symposium on Fundamentals of Computation Theory (FCT'11), volume 6914 of Lecture Notes in Computer Science, pages 148--159, Oslo, Norway, August 2011. Springer. K. Chatterjee and L. Doyen. Energy and Mean-Payoff Parity Markov Decision Processes. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 206--218, Warsaw, Poland, August 2011. Springer. L. Doyen, Th. Massart, and M. Shirmohammadi. Infinite Synchronizing Words for Probabilistic Automata. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 278--289, Warsaw, Poland, August 2011. Springer. B. Bollig, A. Cyriac, P. Gastin, and M. Zeitoun. Temporal Logics for Concurrent Recursive Programs: Satisfiability and Model Checking. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 132--144, Warsaw, Poland, August 2011. Springer. M. Blockelet and S. Schmitz. Model-Checking Coverability Graphs of Vector Addition Systems. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 108--119, Warsaw, Poland, August 2011. Springer. [San11] O. Sankur. Untimed Language Preservation in Timed Systems. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 556--567, Warsaw, Poland, August 2011. Springer. [Bon11b] R. Bonnet. The reachability problem for Vector Addition Systems with one zero-test. In Proceedings of the 36th International Symposium on Mathematical Foundations of Computer Science (MFCS'11), volume 6907 of Lecture Notes in Computer Science, pages 145--157, Warsaw, Poland, August 2011. Springer. [BDD+11c] P. Ballarini, H. Djafri, M. Duflot, S. Haddad, and N. Pekergin. Petri Nets Compositional Modeling and Verification of Flexible Manufacturing Systems. In Proceedings of the 7th IEEE Conference on Automation Science and Engineering (CASE'11), pages 588--593, Trieste, Italy, August 2011. IEEE Robotics & Automation Society. doi: 10.1109/CASE.2011.6042488. J. Goubault-Larrecq. A Few Pearls in the Theory of Quasi-Metric Spaces. Invited talk, Fifth International Conference on Topology, Algebra, and Categories in Logic (TACL'11), Marseilles, France, July 2011, July 2011. [BDM+11] M. Bojańczyk, C. David, A. Muscholl, Th. Schwentick, and L. Segoufin. Two-variable logic on data words. ACM Transactions on Computational Logic, 12(4:27), July 2011. [LPS11] F. Luccio, L. Pagli, and G. Steel. Mathematical and Algorithmic Foundations of the Internet. CRC Press, July 2011. M. Cadilhac, A. Finkel, and P. McKenzie. On the Expressiveness of Parikh Automata and Related Models. In Proceedings of the 3rd Workshop on Non-Classical Models of Automata and Applications (NCMA'11), volume 282 of books@ocg.at, pages 103--119, Milano, Italy, July 2011. Austrian Computer Society. [SR11] S. Schwoon and C. Rodríguez. Construction and SAT-based verification of Contextual Unfoldings. In Proceedings of the 13th International Workshop on Descriptional Complexity of Formal Systems (DCFS'11), volume 6808 of Lecture Notes in Computer Science, pages 34--42, Limburg, Germany, July 2011. Springer. [Cio11b] S. Ciobâcă. Computing finite variants for subterm convergent rewrite systems. In Proceedings of the 25th International Workshop on Unification (UNIF'11), Wroclaw, Poland, July 2011. S. Schmitz. A Note on Sequential Rule-Based POS Tagging. In Proceedings of the 9th International Workshop on Finite-State Methods and Natural Language Processing (FSMNLP'11), pages 83--87, Blois, France, July 2011. ACL Press. [BBBS11] N. Bertrand, P. Bouyer, Th. Brihaye, and A. Stainer. Emptiness and Universality Problems in Timed Automata with Positive Frequency. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 246--257, Zürich, Switzerland, July 2011. Springer. Th. Brihaye, L. Doyen, G. Geeraerts, J. Ouaknine, J.-F. Raskin, and J. Worrell. On Reachability for Hybrid Automata over Bounded Time. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 416--427, Zürich, Switzerland, July 2011. Springer. V. Bárány, B. ten Cate, and L. Segoufin. Guarded negation. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 356--367, Zürich, Switzerland, July 2011. Springer. S. Schmitz and Ph. Schnoebelen. Multiply-Recursive Upper Bounds with Higman's Lemma. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 441--452, Zürich, Switzerland, July 2011. Springer. M. Anderson, D. van Melkebeek, N. Schweikardt, and L. Segoufin. Locality of queries definable in invariant first-order logic with arbitrary built-in predicates. In Proceedings of the 38th International Colloquium on Automata, Languages and Programming (ICALP'11) -- Part II, volume 6756 of Lecture Notes in Computer Science, pages 368--379, Zürich, Switzerland, July 2011. Springer. [ACD11a] M. Arnaud, V. Cortier, and S. Delaune. Deciding security for protocols with recursive tests. In Proceedings of the 23rd International Conference on Automated Deduction (CADE'11), volume 6803 of Lecture Notes in Computer Science, pages 49--63, Wroclaw, Poland, July 2011. Springer. [AFFM11] C. Areces, D. Figueira, S. Figueira, and S. Mera. The Expressive Power of Memory Logics. Review of Symbolic Logic, 4(2):290 -- 318, June 2011. [GK11] J. Goubault-Larrecq and K. Keimel. Choquet-Kendall-Matheron Theorems for Non-Hausdorff Spaces. Mathematical Structures in Computer Science, 21(3):511--561, June 2011. [AGP11] S. Abiteboul, A. Galland, and N. Polyzotis. Web information management with access control. In Proceedings of the 14th International Workshop on the Web and Databases (WebDB'11), Athens, Greece, June 2011. W. Kazana and L. Segoufin. First-order query evaluation on structures of bounded degree. Logical Methods in Computer Science, 7(2:20), June 2011. [ABGA11] S. Abiteboul, M. Bienvenu, A. Galland, and É. Antoine. A rule-based language for Web data management. In Proceedings of the 30th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'11), pages 293--304, Athens, Greece, June 2011. ACM Press. [BCJ+11] M. Backes, I. Cervesato, A. Jaggard, A. Scedrov, and J.-K. Tsay. Cryptographically sound security proofs for basic and public-key Kerberos. International Journal on Information Security, 10(2):107--134, June 2011. S. Haar, C. Kern, and S. Schwoon. Computing the Reveals Relation in Occurrence Nets. In Proceedings of the 2nd International Symposium on Games, Automata, Logics, and Formal Verification (GandALF'11), volume 54 of Electronic Proceedings in Theoretical Computer Science, pages 31--44, Minori, Italy, June 2011. [FFK+11] É. Florentin, L. Fribourg, U. Kühne, S. Lefebvre, and Ch. Rey. COUPLET: Coupled Electrothermal Simulation. Research Report LSV-11-18, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2011. 32 pages. [Mar11a] N. Markey. Robustness in Real-time Systems. In Proceedings of the 6th IEEE International Symposium on Industrial Embedded Systems (SIES'11), pages 28--34, Västerås, Sweden, June 2011. IEEE Computer Society Press. doi: 10.1109/SIES.2011.5953652. [KSW11] S. Kremer, G. Steel, and B. Warinschi. Security for Key Management Interfaces. In Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11), pages 266--280, Cernay-la-Ville, France, June 2011. IEEE Computer Society Press. [DKRS11] S. Delaune, S. Kremer, M. D. Ryan, and G. Steel. Formal analysis of protocols based on TPM state registers. In Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11), pages 66--82, Cernay-la-Ville, France, June 2011. IEEE Computer Society Press. [BCH11] S. Balaguer, Th. Chatain, and S. Haar. Building Tight Occurrence Nets from Reveals Relations. In Proceedings of the 11th International Conference on Application of Concurrency to System Design (ACSD'11), pages 44--53, Newcastle upon Tyne, UK, June 2011. IEEE Computer Society Press. S. Haddad, J. Mairesse, and H.-T. Nguyen. Synthesis and Analysis of Product-form Petri Nets. In Proceedings of the 32nd International Conference on Applications and Theory of Petri Nets (PETRI NETS'11), volume 6709 of Lecture Notes in Computer Science, pages 288--307, Newcastle upon Tyne, UK, June 2011. Springer. P. Chambart, A. Finkel, and S. Schmitz. Forward Analysis and Model Checking for Trace Bounded WSTS. In Proceedings of the 32nd International Conference on Applications and Theory of Petri Nets (PETRI NETS'11), volume 6709 of Lecture Notes in Computer Science, Newcastle upon Tyne, UK, June 2011. Springer. [FFSS11] D. Figueira, S. Figueira, S. Schmitz, and Ph. Schnoebelen. Ackermannian and Primitive-Recursive Bounds with Dickson's Lemma. In Proceedings of the 26th Annual IEEE Symposium on Logic in Computer Science (LICS'11), pages 269--278, Toronto, Canada, June 2011. IEEE Computer Society Press. [GV11] J. Goubault-Larrecq and D. Varacca. Continuous Random Variables. In Proceedings of the 26th Annual IEEE Symposium on Logic in Computer Science (LICS'11), pages 97--106, Toronto, Canada, June 2011. IEEE Computer Society Press. D. Figueira. A decidable two-way logic on data words. In Proceedings of the 26th Annual IEEE Symposium on Logic in Computer Science (LICS'11), pages 365--374, Toronto, Canada, June 2011. IEEE Computer Society Press. [Ben11] H. Benzina. Logic in Virtualized Systems. In Proceedings of the International Conference on Computer Applications and Network Security (ICCANS'11), Republic of Maldives, May 2011. [LS11] L. Libkin and C. Sirangelo. Data exchange and schema mappings in open and closed worlds. Journal of Computer and System Sciences, 77(3):542--571, May 2011. [BDD+11b] P. Ballarini, H. Djafri, M. Duflot, S. Haddad, and N. Pekergin. HASL: An Expressive Language for Statistical Verification of Stochastic Models. In Proceedings of the 5th International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS'11), pages 306--315, Cachan, France, May 2011. [BCL11] P. Bouyer, F. Cassez, and F. Laroussinie. Timed Modal Logics for Real-Time Systems: Specification, Verification and Control. Journal of Logic, Language and Information, 20(2):169--203, April 2011. [ABKT11] S. Abiteboul, K. Böhm, C. Koch, and K.-L. Tan. Proceedings of the 27th International Conference on Data Engineering (ICDE'11). In Proceedings of the 27th International Conference on Data Engineering (ICDE'11), Hannover, Germany, April 2011. IEEE Computer Society Press. doi: 10.1109/ICDE.2011.5767975. [BCD+11] L. Brim, J. Chaloupka, L. Doyen, R. Gentilini, and J.-F. Raskin. Faster algorithms for mean-payoff games. Formal Methods in System Design, 38(2):97--118, April 2011. [AGL+11] É. Antoine, A. Galland, K. Lyngbaek, A. Marian, and N. Polyzotis. Social networking on top of the WebdamExchange system. In Proceedings of the 27th International Conference on Data Engineering (ICDE'11), pages 1300--1303, Hannover, Germany, April 2011. IEEE Computer Society Press. B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. Weighted Expressions and DFS Tree Automata. Research Report LSV-11-08, Laboratoire Spécification et Vérification, ENS Cachan, France, April 2011. 32 pages. [Mar11b] N. Markey. Verification of Embedded Systems -- Algorithms and Complexity. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, April 2011. J. Goubault-Larrecq. Musings Around the Geometry of Interaction, and Coherence. Theoretical Computer Science, 412(20):1998--2014, April 2011. [ABGR11] S. Abiteboul, M. Bienvenu, A. Galland, and M.-Ch. Rousset. Distributed Datalog Revisited. In Revised Selected Papers of the 1st International Workshop Datalog Reloaded (Datalog'10), volume 6702 of Lecture Notes in Computer Science, pages 252--261, Oxford, UK, March 2011. Springer. [JKV11] F. Jacquemard, F. Klay, and C. Vacher. Rigid Tree Automata. Information and Computation, 209(3):486--512, March 2011. S. Abiteboul, B. ten Cate, and Y. Katsis. On the equivalence of distributed systems with queries and communication. In Proceedings of the 14th International Conference on Database Theory (ICDT'11), pages 126--137, Uppsala, Sweden, March 2011. ACM Press. S. Abiteboul, P. Bourhis, and V. Vianu. Comparing workflow specification languages: a matter of views. In Proceedings of the 14th International Conference on Database Theory (ICDT'11), pages 78--89, Uppsala, Sweden, March 2011. ACM Press. L. Doyen, Th. Massart, and M. Shirmohammadi. Synchronizing Objectives for Markov Decision Processes. In Proceedings of the International Workshop on Interactions, Games and Protocols (iWIGP'11), volume 50 of Electronic Proceedings in Theoretical Computer Science, pages 61--75, Saarbrücken, Germany, March 2011. [FK11b] L. Fribourg and U. Kühne. Parametric Verification of Hybrid Automata Using the Inverse Method. Research Report LSV-11-04, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2011. 25 pages. H. Comon-Lundh and V. Cortier. How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones. In Proceedings of the 28th Annual Symposium on Theoretical Aspects of Computer Science (STACS'11), volume 9 of Leibniz International Proceedings in Informatics, pages 29--44, Dortmund, Germany, March 2011. Leibniz-Zentrum für Informatik. B. ten Cate and L. Segoufin. Unary negation. In Proceedings of the 28th Annual Symposium on Theoretical Aspects of Computer Science (STACS'11), volume 9 of Leibniz International Proceedings in Informatics, pages 344--355, Dortmund, Germany, March 2011. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.STACS.2011.344. [ST11] L. Segoufin and S. Toruńczyk. Automata based verification over linearly ordered data domains. In Proceedings of the 28th Annual Symposium on Theoretical Aspects of Computer Science (STACS'11), volume 9 of Leibniz International Proceedings in Informatics, pages 81--92, Dortmund, Germany, March 2011. Leibniz-Zentrum für Informatik. [Kre11] S. Kremer. Modelling and analyzing security protocols in cryptographic process calculi. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, March 2011. [Ste11b] G. Steel. Formal Analysis of Security APIs. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, March 2011. [Del11] S. Delaune. Verification of security protocols: from confidentiality to privacy. Mémoire d'habilitation, École Normale Supérieure de Cachan, France, March 2011. [Pas11a] D. Pasailă. Conjunctive queries determinacy and rewriting. In Proceedings of the 14th International Conference on Database Theory (ICDT'11), pages 220--231, Uppsala, Sweden, March 2011. ACM Press. R. Bonnet, A. Finkel, S. Haddad, and F. Rosa-Velardo. Ordinal Theory for Expressiveness of Well Structured Transition Systems. In Proceedings of the 14th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'11), volume 6604 of Lecture Notes in Computer Science, pages 153--167, Saarbrücken, Germany, March-April 2011. Springer. D. Figueira and L. Segoufin. Bottom-up automata on data trees and vertical XPath. In Proceedings of the 28th Annual Symposium on Theoretical Aspects of Computer Science (STACS'11), volume 9 of Leibniz International Proceedings in Informatics, pages 93--104, Dortmund, Germany, March 2011. Leibniz-Zentrum für Informatik. P. Bourhis. On the dynamics of active documents for distributed data management. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2011. [ACGP11] M. Abdalla, C. Chevalier, L. Granboulan, and D. Pointcheval. Contributory Password-Authenticated Group Key Exchange with Join Capability. In Proceedings of the Cryptographers' Track at the RSA Conference 2011 (CT-RSA'11), volume 6558 of Lecture Notes in Computer Science, pages 142--160, San Francisco, California, USA, February 2011. Springer. [Vil11] J. Villard. Heaps and Hops. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2011. [BBD+11a] S. Baarir, M. Beccuti, C. Dutheillet, G. Franceschinis, and S. Haddad. Lumping partially symmetrical stochastic models. Performance Evaluation, 76:21--44, January 2011. [CSV11b] R. Chadha, A. P. Sistla, and M. Viswanathan. Probabilistic Büchi automata with non-extremal acceptance thresholds. In Proceedings of the 12th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'11), volume 6538 of Lecture Notes in Computer Science, pages 103--117, Austin, Texas, USA, January 2011. Springer. L. Doyen and J.-F. Raskin. Games with Imperfect Information: Theory and Algorithms. In Lectures in Game Theory for Computer Scientists. Cambridge University Press, January 2011. [ BibTex | Web page | PS | PDF ] [Ste11a] G. Steel. Formal Analysis of Security APIs. In Encyclopedia of Cryptography and Security, pages 492--494. Springer, 2nd edition, 2011. doi: 10.1007/978-1-4419-5906-5_873. [AMR+11] S. Abiteboul, I. Manolescu, Ph. Rigaux, M.- Ch. Rousset, and P. Senellart. Web Data Management. Cambridge University Press, 2011. S. Haddad. Introduction to Verification. In Models and Analysis in Distributed Systems, chapter 6, pages 137--154. John Wiley & Sons, Ltd., 2011. [DP11] S. Demri and D. Poitrenaud. Verification of Infinite-State Systems. In Models and Analysis in Distributed Systems, chapter 8, pages 221--269. John Wiley & Sons, Ltd., 2011. [HKPP11a] S. Haddad, F. Kordon, L. Pautet, and L. Petrucci, editors. Distributed Systems Design and Algorithms. John Wiley & Sons, Ltd., 2011. [HKPP11b] S. Haddad, F. Kordon, L. Pautet, and L. Petrucci, editors. Models and Analysis in Distributed Systems. John Wiley & Sons, Ltd., 2011. [CDM11] H. Comon-Lundh, S. Delaune, and J. K. Millen. Constraint solving techniques and enriching the model with equational theories. In Formal Models and Techniques for Analyzing Security Protocols, volume 5 of Cryptology and Information Security Series, pages 35--61. IOS Press, 2011. V. Cortier and S. Kremer, editors. Formal Models and Techniques for Analyzing Security Protocols, volume 5 of Cryptology and Information Security Series. IOS Press, 2011. [BKKL11] B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. SMA---The Smyle Modeling Approach. In Revised Selected Papars of the 3rd IFIP TC2 Central and East European Conference on Software Engineering Techniques (CEE-SET'08), volume 4980 of Lecture Notes in Computer Science, pages 103--117, Brno, Czech Republic, 2011. Springer. [LAL10] D. Longuet, M. Aiguier, and P. Le Gall. Proof-guided test selection from first-order specifications with equality. Journal of Automated Reasoning, 45(4):437--473, December 2010. R. Bonnet, A. Finkel, S. Haddad, and F. Rosa-Velardo. Comparing Petri Data Nets and Timed Petri Nets. Research Report LSV-10-23, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010. 16 pages. [Vac10] C. Vacher. Automates à contraintes globales pour la vérification de propriétés de sécurité. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010. [Pla10] Th. Place. Decidable Characterizations for Tree Logics. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010. [Fig10b] D. Figueira. On decidable automata on data words and data trees in relation to satisfiability of LTL and XPath. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010. [And10c] É. André. An Inverse Method for the Synthesis of Timing Parameters in Concurrent Systems. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010. [Sou10b] R. Soulat. On Properties of the Inverse Method: Commutation of Instanciation and Full Covering of the Behavioral Cartography. Research Report LSV-10-22, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010. 14 pages. [And10d] É. André. Synthesizing Parametric Constraints on Various Case Studies Using IMITATOR II. Research Report LSV-10-21, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2010. 66 pages. [DR10a] S. Demri and A. Rabinovich. The Complexity of Linear-time Temporal Logic over the Class of Ordinals. Logical Methods in Computer Science, 6(4), December 2010. [CSV10] R. Chadha, A. P. Sistla, and M. Viswanathan. Model Checking Concurrent Programs with Nondeterminism and Randomization. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 364--375, Chennai, India, December 2010. Leibniz-Zentrum für Informatik. [AGMNK10] S. Akshay, P. Gastin, M. Mukund, and K. Narayan Kumar. Model checking time-constrained scenario-based specifications. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 204--215, Chennai, India, December 2010. Leibniz-Zentrum für Informatik. [CDHR10] K. Chatterjee, L. Doyen, Th. A. Henzinger, and J.-F. Raskin. Generalized Mean-payoff and Energy Games. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 505--516, Chennai, India, December 2010. Leibniz-Zentrum für Informatik. R. Bonnet, A. Finkel, J. Leroux, and M. Zeitoun. Place-Boundedness for Vector Addition Systems with one zero-test. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 192--203, Chennai, India, December 2010. Leibniz-Zentrum für Informatik. [HBM+10] P. Hunter, P. Bouyer, N. Markey, J. Ouaknine, and J. Worrell. Computing rational radical sums in uniform TC^0. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 308--316, Chennai, India, December 2010. Leibniz-Zentrum für Informatik. A. Da Costa, F. Laroussinie, and N. Markey. ATL with strategy contexts: Expressiveness and Model Checking. In Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10), volume 8 of Leibniz International Proceedings in Informatics, pages 120--132, Chennai, India, December 2010. Leibniz-Zentrum für Informatik. [BLPS10] P. Barceló, L. Libkin, A. Poggi, and C. Sirangelo. XML with incomplete information. Journal of the ACM, 58(1), December 2010. [DKS10] S. Delaune, S. Kremer, and G. Steel. Formal Analysis of PKCS#11 and Proprietary Extensions. Journal of Computer Security, 18(6):1211--1245, November 2010. doi: 10.3233/JCS-2009-0394. J. Goubault-Larrecq. Finite Models for Formal Security Proofs. Journal of Computer Security, 18(6):1247--1299, November 2010. [KM10] S. Kremer and L. Mazaré. Computationally Sound Analysis of Protocols using Bilinear Pairings. Journal of Computer Security, 18(6):999--1033, November 2010. [And10b] É. André. IMITATOR II User Manual. Research Report LSV-10-20, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2010. 31 pages. [LMT10] R. Lanotte, A. Maggiolo-Schettini, and A. Troina. Weak bisimulation for Probabilistic Timed Automata? Theoretical Computer Science, 411(50):4291--4322, November 2010. [AJRG10] R. Abassi, F. Jacquemard, M. Rusinowitch, and S. Guemara El Fatmi. XML Access Control: from XACML to Annotated Schemas. In Proceedings of the 2nd International Conference on Communications and Networking (ComNet'10), Tozeur, Tunisia, November 2010. IEEE Computer Society Press. doi: 10.1109/COMNET.2010.5699810. [BHB10] S. S. Bauer, R. Hennicker, and M. Bidoit. A Modal Interface Theory with Data Constraints. In Revised Selected Papers of the 13th Brazilian Symposium on Formal Methods (SBMF'10), volume 6527 of Lecture Notes in Computer Science, pages 80--95. Springer, November 2010. [LBD+10] S. Li, S. Balaguer, A. David, K. G. Larsen, B. Nielsen, and S. Pusinskas. Scenario-based verification of real-time systems using Uppaal. Formal Methods in System Design, 37(2-3):200--264, November 2010. [BHSZ10] B. Bérard, S. Haddad, M. Sassolas, and M. Zeitoun. Distributed Synthesis with Incomparable Information. Research Report LSV-10-17, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2010. 20 pages. K. Chatterjee and L. Doyen. The Complexity of Partial-Observation Parity Games. In Proceedings of the 17th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'10), volume 6397 of Lecture Notes in Artificial Intelligence, pages 1--14, Yogyakarta, Indonesia, October 2010. Springer. [KBBB10] U. Kühne, S. Beyer, J. Bormann, and J. Barstow. Automated Formal Verification of Processors Based on Architectural Models. In Proceedings of the 10th International Conference on Formal Methods in Computer Aided Design (FMCAD'10), pages 129--136, Lugano, Switzerland, October 2010. IEEE Computer Society Press. [BCFS10] M. Bortolozzo, M. Centenaro, R. Focardi, and G. Steel. Attacking and Fixing PKCS#11 Security Tokens. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10), pages 260--269, Chicago, Illinois, USA, October 2010. ACM Press. [Haa10a] S. Haar. Types of Asynchronous Diagnosability and the phReveals-Relation in Occurrence Nets. IEEE Transactions on Automatic Control, 55(10):2310--2320, October 2010. doi: 10.1109/TAC.2010.2063490. [SRKK10] B. Smyth, M. D. Ryan, S. Kremer, and M. Kourjieh. Towards automatic analysis of election verifiability properties. In Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10), volume 6186 of Lecture Notes in Computer Science, pages 146--163, Paphos, Cyprus, October 2010. Springer. [BCHK10] P. Baldan, Th. Chatain, S. Haar, and B. König. Unfolding-based Diagnosis of Systems with an Evolving Topology. Information and Computation, 208(10):1169--1192, October 2010. D. Berwanger and L. Kaiser. Information Tracking in Games on Graphs. Journal of Logic, Language and Information, 19(4):395--412, October 2010. D. Berwanger, K. Chatterjee, L. Doyen, M. De Wulf, and Th. A. Henzinger. Strategy Construction for Parity Games with Imperfect Information. Information and Computation, 208(10):1206--1220, October 2010. M. Bojańczyk and L. Segoufin. Tree Languages Defined in First-Order Logic with One Quantifier Alternation. Logical Methods in Computer Science, 6(4:1), October 2010. C. Rodríguez. Implementation of a complete prefix unfolder for contextual nets. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010. [HMY10b] S. Haddad, L. Mokdad, and S. Youcef. Selection of the Best composite Web Service Based on Quality of Service. In Proceedings of the 2nd International Symposium on Services Science and 3rd International Conference on Business Process and Services Computing (ISSSashBPSC'10), volume 177 of Lecture Notes in Informatics, pages 255--266, Leipzig, Germany, September-October 2010. Gesellschaft für Informatik. G. Scerri. Modélisation des clés de l'intrus. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010. [CDH10a] K. Chatterjee, L. Doyen, and Th. A. Henzinger. Expressiveness and Closure Properties for Quantitative Languages. Logical Methods in Computer Science, 6(3:10), September 2010. O. Bouissou, É. Goubault, J. Goubault-Larrecq, and S. Putot. A Generalization of P-boxes to Affine Arithmetic, and Applications to Static Analysis of Programs. In Proceedings of the 14th GAMM-IMACS International Symposium on Scientific Computing, Computer Arithmetic and Validated Numerics (SCAN'10), Lyon, France, September 2010. S. Demri. Counter Systems for Data Logics. In Proceedings of the 12th European Conference on Logics in Artificial Intelligence (JELIA'10), volume 6431 of Lecture Notes in Artificial Intelligence, page 10, Helsinki, Finland, September 2010. Springer. [MW10] N. Markey and J. Wijsen, editors. Proceedings of the 17th International Symposium on Temporal Representation and Reasoning (TIME'10), Paris, France, September 2010. IEEE Computer Society Press. doi: 10.1109/TIME.2010.4. [DKRS10a] S. Delaune, S. Kremer, M. D. Ryan, and G. Steel. A Formal Analysis of Authentication in the TPM. In Revised Selected Papers of the 7th International Workshop on Formal Aspects in Security and Trust (FAST'10), volume 6561 of Lecture Notes in Computer Science, pages 111--125, Pisa, Italy, September 2010. Springer. [BWA10] M. Baudet, B. Warinschi, and M. Abadi. Guessing Attacks and the Computational Soundness of Static Equivalence. Journal of Computer Security, 18(5):909--968, September 2010. [BG10] H. Benzina and J. Goubault-Larrecq. Some Ideas on Virtualized Systems Security, and Monitors. In Revised Selected Papers of the 5th International Workshop on Data Privacy Management and Autonomous Spontaneous Security (DPM'10) and 3rd International Workshop on Autonomous and Spontaneous Security (SETOP'10), volume 6514 of Lecture Notes in Computer Science, pages 244--258, Athens, Greece, September 2010. Springer. É. Lozes and J. Villard. A spatial equational logic for the applied π-calculus. Distributed Computing, 23(1):61--83, September 2010. [And10a] É. André. IMITATOR II: A Tool for Solving the Good Parameters Problem in Timed Automata. In Proceedings of the 12th International Workshops on Verification of Infinite State Systems (INFINITY'10), volume 39 of Electronic Proceedings in Theoretical Computer Science, pages 91--99, Singapore, September 2010. S. Demri. On Selective Unboundedness of VASS. In Proceedings of the 12th International Workshops on Verification of Infinite State Systems (INFINITY'10), volume 39 of Electronic Proceedings in Theoretical Computer Science, pages 1--15, Singapore, September 2010. A. Bušić, H. Djafri, and J.-M. Fourneau. Stochastic Bounds for Censored Markov Chains. In Proceedings of the 6th International Meeting on the Numerical Solution of Markov Chain (NSMC'10), Williamsburg, Virginia, USA, September 2010. [KRS10] S. Kremer, M. D. Ryan, and B. Smyth. Election verifiability in electronic voting protocols. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS'10), volume 6345 of Lecture Notes in Computer Science, pages 389--404, Athens, Greece, September 2010. Springer. M. Dahl, S. Delaune, and G. Steel. Formal Analysis of Privacy for Vehicular Mix-Zones. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS'10), volume 6345 of Lecture Notes in Computer Science, pages 55--70, Athens, Greece, September 2010. Springer. P. Bouyer, R. Brenguier, and N. Markey. Computing Equilibria in Two-Player Timed Games via Turn-Based Finite Games. In Proceedings of the 8th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'10), volume 6246 of Lecture Notes in Computer Science, pages 62--76, Vienna, Austria, September 2010. Springer. S. Balaguer, Th. Chatain, and S. Haar. A Concurrency-Preserving Translation from Time Petri Nets to Networks of Timed Automata. In Proceedings of the 17th International Symposium on Temporal Representation and Reasoning (TIME'10), pages 77--84, Paris, France, September 2010. IEEE Computer Society Press. B. Bérard, S. Haddad, and M. Sassolas. Real Time Properties for Interrupt Timed Automata. In Proceedings of the 17th International Symposium on Temporal Representation and Reasoning (TIME'10), pages 69--76, Paris, France, September 2010. IEEE Computer Society Press. B. Bollig, D. Kuske, and I. Meinecke. Propositional Dynamic Logic for Message-Passing Systems. Logical Methods in Computer Science, 6(3:16), September 2010. [DL10] S. Demri and D. Lugiez. Complexity of Modal Logics with Presburger Constraints. Journal of Applied Logic, 8(3):233--252, September 2010. O. Sankur. Model-checking robuste des automates temporisés via les machines à canaux. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010. [Sou10a] R. Soulat. Améliorations algorithmiques d'un moteur de model-checking et études de cas. Rapport de Master, Master 2 Recherche Informatique Paris Sud 11, September 2010. [Boi10] A. Boiret. Grammaires context-free pour les arbres sans rang. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010. [Dim10] J. Dimino. Sur les arbres de rang non borné avec données. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010. B. Monmege. Propriétés quantitatives des mots et des arbres -- Applications aux langages XML. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010. [ABMG10] S. Abiteboul, P. Bourhis, B. Marinoiu, and A. Galland. AXART -- Enabling Collaborative Work with AXML Artifacts. In Proceedings of the 36th International Conference on Very Large Data Bases (VLDB'10), volume 3 of Proceedings of the VLDB Endowment, pages 1553--1556, Singapore, September 2010. ACM Press. [BBC+10a] P. Baldan, A. Bruni, A. Corradini, B. König, and S. Schwoon. On the Computation of McMillan's Prefix for Contextual Nets and Graph Grammars. In Proceedings of the 5th International Conference on Graph Transformations (ICGT'10), volume 6372 of Lecture Notes in Computer Science, pages 91--106, Enschede, The Netherlands, September-October 2010. Springer. [Cyr10b] A. Cyriac. Temporal Logics for Concurrent Recursive Programs. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2010. [Haa10b] S. Haar. What Topology Tells us about Diagnosability in Partial Order Semantics. In Proceedings of the 10th Workshop on Discrete Event Systems (WODES'10), pages 221--226, Berlin, Germany, August-September 2010. IFAC. P. Gastin and F. Laroussinie, editors. Proceedings of the 21st International Conference on Concurrency Theory (CONCUR'10), volume 6269 of Lecture Notes in Computer Science. Springer, August-September 2010. [FHL10] D. Figueira, P. Hofman, and S. Lasota. Relating timed and register automata. In Proceedings of the 17th International Workshop on Expressiveness in Concurrency (EXPRESS'10), volume 41 of Electronic Proceedings in Theoretical Computer Science, pages 61--75, Paris, France, August 2010. [DKRS10b] S. Delaune, S. Kremer, M. D. Ryan, and G. Steel. A Formal Analysis of Authentication in the TPM (short paper). In Preliminary Proceedings of the 8th International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo'10), Paris, France, August 2010. Ph. Schnoebelen. Lossy Counter Machines Decidability Cheat Sheet. In Proceedings of the 4th Workshop on Reachability Problems in Computational Models (RP'10), volume 6227 of Lecture Notes in Computer Science, pages 51--75, Brno, Czech Republic, August 2010. Springer. [AF10a] É. André and L. Fribourg. Behavioral Cartography of Timed Automata. In Proceedings of the 4th Workshop on Reachability Problems in Computational Models (RP'10), volume 6227 of Lecture Notes in Computer Science, pages 76--90, Brno, Czech Republic, August 2010. Springer. [DDG+10] A. Degorre, L. Doyen, R. Gentilini, J.-F. Raskin, and S. Toruńczyk. Energy and Mean-Payoff Games with Imperfect Information. In Proceedings of the 19th Annual EACSL Conference on Computer Science Logic (CSL'10), volume 6247 of Lecture Notes in Computer Science, pages 260--274, Brno, Czech Republic, August 2010. Springer. [Sch10d] Ph. Schnoebelen. Revisiting Ackermann-Hardness for Lossy Counter Machines and Reset Petri Nets. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 616--628, Brno, Czech Republic, August 2010. Springer. K. Chatterjee, L. Doyen, H. Gimbert, and Th. A. Henzinger. Randomness for Free. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 246--257, Brno, Czech Republic, August 2010. Springer. G. Fontaine and Th. Place. Classes of trees definable in the μ-calculus. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 381--392, Brno, Czech Republic, August 2010. Springer. [CDH10b] K. Chatterjee, L. Doyen, and Th. A. Henzinger. Qualitative Analysis of Partially-observable Markov Decision Processes. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 258--269, Brno, Czech Republic, August 2010. Springer. [OU10] J. Olschewski and M. Ummels. The Complexity of Finding Reset Words in Finite Automata. In Proceedings of the 35th International Symposium on Mathematical Foundations of Computer Science (MFCS'10), volume 6281 of Lecture Notes in Computer Science, pages 568--579, Brno, Czech Republic, August 2010. Springer. [CDE+10] K. Chatterjee, L. Doyen, H. Edelsbrunner, Th. A. Henzinger, and P. Rannou. Mean-Payoff Automaton Expressions. In Proceedings of the 21st International Conference on Concurrency Theory (CONCUR'10), volume 6269 of Lecture Notes in Computer Science, pages 269--283, Paris, France, August-September 2010. Springer. P. Bouyer, R. Brenguier, and N. Markey. Nash Equilibria for Reachability Objectives in Multi-player Timed Games. In Proceedings of the 21st International Conference on Concurrency Theory (CONCUR'10), volume 6269 of Lecture Notes in Computer Science, pages 192--206, Paris, France, August-September 2010. Springer. [CS10a] P. Chambart and Ph. Schnoebelen. Computing blocker sets for the Regular Post Embedding Problem. In Proceedings of the 14th International Conference on Developments in Language Theory (DLT'10), volume 6224 of Lecture Notes in Computer Science, pages 136--147, London, Ontario, Canada, August 2010. Springer. [HNS10] P.-C. Héam, C. Nicaud, and S. Schmitz. Parametric Random Generation of Deterministic Tree Automata. Theoretical Computer Science, 411(38-39):3469--3480, August 2010. [JR10] F. Jacquemard and M. Rusinowitch. Rewrite-based verification of XML updates. In Proceedings of the 12th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming (PPDP'10), pages 119--130, Hagenberg, Austria, July 2010. ACM Press. [NSV10] A. Nash, L. Segoufin, and V. Vianu. Views and queries: Determinacy and rewriting. ACM Transactions on Database Systems, 35(3), July 2010. J.-L. Carré. Analyse statique de programmes multi-thread pour l'embarqué. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2010. [Aks10] S. Akshay. Spécification et vérification pour des systèmes distribués et temporisés. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2010. M. Dahl, S. Delaune, and G. Steel. Formal Analysis of Privacy for Vehicular Mix-Zones. In Proceedings of the Workshop on Foundations of Security and Privacy (FCS-PrivMod'10), pages 55--70, Edinburgh, Scotland, UK, July 2010. S. Schmitz. On the Computational Complexity of Dominance Links in Grammatical Formalisms. In Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics (ACL'10), pages 514--524, Uppsala, Sweden, July 2010. Association for Computational Linguistics. V. Cheval, H. Comon-Lundh, and S. Delaune. Automating security analysis: symbolic equivalence of constraint systems. In Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR'10), volume 6173 of Lecture Notes in Artificial Intelligence, pages 412--426, Edinburgh, Scotland, UK, July 2010. Springer-Verlag. J. Goubault-Larrecq. Noetherian Spaces in Verification. In Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP'10) -- Part II, volume 6199 of Lecture Notes in Computer Science, pages 2--21, Bordeaux, France, July 2010. Springer. [CS10b] P. Chambart and Ph. Schnoebelen. Pumping and Counting on the Regular Post Embedding Problem. In Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP'10) -- Part II, volume 6199 of Lecture Notes in Computer Science, pages 64--75, Bordeaux, France, July 2010. Springer. K. Chatterjee and L. Doyen. Energy Parity Games. In Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP'10) -- Part II, volume 6199 of Lecture Notes in Computer Science, pages 599--610, Bordeaux, France, July 2010. Springer. B. Bollig, P. Gastin, B. Monmege, and M. Zeitoun. Pebble weighted automata and transitive closure logics. In Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP'10) -- Part II, volume 6199 of Lecture Notes in Computer Science, pages 587--598, Bordeaux, France, July 2010. Springer. S. Ciobâcă and V. Cortier. Protocol composition for arbitrary primitives. In Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF'10), pages 322--336, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press. M. Arnaud, V. Cortier, and S. Delaune. Modeling and Verifying Ad Hoc Routing Protocols. In Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF'10), pages 59--74, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press. [BKK+10] B. Bollig, J.-P. Katoen, C. Kern, M. Leucker, D. Neider, and D. R. Piegdon. libalf: the Automata Learning Framework. In Proceedings of the 22nd International Conference on Computer Aided Verification (CAV'10), volume 6174 of Lecture Notes in Computer Science, pages 360--364, Edinburgh, Scotland, UK, July 2010. Springer. N. Schweikardt and L. Segoufin. Addition-invariant FO and regularity. In Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science (LICS'10), pages 273--282, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press. Th. Place and L. Segoufin. Deciding definability in FO_2(<) on trees. In Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science (LICS'10), pages 253--262, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press. J. Goubault-Larrecq. ωQRB-Domains and the Probabilistic Powerdomain. In Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science (LICS'10), pages 352--361, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press. L. Barguñó, C. Creus, G. Godoy, F. Jacquemard, and C. Vacher. The Emptiness Problem for Tree Automata with Global Constraints. In Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science (LICS'10), pages 263--272, Edinburgh, Scotland, UK, July 2010. IEEE Computer Society Press. P. Gastin and D. Kuske. Uniform satisfiability problem for local temporal logics over Mazurkiewicz traces. Information and Computation, 208(7):797--816, July 2010. [Cyr10a] A. Cyriac. A New Version of Focus Games for LTL Satisfiability. In Proceedings of the Workshop on Comparing Logical Decision Methods (CLoDeM'10), Edinburgh, Scotland, UK, July 2010. [BJL+10] Th. Brihaye, M. Jungers, S. Lasaulce, N. Markey, and G. Oreiby. Using Model Checking for Analyzing Distributed Power Control Problems. EURASIP Journal on Wireless Communications and Networking, 2010(861472), June 2010. doi: 10.1155/2010/861472. [DHLN10] L. Doyen, Th. A. Henzinger, A. Legay, and D. Nickovic. Robustness of Sequential Circuits. In Proceedings of the 10th International Conference on Application of Concurrency to System Design (ACSD'10), pages 77--84, Braga, Portugal, June 2010. IEEE Computer Society Press. D. El Hog-Benzina, S. Haddad, and R. Hennicker. Process Refinement and Asynchronous Composition with Modalities. In Proceedings of the 2nd International Workshop on Abstractions for Petri Nets and Other Models of Concurrency (APNOC'10), Braga, Portugal, June 2010. [HMY10a] S. Haddad, L. Mokdad, and S. Youcef. Response time of BPEL4WS constructors. In Proceedings of the 15th IEEE Symposium on Computers and Communications (ISCC'10), pages 695--700, Riccione, Italy, June 2010. IEEE Computer Society Press. [CF10] Th. Chatain and É. Fabre. Factorization Properties of Symbolic Unfoldings of Colored Petri Nets. In Proceedings of the 31st International Conference on Applications and Theory of Petri Nets (PETRI NETS'10), volume 6128 of Lecture Notes in Computer Science, pages 165--184, Braga, Portugal, June 2010. Springer. L. Libkin and C. Sirangelo. Reasoning about XML with temporal logics and automata. Journal of Applied Logic, 8(2):210--232, June 2010. [BH10b] B. Bollig and L. Hélouët. Realizability of Dynamic MSC Languages. In Proceedings of the 5th International Computer Science Symposium in Russia (CSR'10), volume 6072 of Lecture Notes in Computer Science, pages 48--59, Kazan, Russia, June 2010. Springer. [BKKL10a] B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. Learning Communicating Automata from MSCs. IEEE Transactions on Software Engineering, 36(3):390--408, May-June 2010. doi: 10.1109/TSE.2009.89. Th. Chatain and C. Jard. Sémantique concurrente symbolique des réseaux de Petri saufs et dépliages finis des réseaux temporels. In Actes de la 10ème Conférence Internationale sur les NOuvelles TEchnologies de la RÉpartition (NOTERE'10), Tozeur, Tunisia, May-June 2010. IEEE Computer Society Press. [DKR10b] S. Delaune, S. Kremer, and M. D. Ryan. Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster. In Towards Trustworthy Elections -- New Directions in Electronic Voting, volume 6000 of Lecture Notes in Computer Science, pages 289--309. Springer, May 2010. [DLS10] S. Demri, R. Lazić, and A. Sangnier. Model checking memoryful linear-time logics over one-counter automata. Theoretical Computer Science, 411(22-24):2298--2316, May 2010. P. Bouyer, U. Fahrenberg, K. G. Larsen, and N. Markey. Timed Automata with Observers under Energy Constraints. In Proceedings of the 13th International Conference on Hybrid Systems: Computation and Control (HSCC'10), pages 61--70, Stockholm, Sweden, April 2010. ACM Press. J. Goubault-Larrecq. De Groot Duality and Models of Choice: Angels, Demons, and Nature. Mathematical Structures in Computer Science, 20(2):169--237, April 2010. [CKW10] V. Cortier, S. Kremer, and B. Warinschi. A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems. Journal of Automated Reasoning, 46(3-4):225--259, April 2010. [BH10a] M. Ben Hmida and S. Haddad. Client Synthesis for Aspect Oriented Web Services. In Revised Selected Papers of the 15th Monterey Workshop on Foundations of Computer Software (MONTEREY'08), volume 6028 of Lecture Notes in Computer Science, pages 24--42, Budapest, Hungary, April 2010. Springer. [RHS10] L. Recalde, S. Haddad, and M. Silva. Continuous Petri Nets: Expressive Power and Decidability Issues. International Journal of Foundations of Computer Science, 21(2):235--256, April 2010. [VLC10] J. Villard, É. Lozes, and C. Calcagno. Tracking Heaps that Hop with Heap-Hop. In Proceedings of the 16th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'10), volume 6015 of Lecture Notes in Computer Science, pages 275--279, Paphos, Cyprus, March 2010. Springer. S. Demri and A. Sangnier. When Model-Checking Freeze LTL over Counter Machines Becomes Decidable. In Proceedings of the 13th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'10), volume 6014 of Lecture Notes in Computer Science, pages 176--190, Paphos, Cyprus, March 2010. Springer. [tCF10] B. ten Cate and G. Fontaine. An Easy Completeness Proof for the Modal μ-Calculus on Finite Trees. In Proceedings of the 13th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'10), volume 6014 of Lecture Notes in Computer Science, pages 161--175, Paphos, Cyprus, March 2010. Springer. [CS10c] P. Chambart and Ph. Schnoebelen. Toward a compositional theory of leftist grammars and transformations. In Proceedings of the 13th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'10), volume 6014 of Lecture Notes in Computer Science, pages 237--251, Paphos, Cyprus, March 2010. Springer. [DKR10a] S. Delaune, S. Kremer, and M. D. Ryan. Symbolic bisimulation for the applied pi calculus. Journal of Computer Security, 18(2):317--377, March 2010. R. Bonnet. Well-structured Petri-nets extensions with data. Rapport de Master, Master Computer Science, EPFL, Lausanne, Switzerland, March 2010. B. ten Cate and L. Segoufin. Transitive Closure Logic, Nested Tree Walking Automata, and XPath. Journal of the ACM, 57(3), March 2010. L. Segoufin, editor. Proceedings of the 13th International Conference on Database Theory (ICDT'10), March 2010. S. Abiteboul, T.-H. H. Chan, E. Kharlamov, W. Nutt, and P. Senellart. Aggregate queries for discrete and continuous probabilistic XML. In Proceedings of the 13th International Conference on Database Theory (ICDT'10), pages 50--61, Lausanne, Switzerland, March 2010. ACM Press. [Fig10a] D. Figueira. Forward-XPath and extended register automata on data-trees. In Proceedings of the 13th International Conference on Database Theory (ICDT'10), pages 230--240, Lausanne, Switzerland, March 2010. ACM Press. [DR10b] L. Doyen and J.-F. Raskin. Antichains Algorithms for Finite Automata. In Proceedings of the 16th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'10), volume 6015 of Lecture Notes in Computer Science, pages 2--22, Paphos, Cyprus, March 2010. Springer. P. Bouyer, F. Chevalier, and N. Markey. On the Expressiveness of TPTL and MTL. Information and Computation, 208(2):97--116, February 2010. [AHL+10] A. Antonik, M. Huth, K. G. Larsen, U. Nyman, and A. Wąsowski. Modal and mixed specifications: key decision problems and their complexities. Mathematical Structures in Computer Science, 10(1):75--103, February 2010. [GAMS10] A. Galland, S. Abiteboul, A. Marian, and P. Senellart. Corroborating information from disagreeing views. In Proceedings of the 3rd International Conference on Web Search and Web Data Mining (WSDM'10), pages 131--140, New York, New York, USA, February 2010. ACM Press. S. Schmitz. An Experimental Ambiguity Detection Tool. Science of Computer Programming, 75(1-2):71--84, January 2010. [CLPV10] R. Chadha, A. Legay, P. Prabhakar, and M. Viswanathan. Complexity bounds for the verification of real-time software. In Proceedings of the 11th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'10), volume 5944 of Lecture Notes in Computer Science, pages 95--111, Madrid, Spain, January 2010. Springer. [BBC10b] P. Bouyer, Th. Brihaye, and F. Chevalier. O-Minimal Hybrid Reachability Games. Logical Methods in Computer Science, 6(1:1), January 2010. A. Finkel and A. Sangnier. Mixing coverability and reachability to analyze VASS with one zero-test. In Proceedings of the 36th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM'10), volume 5901 of Lecture Notes in Computer Science, pages 394--406, Špindlerův Mlýn, Czech Republic, January 2010. Springer. [BKKL10b] B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. SMA---The Smyle Modeling Approach. Computing and Informatics, 29(1):45--72, 2010. [ZBH10] M. Zargayouna, F. Balbo, and S. Haddad. Agents Secure Interaction in Data Driven Languages. In Revised Selected Papers of the 2nd Workshop on LAnguages, methodologies and Development tools for multi-agent systemS (LADS'09), volume 6039 of Lecture Notes in Computer Science, pages 72--91, Turin, Italy, 2010. Springer. [CCZ10] H. Comon-Lundh, V. Cortier, and E. Zălinescu. Deciding security properties for cryptographic protocols. Application to key cycles. ACM Transactions on Computational Logic, 11(2), January 2010. [AF10b] P. Arnoux and A. Finkel. Using mental imagery processes for teaching and research in mathematics and computer science. International Journal of Mathematical Education in Science and Technology, 41(2):229--242, January 2010. doi: 10.1080/00207390903372429. [Ber10] D. Berwanger. Infinite Coordination Games. In Logic and the Foundations of Game and Decision Theory (LOFT8), volume 6006 of Lecture Notes in Artificial Intelligence, pages 1--19. Springer, 2010. [CDH10c] K. Chatterjee, L. Doyen, and Th. A. Henzinger. Quantitative Languages. ACM Transactions on Computational Logic, 11(4), 2010. [MLRS10] N. Markey, S. Li, J.-F. Raskin, and M. Stoelinga. Synthesizing controllers with bounded resources. Deliverable QUASIMODO 3.4 (ICT-FP7-STREP-214755), January 2010. L. Libkin and C. Sirangelo. Disjoint pattern matching and implication in strings. Information Processing Letters, 110(4):143--147, January 2010. [DFGvD10] S. Demri, A. Finkel, V. Goranko, and G. van Drimmelen. Model-checking CTL^* over Flat Presburger Counter Systems. Journal of Applied Non-Classical Logics, 20(4):313--344, 2010. doi: 10.3166/jancl.20.313-344. [CDMP09] F. Chevalier, D. D'Souza, R. M. Matteplackel, and P. Prabhakar. Automata and logics over finitely varying functions. Annals of Pure and Applied Logics, 161(3):324--336, December 2009. doi: 10.1016/j.apal.2009.07.007. [Mer09] A. Mercier. Contributions à l'analyse automatique des protocoles cryptographiques en présence de propriétés algébriques : protocoles de groupe, équivalence statique. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2009. S. Bursuc. Contraintes de déductibilité dans une algèbre quotient: réduction de modèles et applications à la sécurité. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2009. J. Goubault-Larrecq. Logic Wins!. In Proceedings of the 13th Asian Computing Science Conference (ASIAN'09), volume 5913 of Lecture Notes in Computer Science, pages 1--16, Seoul, Korea, December 2009. Springer. S. Demri, M. Jurdziński, O. Lachish, and R. Lazić. The covering and boundedness problems for branching vector addition systems. In Proceedings of the 29th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'09), volume 4 of Leibniz International Proceedings in Informatics, pages 181--192, Kanpur, India, December 2009. Leibniz-Zentrum für Informatik. doi: 10.4230/LIPIcs.FSTTCS.2009.2317. S. Delaune, S. Kremer, and O. Pereira. Simulation based security in the applied pi calculus. In Proceedings of the 29th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'09), volume 4 of Leibniz International Proceedings in Informatics, pages 169--180, Kanpur, India, December 2009. Leibniz-Zentrum für Informatik. J. Villard, É. Lozes, and C. Calcagno. Proving Copyless Message Passing. In Proceedings of the 7th Asian Symposium on Programming Languages and Systems (APLAS'09), volume 5904 of Lecture Notes in Computer Science, pages 194--209, Seoul, Korea, December 2009. Springer. [BBC09] P. Bouyer, Th. Brihaye, and F. Chevalier. Weighted O-Minimal Hybrid Systems. Annals of Pure and Applied Logics, 161(3):268--288, December 2009. [KMT09a] S. Kremer, A. Mercier, and R. Treinen. Reducing Equational Theories for the Decision of Static Equivalence. In Proceedings of the 13th Asian Computing Science Conference (ASIAN'09), volume 5913 of Lecture Notes in Computer Science, pages 94--108, Seoul, Korea, December 2009. Springer. [BDC09] S. Bursuc, S. Delaune, and H. Comon-Lundh. Deducibility constraints. In Proceedings of the 13th Asian Computing Science Conference (ASIAN'09), volume 5913 of Lecture Notes in Computer Science, pages 24--38, Seoul, Korea, December 2009. Springer. [BDL09] R. Brochenin, S. Demri, and É. Lozes. Reasoning about sequences of memory states. Annals of Pure and Applied Logics, 161(3):305--323, December 2009. S. Demri and R. Gascon. The Effects of Bounding Syntactic Resources on Presburger LTL. Journal of Logic and Computation, 19(6):1541--1575, December 2009. doi: 10.1093/logcom/exp037. [ASV09b] S. Abiteboul, L. Segoufin, and V. Vianu. Static Analysis of Active XML Systems. ACM Transactions on Database Systems, 34(4), December 2009. S. Haar. Qualitative Diagnosability of Labeled Petri Nets Revisited. In Proceedings of the Joint 48th IEEE Conference on Decision and Control (CDC'09) and 28th Chinese Control Conference (CCC'09), pages 1248--1253, Shanghai, China, December 2009. IEEE Control System Society. [Bou09a] F. Bouchy. Logiques et modèles pour la vérification de systèmes infinis. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2009. [Szn09] N. Sznajder. Synthèse de systèmes distribués ouverts. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2009. B. Smyth, M. D. Ryan, S. Kremer, and M. Kourjieh. Election verifiability in electronic voting protocols (Preliminary version). In Proceedings of the 4th Benelux Workshop on Information and System Security (WISSEC'09), Louvain-la-Neuve, Belgium, November 2009. [BFS09a] F. Bouchy, A. Finkel, and P. San Pietro. Dense-choice Counter Machines Revisited. In Proceedings of the 11th International Workshops on Verification of Infinite State Systems (INFINITY'09), volume 10 of Electronic Proceedings in Theoretical Computer Science, pages 3--22, Bologna, Italy, November 2009. É. André and L. Fribourg. An Inverse Method for Policy-Iteration Based Algorithms. In Proceedings of the 11th International Workshops on Verification of Infinite State Systems (INFINITY'09), volume 10 of Electronic Proceedings in Theoretical Computer Science, pages 44--61, Bologna, Italy, November 2009. S. Haddad, L. Mokdad, and S. Youcef. Bornes du temps de réponse des services Web composites. In Actes du 7ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'09), volume 43 of Journal Européen des Systèmes Automatisés, pages 969--983, Nantes, France, November 2009. Hermès. [ACD+09a] É. André, Th. Chatain, O. De Smet, L. Fribourg, and S. Ruel. Synthèse de contraintes temporisées pour une architecture d'automatisation en réseau. In Actes du 7ème Colloque sur la Modélisation des Systèmes Réactifs (MSR'09), volume 43 of Journal Européen des Systèmes Automatisés, pages 1049--1064, Nantes, France, November 2009. Hermès. G. Steel. Towards a Formal Analysis of the SeVeCoM API. In Proceedings of the 7th Conference on Embedded Security in Cars (ESCAR'09), Düsseldorf, Germany, November 2009. [LCE+09] LIAFA, CRIL, EDF, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F2.2 : Algorithmes de vérification -- Rapport final, November 2009. 25 pages. [FLS09a] A. Finkel, É. Lozes, and A. Sangnier. Towards Model Checking Pointer Systems. In Revised Selected Papers of the International Conference on Infinity in Logic & Computation (ILC'07), volume 5489 of Lecture Notes in Artificial Intelligence, pages 56--82, Cape Town, South Africa, October 2009. Springer-Verlag. [AKSS09] S. Abiteboul, B. Kimelfeld, Y. Sagiv, and P. Senellart. On the expressiveness of probabilistic XML models. The VLDB Journal, 18(5):1041--1064, October 2009. [CM09] F. Cassez and N. Markey. Control of Timed Systems. In Communicating Embedded Systems -- Software and Design, chapter 3, pages 83--120. Wiley-ISTE, October 2009. S. Donatelli and S. Haddad. Quantitative Verification of Markov Chains. In Communicating Embedded Systems -- Software and Design, chapter 5, pages 139--163. Wiley-ISTE, October 2009. N. Chamseddine. Analyse quantitative parametrée d'automates temporisés probabilistes. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2009. V. Cheval, H. Comon-Lundh, and S. Delaune. A decision procedure for proving observational equivalence. In Preliminary Proceedings of the 7th International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo'09), Bologna, Italy, October 2009. J. Dimino. Les systèmes à canaux non-fiables vus comme des transducteurs. Rapport de stage de M1, Master Parisien de Recherche en Informatique, Paris, France, October 2009. [FLS09b] R. Focardi, F. L. Luccio, and G. Steel. Blunting Differential Attacks on PIN Processing APIs. In Proceedings of the 14th Nordic Workshop on Secure IT Systems (NordSec'09), volume 5838 of Lecture Notes in Computer Science, pages 88--103, Oslo, Norway, October 2009. Springer. Y. Boichut, R. Courbis, P.-C. Héam, and O. Kouchnarenko. Handling Non-left Linear Rules when Completing Tree Automata. International Journal of Foundations of Computer Science, 20(5):837--849, October 2009. [ACEF09] É. André, Th. Chatain, E. Encrenaz, and L. Fribourg. An Inverse Method for Parametric Timed Automata. International Journal of Foundations of Computer Science, 20(5):819--836, October 2009. [DHL09] F. Dadeau, P.-C. Héam, and J. Levrey. On the Use of Uniform Random Generation of Automata for Testing. In Proceedings of the 5th Workshop on Model-Based Testing (MBT'09), volume 253 of Electronic Notes in Theoretical Computer Science, pages 37--51, York, UK, October 2009. Elsevier Science Publishers. M. Benedikt and L. Segoufin. Regular tree languages definable in FO and in FO_mod. ACM Transactions on Computational Logic, 11(1), October 2009. [DBB+09] A. David, G. Behrmann, P. Bulychev, J. Byg, Th. Chatain, K. G. Larsen, P. Pettersson, J. I. Rasmussen, J. Srba, W. Yi, K. Y. Joergensen, D. Lime, M. Magnin, O. H. Roux, and L.-M. Traonouez. Tools for Model-Checking Timed Systems. In Communicating Embedded Systems -- Software and Design, chapter 6, pages 165--225. Wiley-ISTE, October 2009. [ASV09a] S. Abiteboul, L. Segoufin, and V. Vianu. Modeling and Verifying Active XML Artifacts. IEEE Data Engineering Bulletin, 32(3):10--15, September 2009. V. Cheval. Algorithme de décision de l'équivalence symbolique de systèmes de contraintes. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2009. R. Brenguier. Calcul des équilibres de Nash dans les jeux temporisés. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2009. [BCH+09] C. Boutrous-Saab, D. Coulibaly, S. Haddad, T. Melliti, P. Moreaux, and S. Rampacek. An Integrated Framework for Web Services Orchestration. International Journal of Web Services Research, 6(4):1--29, September 2009. É. André, L. Fribourg, and J. Sproston. An Extension of the Inverse Method to Probabilistic Timed Automata. In Proceedings of the 9th International Workshop on Automated Verification of Critical Systems (AVoCS'09), volume 23 of Electronic Communications of the EASST, Swansea, UK, September 2009. European Association of Software Science and Technology. [CDL09] Th. Chatain, A. David, and K. G. Larsen. Playing Games with Timed Games. In Proceedings of the 3rd IFAC Conference on Analysis and Design of Hybrid Systems (ADHS'09), Zaragoza, Spain, September 2009. [BHK09] Y. Boichut, P.-C. Héam, and O. Kouchnarenko. How to Tackle Integer Weighted Automata Positivity. In Proceedings of the 3rd Workshop on Reachability Problems in Computational Models (RP'09), volume 5797 of Lecture Notes in Computer Science, pages 79--92, Palaiseau, France, September 2009. Springer. [BCDL09] P. Bulychev, Th. Chatain, A. David, and K. G. Larsen. Checking simulation relation between timed game automata. In Proceedings of the 7th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'09), volume 5813 of Lecture Notes in Computer Science, pages 73--87, Budapest, Hungary, September 2009. Springer. S. Haddad and N. Pekergin. Using Stochastic Comparison for Efficient Model Checking of Uncertain Markov Chains. In Proceedings of the 6th International Conference on Quantitative Evaluation of Systems (QEST'09), pages 177--186, Budapest, Hungary, September 2009. IEEE Computer Society Press. [CFLS09] M. Centenaro, R. Focardi, F. L. Luccio, and G. Steel. Type-based Analysis of PIN Processing APIs. In Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS'09), volume 5789 of Lecture Notes in Computer Science, pages 53--68, Saint Malo, France, September 2009. Springer. V. Cortier and G. Steel. A generic security API for symmetric key management on cryptographic devices. In Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS'09), volume 5789 of Lecture Notes in Computer Science, pages 605--620, Saint Malo, France, September 2009. Springer. [CAM09] B. Cautis, S. Abiteboul, and T. Milo. Reasoning about XML update constraints. Journal of Computer and System Sciences, 75(6):336--358, September 2009. [BHR09a] A. Bouillard, S. Haar, and S. Rosario. Critical paths in the Partial Order Unfolding of a Stochastic Petri Net. In Proceedings of the 7th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'09), volume 5813 of Lecture Notes in Computer Science, pages 43--57, Budapest, Hungary, September 2009. Springer. [BDMR09] P. Bouyer, M. Duflot, N. Markey, and G. Renault. Measuring Permissivity in Finite Games. In Proceedings of the 20th International Conference on Concurrency Theory (CONCUR'09), volume 5710 of Lecture Notes in Computer Science, pages 196--210, Bologna, Italy, September 2009. Springer. S. Ciobâcă and V. Cortier. Algorithmes pour l'équivalence statique. Deliverable AVOTE 2.1 (ANR-07-SESU-002), September 2009. 17 pages. M. Boreale and S. Kremer, editors. Proceedings of the 7th International Workshop on Security Issues in Concurrency (SecCo'09), volume 7 of Electronic Proceedings in Theoretical Computer Science, Bologna, Italy, August 2009. doi: 10.4204/EPTCS.7. D. Figueira and L. Segoufin. Future-looking logics on data words and trees. In Proceedings of the 34th International Symposium on Mathematical Foundations of Computer Science (MFCS'09), volume 5734 of Lecture Notes in Computer Science, pages 331--343, Novy Smokovec, Slovakia, August 2009. Springer. [KAS09] G. Keighren, D. Aspinall, and G. Steel. Towards a Type System for Security APIs. In Revised Selected Papers of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'09), volume 5511 of Lecture Notes in Computer Science, pages 173--192, York, UK, August 2009. Springer. S. Fröschle and G. Steel. Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data. In Revised Selected Papers of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'09), volume 5511 of Lecture Notes in Computer Science, pages 92--106, York, UK, August 2009. Springer. [LA09] D. Longuet and M. Aiguier. Integration Testing from Structured First-Order Specifications via Deduction Modulo. In Proceedings of the 6th International Colloquium on Theoretical Aspects of Computing (ICTAC'09), volume 5684 of Lecture Notes in Computer Science, pages 261--276, Kuala Lumpur, Malaysia, August 2009. Springer. É. André. IMITATOR: A Tool for Synthesizing Constraints on Timing Bounds of Timed Automata. In Proceedings of the 6th International Colloquium on Theoretical Aspects of Computing (ICTAC'09), volume 5684 of Lecture Notes in Computer Science, pages 336--342, Kuala Lumpur, Malaysia, August 2009. Springer. [CDK09c] S. Ciobâcă, S. Delaune, and S. Kremer. Computing knowledge in security protocols under convergent equational theories. In Proceedings of the 22nd International Conference on Automated Deduction (CADE'09), volume 5663 of Lecture Notes in Computer Science, pages 355--370, Montreal, Canada, August 2009. Springer. [KP09] S. Kremer and P. Panangaden, editors. Proceedings of the 6th International Workshop on Security Issues in Concurrency (SecCo'08), volume 242 of Electronic Notes in Theoretical Computer Science, Toronto, Canada, August 2009. Elsevier Science Publishers. [EF09] E. Encrenaz and A. Finkel. Automatic verification of counter systems with ranking functions. In Joint Proceedings of the 8th, 9th and 10th International Workshops on Verification of Infinite State Systems (INFINITY'06,'07,'08), volume 239 of Electronic Notes in Theoretical Computer Science, pages 85--103. Elsevier Science Publishers, July 2009. [DKR09] S. Delaune, S. Kremer, and M. D. Ryan. Verifying Privacy-type Properties of Electronic Voting Protocols. Journal of Computer Security, 17(4):435--487, July 2009. [BFS09b] F. Bouchy, A. Finkel, and A. Sangnier. Reachability in Timed Counter Systems. In Joint Proceedings of the 8th, 9th and 10th International Workshops on Verification of Infinite State Systems (INFINITY'06,'07,'08), volume 239 of Electronic Notes in Theoretical Computer Science, pages 167--178. Elsevier Science Publishers, July 2009. [HV09a] P. Habermehl and T. Vojnar, editors. Joint Proceedings of the 8th, 9th and 10th International Workshops on Verification of Infinite State Systems (INFINITY'06,'07,'08), volume 239 of Electronic Notes in Theoretical Computer Science. Elsevier Science Publishers, July 2009. É. André. Everything You Always Wanted to Know About IMITATOR (But Were Afraid to Ask). Research Report LSV-09-20, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2009. 11 pages. C. Areces and D. Figueira. Which Semantics for Neighbourhood Semantics? In Proceedings of the 21st International Joint Conference on Artificial Intelligence (IJCAI'09), pages 671--676, Pasadena, California, USA, July 2009. AAAI Press. B. Bérard, S. Haddad, and M. Sassolas. Verification on Interrupt Timed Automata. Research Report LSV-09-16, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2009. 16 pages. [HN09] P.-C. Héam and C. Nicaud. Seed: an Easy-to-Use Random Generator of Recursive Data Structures for Testing. Research Report LSV-09-15, Laboratoire Spécification et Vérification, ENS Cachan, France, July 2009. 16 pages. [CDK09b] S. Ciobâcă, S. Delaune, and S. Kremer. Computing knowledge in security protocols under convergent equational theories. In Preliminary Proceedings of the 4th International Workshop on Security and Rewriting Techniques (SecReT'09), pages 47--58, Port Jefferson, New York, USA, July 2009. M. Arnaud, V. Cortier, and S. Delaune. Modeling and Verifying Ad Hoc Routing Protocol. In Preliminary Proceedings of the 4th International Workshop on Security and Rewriting Techniques (SecReT'09), pages 33--46, Port Jefferson, New York, USA, July 2009. [KMT09b] S. Kremer, A. Mercier, and R. Treinen. Reducing Equational Theories for the Decision of Static Equivalence (Preliminary Version). In Preliminary Proceedings of the 4th International Workshop on Security and Rewriting Techniques (SecReT'09), Port Jefferson, New York, USA, July 2009. [AFGM09] C. Areces, D. Figueira, D. Gorín, and S. Mera. Tableaux and Model Checking for Memory Logics. In Proceedings of the 18th International Workshop on Theorem Proving with Analytic Tableaux and Related Methods (TABLEAUX'09), volume 5607 of Lecture Notes in Artificial Intelligence, pages 47--61, Oslo, Norway, July 2009. Springer. [CHK09] R. Courbis, P.-C. Héam, and O. Kouchnarenko. TAGED Approximations for Veriying Temporal Patterns. In Proceedings of the 14th International Conference on Implementation and Application of Automata (CIAA'09), volume 5642 of Lecture Notes in Computer Science, pages 135--144, Sydney, Australia, July 2009. Springer-Verlag. P.-C. Héam, C. Nicaud, and S. Schmitz. Random Generation of Deterministic Tree (Walking) Automata. In Proceedings of the 14th International Conference on Implementation and Application of Automata (CIAA'09), volume 5642 of Lecture Notes in Computer Science, pages 115--124, Sydney, Australia, July 2009. Springer-Verlag. Th. Place and L. Segoufin. A decidable characterization of Locally Testable Tree Languages. In Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP'09), volume 5556 of Lecture Notes in Computer Science, pages 285--296, Rhodes, Greece, July 2009. Springer. A. Finkel and J. Goubault-Larrecq. Forward Analysis for WSTS, Part II: Complete WSTS. In Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP'09), volume 5556 of Lecture Notes in Computer Science, pages 188--199, Rhodes, Greece, July 2009. Springer. [BBBB09] C. Baier, N. Bertrand, P. Bouyer, and Th. Brihaye. When are Timed Automata Determinizable? In Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP'09), volume 5556 of Lecture Notes in Computer Science, pages 43--54, Rhodes, Greece, July 2009. Springer. P. Bouyer and V. Forejt. Reachability in Stochastic Timed Games. In Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP'09), volume 5556 of Lecture Notes in Computer Science, pages 103--114, Rhodes, Greece, July 2009. Springer. V. Cortier and S. Delaune. A method for proving observational equivalence. In Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09), pages 266--276, Port Jefferson, New York, USA, July 2009. IEEE Computer Society Press. [BHKL09] B. Bollig, P. Habermehl, C. Kern, and M. Leucker. Angluin-Style Learning of NFA. In Proceedings of the 21st International Joint Conference on Artificial Intelligence (IJCAI'09), pages 1004--1009, Pasadena, California, USA, July 2009. AAAI Press. G. Steel. Computational Soundness for APIs. In Proceedings of the 5th Workshop on Formal and Computational Cryptography (FCC'09), Port Jefferson, New York, USA, July 2009. L. Libkin and C. Sirangelo. Open and closed world assumptions in data exchange. In Proceedings of the 22nd International Workshop Description Logic (DL'09), volume 477 of CEUR Workshop Proceedings, pages 1--6, Oxford, UK, July 2009. RWTH Aachen, Germany. [BYBJ09] N. Ben Youssef, A. Bouhoula, and F. Jacquemard. Automatic Verification of Conformance of Firewall Configurations to Security Policies. In Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC'09), pages 526 -- 531, Sousse, Tunisia, July 2009. IEEE Computer Society Press. [LVN09] F. Laroussinie, F. Vaandrager, and M. Neuhäußer. Extended timed automata for scheduling. Deliverable QUASIMODO 3.5 (ICT-FP7-STREP-214755), July 2009. [MBD+09] N. Markey, J. Berendsen, A. David, T. Han, H. Hermanns, K. G. Larsen, and M. Neuhäußer. Symbolic data structures and analysis of models with multiple quantitative aspects. Deliverable QUASIMODO 2.2 (ICT-FP7-STREP-214755), July 2009. [ABGM09] S. Abiteboul, P. Bourhis, A. Galland, and B. Marinoiu. The AXML Artifact Model. In Proceedings of the 16th International Symposium on Temporal Representation and Reasoning (TIME'09), pages 11--17, Brixen-Bressanone, Italy, July 2009. IEEE Computer Society Press. [AP09] S. Abiteboul and N. Polyzotis. Searching Shared Content in Communities with the Data Ring. IEEE Data Engineering Bulletin, 32(2):44--51, June 2009. [AEF09] É. André, E. Encrenaz, and L. Fribourg. Synthesizing Parametric Constraints on Various Case Studies Using IMITATOR. Research Report LSV-09-13, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2009. 18 pages. [ABC09] M. Abadi, B. Blanchet, and H. Comon-Lundh. Models and Proofs of Protocol Security: A Progress Report. In Proceedings of the 21st International Conference on Computer Aided Verification (CAV'09), volume 5643 of Lecture Notes in Computer Science, pages 35--49, Grenoble, France, June-July 2009. Springer. [BRBH09] A. Bouillard, S. Rosario, A. Benveniste, and S. Haar. Monotonicity in Service Orchestrations. In Proceedings of the 30th International Conference on Applications and Theory of Petri Nets (PETRI NETS'09), volume 5606 of Lecture Notes in Computer Science, pages 263--282, Paris, France, June 2009. Springer. [HKP+09] S. Haddad, F. Kordon, L. Petrucci, J.-F. Pradat-Peyre, and N. Trèves. Efficient State-Based Analysis by Introducing Bags in Petri Nets Color Domains. In Proceedings of the 28th American Control Conference (ACC'09), pages 5018--5025, Saint Louis, Missouri, USA, June 2009. B. Bollig and P. Gastin. Weighted versus Probabilistic Logics. In Proceedings of the 13th International Conference on Developments in Language Theory (DLT'09), volume 5583 of Lecture Notes in Computer Science, pages 18--38, Stuttgart, Germany, June-July 2009. Springer. S. Abiteboul, G. Gottlob, and M. Manna. Distributed XML Design. In Proceedings of the 28th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'09), pages 247--258, Providence, Rhode Island, USA, June-July 2009. ACM Press. [ABM09b] S. Abiteboul, P. Bourhis, and B. Marinoiu. Satisfiability and relevance for queries over active documents. In Proceedings of the 28th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'09), pages 87--96, Providence, Rhode Island, USA, June-July 2009. ACM Press. P. Barceló, L. Libkin, A. Poggi, and C. Sirangelo. XML with Incomplete Information: Models, Properties, and Query Answering. In Proceedings of the 28th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'09), pages 237--246, Providence, Rhode Island, USA, June-July 2009. ACM Press. D. Figueira. Satisfiability of Downward XPath with Data Equality Tests. In Proceedings of the 28th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'09), pages 197--206, Providence, Rhode Island, USA, June-July 2009. ACM Press. [CDK09a] R. Chadha, S. Delaune, and S. Kremer. Epistemic Logic for the Applied Pi Calculus. In Proceedings of IFIP International Conference on Formal Techniques for Distributed Systems (FMOODS/FORTE'09), volume 5522 of Lecture Notes in Computer Science, pages 182--197, Lisbon, Portugal, June 2009. Springer. S. Bursuc and H. Comon-Lundh. Protocol security and algebraic properties: decision results for a bounded number of sessions. In Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA'09), volume 5595 of Lecture Notes in Computer Science, pages 133--147, Brasília, Brazil, June-July 2009. Springer. G. Godoy and F. Jacquemard. Unique Normalization for Shallow TRS. In Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA'09), volume 5595 of Lecture Notes in Computer Science, pages 63--77, Brasília, Brazil, June-July 2009. Springer. [BCD09a] M. Baudet, V. Cortier, and S. Delaune. YAPA: A generic tool for computing intruder knowledge. In Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA'09), volume 5595 of Lecture Notes in Computer Science, pages 148--163, Brasília, Brazil, June-July 2009. Springer. [GSZ09] P. Gastin, N. Sznajder, and M. Zeitoun. Distributed synthesis for well-connected architectures. Formal Methods in System Design, 34(3):215--237, June 2009. M. Beccuti, G. Franceschinis, D. Codetta-Raiteri, and S. Haddad. Parametric NdRFT for the derivation of optimal repair strategies. In Proceedings of the 39th Annual IEEEashIFIP International Conference on Dependable Systems and Networks (DSN'09), pages 399--408, Estoril, Portugal, June-July 2009. IEEE Computer Society Press. doi: 10.1109/DSN.2009.5270312. [AC09] R. Affeldt and H. Comon-Lundh. Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables. In Formal to Practical Security, volume 5458 of Lecture Notes in Computer Science, pages 1--20. Springer, May 2009. J. Goubault-Larrecq. On a Generalization of a Result by Valk and Jantzen. Research Report LSV-09-09, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2009. 18 pages. [BMSS09] M. Bojańczyk, A. Muscholl, Th. Schwentick, and L. Segoufin. Two-variable logic on data trees and applications to XML reasoning. Journal of the ACM, 56(3), May 2009. [GGJ09] A. Gascón, G. Godoy, and F. Jacquemard. Closure of Tree Automata Languages under Innermost Rewriting. In Proceedings of the 8th International Workshop on Reduction Strategies in Rewriting and Programming (WRS'08), volume 237 of Electronic Notes in Theoretical Computer Science, pages 23--38, Castle of Hagenberg, Austria, April 2009. Elsevier Science Publishers. E. Bursztein. Extending Anticipation Games with Location, Penalty and Timeline. In Revised Selected Papers of the 5th International Workshop on Formal Aspects in Security and Trust (FAST'08), volume 5491 of Lecture Notes in Computer Science, pages 272--286, Malaga, Spain, April 2009. Springer. S. Demri and R. Lazić. LTL with the freeze quantifier and register automata. ACM Transactions on Computational Logic, 10(3), April 2009. [EFSH09] A. El Fallah Seghrouchni and S. Haddad. Interopérabilité des systèmes multi-agents à l'aide des services web. In Technologies des systèmes multi-agents et applications industrielles, chapter 3, pages 77--99. Hermès, April 2009. F. Jacquemard, F. Klay, and C. Vacher. Rigid Tree Automata. In Proceedings of the 3rd International Conference on Language and Automata Theory and Applications (LATA'09), volume 5457 of Lecture Notes in Computer Science, pages 446--457, Tarragona, Spain, April 2009. Springer. [BCK09] M. Baudet, V. Cortier, and S. Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries. Information and Computation, 207(4):496--520, April 2009. [Bou09c] P. Bouyer. Model-Checking Timed Temporal Logics. In Proceedings of the 4th Workshop on Methods for Modalities (M4M-5), volume 231 of Electronic Notes in Theoretical Computer Science, pages 323--341, Cachan, France, March 2009. Elsevier Science Publishers. C. Areces and S. Demri, editors. Proceedings of the 5th International Workshop on Methods for Modalities (M4M-5), volume 231 of Electronic Notes in Theoretical Computer Science, Cachan, France, March 2009. Elsevier Science Publishers. [ABM09a] S. Abiteboul, P. Bourhis, and B. Marinoiu. Efficient maintenance techniques for views over active documents. In Advances in Database Technology --- Proceedings of the 12th International Conference on Extending Database Technology (EDBT'09), ACM International Conference Proceeding Series, pages 1076--1087, Saint Petersburg, Russia, March 2009. Springer. [AGMP09] S. Abiteboul, O. Greenshpan, T. Milo, and N. Polyzotis. MatchUp: Autocompletion for Mashups. In Proceedings of the 25th International Conference on Data Engineering (ICDE'09), pages 1479--1482, Shanghai, China, March-April 2009. IEEE Computer Society Press. doi: 10.1109/ICDE.2009.47. [CGM+09] Th. Chatain, P. Gastin, A. Muscholl, N. Sznajder, I. Walukiewicz, and M. Zeitoun. Distributed control for restricted specifications. Deliverable DOTS 2.2 (ANR-06-SETI-003), March 2009. [BLLM09] P. Bouyer, F. Laroussinie, D. Lime, and N. Markey. Synthesis of timed controllers. Deliverable DOTS 1.2a (ANR-06-SETI-003), March 2009. [DHS09] S. Donatelli, S. Haddad, and J. Sproston. Model Checking Timed and Stochastic Properties with CSLTA. IEEE Transactions on Software Engineering, 35(2):224--240, March-April 2009. doi: 10.1109/TSE.2008.108. [BCD+09b] D. Berwanger, K. Chatterjee, M. De Wulf, L. Doyen, and Th. A. Henzinger. Alpaga: A Tool for Solving Parity Games with Imperfect Information. In Proceedings of the 15th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'09), volume 5505 of Lecture Notes in Computer Science, pages 58--61, York, UK, March 2009. Springer. [BBL09] K. Bansal, R. Brochenin, and É. Lozes. Beyond Shapes: Lists with Ordered Data. In Proceedings of the 12th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'09), volume 5504 of Lecture Notes in Computer Science, pages 425--439, York, UK, March 2009. Springer. B. Bérard and S. Haddad. Interrupt Timed Automata. In Proceedings of the 12th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'09), volume 5504 of Lecture Notes in Computer Science, pages 197--211, York, UK, March 2009. Springer. B. Bollig, M.-L. Grindei, and P. Habermehl. Realizability of Concurrent Recursive Programs. In Proceedings of the 12th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'09), volume 5504 of Lecture Notes in Computer Science, pages 410--424, York, UK, March 2009. Springer. M. Benedikt and L. Segoufin. Towards a Characterization of Order-Invariant Queries over Tame Structures. Journal of Symbolic Logic, 74(1):168--186, March 2009. doi: 10.2178/jsl/1231082307. [CEFX09] R. Chevallier, E. Encrenaz-Tiphène, L. Fribourg, and W. Xu. Timed Verification of the Generic Architecture of a Memory Circuit Using Parametric Timed Automata. Formal Methods in System Design, 34(1):59--81, February 2009. V. Cortier and S. Delaune. Safely Composing Security Protocols. Formal Methods in System Design, 34(1):1--36, February 2009. S. Bursuc and H. Comon-Lundh. Protocols, insecurity decision and combination of equational theories. Research Report LSV-09-02, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2009. 43 pages. A. Finkel and J. Goubault-Larrecq. Forward Analysis for WSTS, Part I: Completions. In Proceedings of the 26th Annual Symposium on Theoretical Aspects of Computer Science (STACS'09), volume 3 of Leibniz International Proceedings in Informatics, pages 433--444, Freiburg, Germany, February 2009. Leibniz-Zentrum für Informatik. [DG09c] M. Droste and P. Gastin. Weighted automata and weighted logics. In Handbook of Weighted Automata, EATCS Monographs in Theoretical Computer Science, chapter 5, pages 175--211. Springer, 2009. V. Diekert and P. Gastin. Local safety and local liveness for distributed systems. In Perspectives in Concurrency Theory, IARCS-Universities, pages 86--106. Universities Press, January 2009. [HI09] S. Haddad and J.-M. Ilié. Symmetry and Temporal Logic. In Petri Nets: Fundamental Models, Verification and Applications, pages 435--460. Wiley-ISTE, 2009. [HV09c] S. Haddad and F. Vernadat. Verification of Specific Properties. In Petri Nets: Fundamental Models, Verification and Applications, pages 349--414. Wiley-ISTE, 2009. [HM09c] S. Haddad and P. Moreaux. Tensor Methods and Stochastic Petri Nets. In Petri Nets: Fundamental Models, Verification and Applications, pages 321--346. Wiley-ISTE, 2009. [HM09b] S. Haddad and P. Moreaux. Stochastic Well-formed Petri Nets. In Petri Nets: Fundamental Models, Verification and Applications, pages 303--320. Wiley-ISTE, 2009. [HM09a] S. Haddad and P. Moreaux. Stochastic Petri Nets. In Petri Nets: Fundamental Models, Verification and Applications, pages 269--302. Wiley-ISTE, 2009. S. Haddad. Decidability and Complexity of Petri Net Problems. In Petri Nets: Fundamental Models, Verification and Applications, pages 87--122. Wiley-ISTE, 2009. [HV09b] S. Haddad and F. Vernadat. Analysis Methods for Petri Nets. In Petri Nets: Fundamental Models, Verification and Applications, pages 41--86. Wiley-ISTE, 2009. [BHR09b] P. Bouyer, S. Haddad, and P.-A. Reynier. Undecidability Results for Timed Automata with Silent Transitions. Fundamenta Informaticae, 92(1-2):1--25, 2009. [BKL+09] P. Bouyer, J.-P. Katoen, R. Langerak, F. Laroussinie, N. Markey, and J.-F. Raskin. Transfer of correctness from models to implementation. Deliverable QUASIMODO 3.1 (ICT-FP7-STREP-214755), January 2009. [Bou09b] P. Bouyer. From Qualitative to Quantitative Analysis of Timed Systems. Mémoire d'habilitation, Université Paris 7, Paris, France, January 2009. [GMNK09] P. Gastin, M. Mukund, and K. Narayan Kumar. Reachability and boundedness in time-constrained MSC graphs. In Perspectives in Concurrency Theory, IARCS-Universities, pages 157--183. Universities Press, January 2009. [BP09] P. Bouyer and A. Petit. On extensions of timed automata. In Perspectives in Concurrency Theory, IARCS-Universities, pages 35--63. Universities Press, January 2009. [CGS09] Th. Chatain, P. Gastin, and N. Sznajder. Natural Specifications Yield Decidability for Distributed Synthesis of Asynchronous Systems. In Proceedings of the 35th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM'09), volume 5404 of Lecture Notes in Computer Science, pages 141--152, Špindlerův Mlýn, Czech Republic, January 2009. Springer. [BDLM09] Th. Brihaye, A. Da Costa, F. Laroussinie, and N. Markey. ATL with Strategy Contexts and Bounded Memory. In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'09), volume 5407 of Lecture Notes in Computer Science, pages 92--106, Deerfield Beach, Florida, USA, January 2009. Springer. [Com08a] H. Comon-Lundh. About models of security protocols. In Proceedings of the 28th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'08), volume 2 of Leibniz International Proceedings in Informatics, Bangalore, India, December 2008. Leibniz-Zentrum für Informatik. [Ore08] G. Oreiby. Logiques temporelles pour le contrôle temporisé. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, December 2008. [GLN08] J. Goubault-Larrecq, S. Lasota, and D. Nowak. Logical Relations for Monadic Types. Mathematical Structures in Computer Science, 18(6):1169--1217, December 2008. 81 pages. B. Bollig. On the Expressive Power of 2-Stack Visibly Pushdown Automata. Logical Methods in Computer Science, 4(4:16), December 2008. S. Demri and R. Gascon. Verification of Qualitative Z constraints. Theoretical Computer Science, 409(1):24--40, December 2008. [DDMR08] M. De Wulf, L. Doyen, N. Markey, and J.-F. Raskin. Robust Safety of Timed Automata. Formal Methods in System Design, 33(1-3):45--84, December 2008. É. André, Th. Chatain, E. Encrenaz, and L. Fribourg. An Inverse Method for Parametric Timed Automata. In Proceedings of the 2nd Workshop on Reachability Problems in Computational Models (RP'08), volume 223 of Electronic Notes in Theoretical Computer Science, pages 29--46, Liverpool, UK, December 2008. Elsevier Science Publishers. E. Bursztein. Anticipation games. Théorie des jeux appliqués à la sécurité réseau. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2008. A. Sangnier. Vérification de systèmes avec compteurs et pointeurs. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2008. [Ara08] M. Arapinis. Sécurité des protocoles cryptographiques : décidabilité et résultats de réduction. Thèse de doctorat, Université Paris 12, Créteil, France, November 2008. M. Arapinis, S. Delaune, and S. Kremer. From One Session to Many: Dynamic Tags for Security Protocols. In Proceedings of the 15th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'08), volume 5330 of Lecture Notes in Artificial Intelligence, pages 128--142, Doha, Qatar, November 2008. Springer. S. Abiteboul, O. Greenshpan, and T. Milo. Modeling the mashup space. In Proceedings of the 10th ACM International Workshop on Web Information and Data Management (WIDM'08), pages 87--94, Napa Valley, California, USA, October 2008. ACM Press. S. Donatelli and S. Haddad. Vérification quantitative de chaînes de Markov. In Approches formelles des systèmes embarqués communicants, chapter 6, pages 177--198. Hermès, October 2008. F. Cassez and N. Markey. Contrôle des systèmes temporisés. In Approches formelles des systèmes embarqués communicants, chapter 4, pages 105--144. Hermès, October 2008. H. Comon-Lundh and V. Cortier. Computational Soundness of Observational Equivalence. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08), pages 109--118, Alexandria, Virginia, USA, October 2008. ACM Press. [BCFH08] M. Beccuti, D. Codetta-Raiteri, G. Franceschinis, and S. Haddad. Non Deterministic Repairable Fault Trees for Computing Optimal Repair Strategy. In Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS'08), Athens, Greece, October 2008. Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. doi: 10.4108/ICST.VALUETOOLS2008.4411. [Bur08c] E. Bursztein. NetQi: A Model Checker for Anticipation Game. In Proceedings of the 6th International Symposium on Automated Technology for Verification and Analysis (ATVA'08), volume 5311 of Lecture Notes in Computer Science, pages 246--251, Seoul, Korea, October 2008. Springer. [BFLP08] S. Bardin, A. Finkel, J. Leroux, and L. Petrucci. FAST: Acceleration from theory to practice. International Journal on Software Tools for Technology Transfer, 10(5):401--424, October 2008. [RBHJ08] S. Rosario, A. Benveniste, S. Haar, and C. Jard. Probabilistic QoS and Soft Contracts for Transaction-Based Web Services Orchestrations. IEEE Transactions on Services Computing, 1(4):187--200, October-December 2008. doi: 10.1109/TSC.2008.17. Y. Boichut, P.-C. Héam, and O. Kouchnarenko. Approximation-based Tree Regular Model-Checking. Nordic Journal of Computing, 14(3):216--241, October 2008. [Cio08] S. Ciobâcă. Verification of anonymity properties in e-voting protocols. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2008. [L+08b] F. Laroussinie et al. Projet DOTS (ANR-06-SETI-003) : Rapport à 18 mois, September 2008. 5 pages. [CLLM08] F. Cassez, F. Laroussinie, D. Lime, and N. Markey. Quantitative Objectives in Timed Games. Deliverable DOTS 1.1 (ANR-06-SETI-003), September 2008. B. Bollig, P. Bouyer, F. Cassez, Th. Chatain, P. Gastin, S. Haddad, and C. Jard. Model for distributed timed systems. Deliverable DOTS 3.1 (ANR-06-SETI-003), September 2008. [BBJ+08] P. Bouyer, Th. Brihaye, M. Jurdziński, R. Lazić, and M. Rutkowski. Average-Price and Reachability-Price Games on Hybrid Automata with Strong Resets. In Proceedings of the 6th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'08), volume 5215 of Lecture Notes in Computer Science, pages 63--77, Saint-Malo, France, September 2008. Springer. [BFL+08b] P. Bouyer, U. Fahrenberg, K. G. Larsen, N. Markey, and J. Srba. Infinite Runs in Weighted Timed Automata with Energy Constraints. In Proceedings of the 6th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'08), volume 5215 of Lecture Notes in Computer Science, pages 33--47, Saint-Malo, France, September 2008. Springer. M. F. Atig, B. Bollig, and P. Habermehl. Emptiness of multi-pushdown automata is 2ETIME-complete. In Proceedings of the 12th International Conference on Developments in Language Theory (DLT'08), volume 5257 of Lecture Notes in Computer Science, pages 121--133, Kyoto, Japan, September 2008. Springer. [CDF+08] N. Chamseddine, M. Duflot, L. Fribourg, C. Picaronny, and J. Sproston. Computing Expected Absorption Times for Parametric Determinate Probabilistic Timed Automata. In Proceedings of the 5th International Conference on Quantitative Evaluation of Systems (QEST'08), pages 254--263, Saint Malo, France, September 2008. IEEE Computer Society Press. Th. Place. Characterization of Logics Over Ranked Tree Languages. In Proceedings of the 17th Annual EACSL Conference on Computer Science Logic (CSL'08), volume 5213 of Lecture Notes in Computer Science, pages 401--415, Bertinoro, Italy, September 2008. Springer. R. Brochenin, S. Demri, and É. Lozes. On the Almighty Wand. In Proceedings of the 17th Annual EACSL Conference on Computer Science Logic (CSL'08), volume 5213 of Lecture Notes in Computer Science, pages 323--338, Bertinoro, Italy, September 2008. Springer. [BBBM08] N. Bertrand, P. Bouyer, Th. Brihaye, and N. Markey. Quantitative Model-Checking of One-Clock Timed Automata under Probabilistic Semantics. In Proceedings of the 5th International Conference on Quantitative Evaluation of Systems (QEST'08), pages 55--64, Saint Malo, France, September 2008. IEEE Computer Society Press. B. Bérard, F. Cassez, S. Haddad, D. Lime, and O. H. Roux. When are Timed Automata Weakly Timed Bisimilar to Time Petri Nets? Theoretical Computer Science, 403(2-3):202--220, September 2008. B. Bollig and D. Kuske. Muller Message-Passing Automata and Logics. Information and Computation, 206(9-10):1084--1094, September-October 2008. [LHS08] É. Lozes, D. Hirschkoff, and D. Sangiorgi. Separability in the Ambient Logic. Logical Methods in Computer Science, 4(3:4), September 2008. [AAC+08] S. Abiteboul, T. Allard, Ph. Chatalic, G. Gardarin, A. Ghitescu, F. Goasdoué, I. Manolescu, B. Nguyen, M. Ouazara, A. Somani, N. Travers, G. Vasile, and S. Zoupanos. WebContent: efficient P2P warehousing of web data. In Proceedings of the 34th International Conference on Very Large Data Bases (VLDB'08), volume 1 of Proceedings of the VLDB Endowment, pages 1428--1431, Auckland, New Zealand, August 2008. ACM Press. [ABM08] S. Abiteboul, O. Benjelloun, and T. Milo. The Active XML project: an overview. The VLDB Journal, 17(5):1019--1040, August 2008. N. Markey. Infinite Runs In Weighted Times Games with Energy Constraints. Invited talk, Workshop Automata and Verification (AV'08), Mons, Belgium, August 2008. P. Bouyer. Probabilities in Timed Automata. Invited talk, Workshop Automata and Verification (AV'08), Mons, Belgium, August 2008. Ph. Schnoebelen. The complexity of lossy channel systems. Invited talk, Workshop Automata and Verification (AV'08), Mons, Belgium, August 2008. [Com08b] H. Comon-Lundh. Challenges in the Automated Verification of Security Protocols. In Proceedings of the 4th International Joint Conference on Automated Reasoning (IJCAR'08), volume 5195 of Lecture Notes in Artificial Intelligence, pages 396--409, Sydney, Australia, August 2008. Springer-Verlag. P. Chambart and Ph. Schnoebelen. Mixing Lossy and Perfect Fifo Channels. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 340--355, Toronto, Canada, August 2008. Springer. P. Baldan, Th. Chatain, S. Haar, and B. König. Unfolding-based Diagnosis of Systems with an Evolving Topology. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 203--217, Toronto, Canada, August 2008. Springer. B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. Smyle: A Tool for Synthesizing Distributed Models from Scenarios by Learning. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 162--166, Toronto, Canada, August 2008. Springer. É. Lozes and J. Villard. A Spatial Equational Logic for the Applied π-Calculus. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 387--401, Toronto, Canada, August 2008. Springer. [ABG+08] S. Akshay, B. Bollig, P. Gastin, M. Mukund, and K. Narayan Kumar. Distributed Timed Automata with Independently Evolving Clocks. In Proceedings of the 19th International Conference on Concurrency Theory (CONCUR'08), volume 5201 of Lecture Notes in Computer Science, pages 82--97, Toronto, Canada, August 2008. Springer. A. Finkel and A. Sangnier. Reversal-bounded Counter Machines Revisited. In Proceedings of the 33rd International Symposium on Mathematical Foundations of Computer Science (MFCS'08), volume 5162 of Lecture Notes in Computer Science, pages 323--334, Toruń, Poland, August 2008. Springer. A. Bouhoula and F. Jacquemard. Automated Induction with Constrained Tree Automata. In Proceedings of the 4th International Joint Conference on Automated Reasoning (IJCAR'08), volume 5195 of Lecture Notes in Artificial Intelligence, pages 539--553, Sydney, Australia, August 2008. Springer-Verlag. S. Kremer, A. Mercier, and R. Treinen. Proving Group Protocols Secure Against Eavesdroppers. In Proceedings of the 4th International Joint Conference on Automated Reasoning (IJCAR'08), volume 5195 of Lecture Notes in Artificial Intelligence, pages 116--131, Sydney, Australia, August 2008. Springer-Verlag. [AMZ08b] S. Abiteboul, I. Manolescu, and S. Zoupanos. OptimAX: Optimizing Distributed ActiveXML Applications. In Proceedings of the 8th International Conference on Web Engineering (ICWE'08), pages 299--310, Yorktown Heights, New York, USA, July 2008. IEEE Computer Society Press. doi: 10.1109/ICWE.2008.11. F. Jacquemard and M. Rusinowitch. Closure of Hedge-Automata Languages by Hedge Rewriting. In Proceedings of the 19th International Conference on Rewriting Techniques and Applications (RTA'08), volume 5117 of Lecture Notes in Computer Science, pages 157--171, Hagenberg, Austria, July 2008. Springer. [BHH+08b] A. Bouajjani, P. Habermehl, L. Holík, T. Touili, and T. Vojnar. Antichain-based Universality and Inclusion Testing over Nondeterministic Finite Tree Automata. In Proceedings of the 13th International Conference on Implementation and Application of Automata (CIAA'08), volume 5148 of Lecture Notes in Computer Science, pages 57--67, San Francisco, California, USA, July 2008. Springer-Verlag. C. Areces, D. Figueira, S. Figueira, and S. Mera. Expressive Power and Decidability for Memory Logics. In Proceedings of the 15th Workshop on Logic, Language, Information and Computation (WoLLIC'08), volume 5110 of Lecture Notes in Computer Science, pages 56--68, Edinburgh, Scotland, UK, July 2008. Springer. M. Bojańczyk and L. Segoufin. Tree languages defined in first-order logic with one quantifier alternation. In Proceedings of the 35th International Colloquium on Automata, Languages and Programming (ICALP'08) -- Part II, volume 5126 of Lecture Notes in Computer Science, pages 233--245, Reykjavik, Iceland, July 2008. Springer. [BMOW08] P. Bouyer, N. Markey, J. Ouaknine, and J. Worrell. On Expressiveness and Complexity in Real-time Model Checking. In Proceedings of the 35th International Colloquium on Automata, Languages and Programming (ICALP'08) -- Part II, volume 5126 of Lecture Notes in Computer Science, pages 124--135, Reykjavik, Iceland, July 2008. Springer. S. Haddad, L. Mokdad, and S. Youcef. Response Time Analysis of Composite Web Services. In Proceedings of the 6th Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP'08), pages 506--510, Graz, Austria, July 2008. IEEE Computer Society Press. J. Goubault-Larrecq. A Cone-Theoretic Krein-Milman Theorem. Research Report LSV-08-18, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2008. 8 pages. [CJP08] H. Comon-Lundh, F. Jacquemard, and N. Perrin. Visibly Tree Automata with Memory and Constraints. Logical Methods in Computer Science, 4(2:8), June 2008. [DJ08] S. Demri and Ch. S. Jensen, editors. Proceedings of the 15th International Symposium on Temporal Representation and Reasoning (TIME'08), Montréal, Canada, June 2008. IEEE Computer Society Press. B. ten Cate and L. Segoufin. XPath, Transitive Closure Logic, and Nested Tree Walking Automata. In Proceedings of the 27th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'08), pages 251--260, Vancouver, Canada, June 2008. ACM Press. S. Abiteboul, L. Segoufin, and V. Vianu. Static Analysis of Active XML Systems. In Proceedings of the 27th Annual ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS'08), pages 221--230, Vancouver, Canada, June 2008. ACM Press. P. Bouyer, K. G. Larsen, and N. Markey. Model Checking One-clock Priced Timed Automata. Logical Methods in Computer Science, 4(2:9), June 2008. J. Goubault-Larrecq. Towards Producing Formally Checkable Security Proofs, Automatically. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pages 224--238, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press. S. Delaune, S. Kremer, and M. D. Ryan. Composition of Password-based Protocols. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pages 239--251, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press. [DKS08a] S. Delaune, S. Kremer, and G. Steel. Formal Analysis of PKCS#11. In Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF'08), pages 331--344, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press. M. Bojańczyk, L. Segoufin, and H. Straubing. Piecewise Testable Tree Languages. In Proceedings of the 23rd Annual IEEE Symposium on Logic in Computer Science (LICS'08), pages 442--451, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press. P. Chambart and Ph. Schnoebelen. The Ordinal Recursive Complexity of Lossy Channel Systems. In Proceedings of the 23rd Annual IEEE Symposium on Logic in Computer Science (LICS'08), pages 205--216, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press. C. Baier, N. Bertrand, P. Bouyer, Th. Brihaye, and M. Größer. Almost-Sure Model Checking of Infinite Paths in One-Clock Timed Automata. In Proceedings of the 23rd Annual IEEE Symposium on Logic in Computer Science (LICS'08), pages 217--226, Pittsburgh, Pennsylvania, USA, June 2008. IEEE Computer Society Press. [DRS08] S. Delaune, M. D. Ryan, and B. Smyth. Automatic verification of privacy properties in the applied pi-calculus. In Proceedings of the 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM'08), volume 263 of IFIP Conference Proceedings, pages 263--278, Trondheim, Norway, June 2008. Springer. [BFL08a] F. Bouchy, A. Finkel, and J. Leroux. Decomposition of Decidable First-Order Logics over Integers and Reals. In Proceedings of the 15th International Symposium on Temporal Representation and Reasoning (TIME'08), pages 147--155, Montréal, Canada, June 2008. IEEE Computer Society Press. Th. Brihaye, M. Ghannem, N. Markey, and L. Rieg. Good friends are hard to find! In Proceedings of the 15th International Symposium on Temporal Representation and Reasoning (TIME'08), pages 32--40, Montréal, Canada, June 2008. IEEE Computer Society Press. V. Diekert, P. Gastin, and M. Kufleitner. A Survey on Small Fragments of First-Order Logic over Finite Words. International Journal of Foundations of Computer Science, 19(3):513--548, June 2008. M. Droste and P. Gastin. On aperiodic and star-free formal power series in partially commuting variables. Theory of Computing Systems, 42(4):608--631, May 2008. [LMO08] F. Laroussinie, N. Markey, and G. Oreiby. On the Expressiveness and Complexity of ATL. Logical Methods in Computer Science, 4(2:7), May 2008. [BHH+08a] B. Bérard, S. Haddad, L. M. Hillah, F. Kordon, and Y. Thierry-Mieg. Collision Avoidance in Intelligent Transport Systems: Towards an Application of Control Theory. In Proceedings of the 9th Workshop on Discrete Event Systems (WODES'08), pages 346--351, Gothenburg, Sweden, May 2008. [Bur08e] E. Bursztein. Probabilistic Protocol Identification for Hard to Classify Protocol. In Proceedings of the 2nd International Workshop on Information Security Theory and Practices (WISTP'08), volume 5019 of Lecture Notes in Computer Science, pages 49--63, Sevilla, Spain, May 2008. Springer. Best paper award. [JRV08] F. Jacquemard, M. Rusinowitch, and L. Vigneron. Tree automata with equality constraints modulo equational theories. Journal of Logic and Algebraic Programming, 75(2):182--208, April 2008. doi: 10.1016/j.jlap.2007.10.006. [AMP+08] S. Abiteboul, I. Manolescu, N. Polyzotis, N. Preda, and C. Sun. XML processing in DHT networks. In Proceedings of the 24th International Conference on Data Engineering (ICDE'08), pages 606--615, Cancun, Mexico, April 2008. IEEE Computer Society Press. [AMZ08a] S. Abiteboul, I. Manolescu, and S. Zoupanos. OptimAX: efficient support for data-intensive mash-ups. In Proceedings of the 24th International Conference on Data Engineering (ICDE'08), pages 1564--1567, Cancun, Mexico, April 2008. IEEE Computer Society Press. [AMB08] S. Abiteboul, B. Marinoiu, and P. Bourhis. Distributed Monitoring of Peer-to-Peer Systems. In Proceedings of the 24th International Conference on Data Engineering (ICDE'08), pages 1572--1575, Cancun, Mexico, April 2008. IEEE Computer Society Press. E. Encrenaz and L. Fribourg. Time Separation of Events: An Inverse Method. In Proceedings of the LIX Colloquium on Emerging Trends in Concurrency Theory (LIX'06), volume 209 of Electronic Notes in Theoretical Computer Science, pages 135--148, Palaiseau, France, April 2008. Elsevier Science Publishers. S. Demri, R. Lazić, and A. Sangnier. Model checking freeze LTL over one-counter automata. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 490--504, Budapest, Hungary, March-April 2008. Springer. [HIV08] P. Habermehl, R. Iosif, and T. Vojnar. What else is decidable about arrays? In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 474--489, Budapest, Hungary, March-April 2008. Springer. [BMR08] P. Bouyer, N. Markey, and P.-A. Reynier. Robust Analysis of Timed Automata via Channel Machines. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 157--171, Budapest, Hungary, March-April 2008. Springer. P. Chambart and Ph. Schnoebelen. The ω-Regular Post Embedding Problem. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 97--111, Budapest, Hungary, March-April 2008. Springer. J. Goubault-Larrecq. Simulation Hemi-Metrics Between Infinite-State Stochastic Games. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 50--65, Budapest, Hungary, March-April 2008. Springer. J. Goubault-Larrecq. Prevision Domains and Convex Powercones. In Proceedings of the 11th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'08), volume 4962 of Lecture Notes in Computer Science, pages 318--333, Budapest, Hungary, March-April 2008. Springer. [L+08a] F. Laroussinie et al. Projet DOTS (ANR-06-SETI-003) : Rapport à 12 mois, March 2008. 6 pages. [VLT08] J. Villard, É. Lozes, and R. Treinen. A Spatial Equational Logic for the Applied pi-calculus. Research Report LSV-08-10, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2008. 44 pages. J. Goubault-Larrecq and J. Olivain. A Smell of Orchids. In Proceedings of the 8th Workshop on Runtime Verification (RV'08), volume 5289 of Lecture Notes in Computer Science, pages 1--20, Budapest, Hungary, March 2008. Springer. A. Finkel and J. Leroux. Presburger Functions are Piecewise Linear. Research Report LSV-08-08, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2008. 9 pages. [DKS08b] S. Delaune, S. Kremer, and G. Steel. Formal Analysis of PKCS#11. In Proceedings of the 4th Taiwanese-French Conference on Information Technology (TFIT'08), pages 267--278, Taipei, Taiwan, March 2008. P. Bouyer. Model-Checking Timed Temporal Logics. In Proceedings of the 4th Taiwanese-French Conference on Information Technology (TFIT'08), pages 132--142, Taipei, Taiwan, March 2008. P. Bouyer, N. Markey, J. Ouaknine, Ph. Schnoebelen, and J. Worrell. On Termination for Faulty Channel Machines. In Proceedings of the 25th Annual Symposium on Theoretical Aspects of Computer Science (STACS'08), volume 1 of Leibniz International Proceedings in Informatics, pages 121--132, Bordeaux, France, February 2008. Leibniz-Zentrum für Informatik. [DLLT08] S. Delaune, P. Lafourcade, D. Lugiez, and R. Treinen. Symbolic protocol analysis for monoidal equational theories. Information and Computation, 206(2-4):312--351, February-April 2008. P. Bouyer, E. Brinksma, and K. G. Larsen. Optimal Infinite Scheduling for Multi-Priced Timed Automata. Formal Methods in System Design, 32(1):2--23, February 2008. [Bur08d] E. Bursztein. Network Administrator and Intruder Strategies. Research Report LSV-08-02, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2008. 23 pages. [PPS+08] P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Čapkun, and J.-P. Hubaux. Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking. IEEE Communications Magazine, 46(2):132--139, February 2008. doi: 10.1109/MCOM.2008.4473095. V. Bernat and H. Comon-Lundh. Normal proofs in intruder theories. In Revised Selected Papers of the 11th Asian Computing Science Conference (ASIAN'06), volume 4435 of Lecture Notes in Computer Science, pages 151--166, Tokyo, Japan, January 2008. Springer. [LNY08] S. Lasota, D. Nowak, and Z. Yu. On completeness of logical relations for monadic types. In Revised Selected Papers of the 11th Asian Computing Science Conference (ASIAN'06), volume 4435 of Lecture Notes in Computer Science, pages 223--230, Tokyo, Japan, January 2008. Springer. S. Kremer. Computational soundness of equational theories (Tutorial). In Revised Selected Papers from the 3rd Symposium on Trustworthy Global Computing (TGC'07), volume 4912 of Lecture Notes in Computer Science, pages 363--382, Sophia-Antipolis, France, 2008. Springer. [TED08] S. Taktak, E. Encrenaz, and J.-L. Desbarbieux. A tool for automatic detection of deadlocks in wormhole networks on chip. ACM Transactions on Design Automation of Electronic Systems, 13(1), January 2008. [BHR08] P. Bouyer, S. Haddad, and P.-A. Reynier. Timed Petri Nets and Timed Automata: On the Discriminating Power of Zeno Sequences. Information and Computation, 206(1):73--107, January 2008. [SAG08] P. Senellart, S. Abiteboul, and R. Gilleron. Understanding the Hidden Web. ERCIM News, 72:32--33, January 2008. [CKR08] L. Chen, S. Kremer, and M. D. Ryan, editors. Formal Protocol Verification Applied, volume 07421 of Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2008. S. Haddad and P. Moreaux. Verification of Probabilistic Systems Methods and Tools. In Modeling and Verification of Real-Time Systems, pages 289--318. ISTE Ltd. -- John Wiley & Sons, Ltd., January 2008. [BL08] P. Bouyer and F. Laroussinie. Model Checking Timed Automata. In Modeling and Verification of Real-Time Systems, pages 111--140. ISTE Ltd. -- John Wiley & Sons, Ltd., January 2008. E. Bursztein. NetAnalyzer v0.7.5, January 2008. Written in C and Perl (about 25000 lines). V. Diekert and P. Gastin. First-order definable languages. In Logic and Automata: History and Perspectives, volume 2 of Texts in Logic and Games, pages 261--306. Amsterdam University Press, 2008. E. Bursztein and J. Goubault-Larrecq. A Logical Framework for Evaluating Network Resilience Against Faults and Attacks. In Proceedings of the 12th Asian Computing Science Conference (ASIAN'07), volume 4846 of Lecture Notes in Computer Science, pages 212--227, Doha, Qatar, December 2007. Springer. S. Akshay, B. Bollig, and P. Gastin. Automata and Logics for Timed Message Sequence Charts. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 290--302, New Delhi, India, December 2007. Springer. P. Chambart and Ph. Schnoebelen. Post Embedding Problem is not Primitive Recursive, with Applications to Channel Systems. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 265--276, New Delhi, India, December 2007. Springer. V. Cortier, J. Delaitre, and S. Delaune. Safely Composing Security Protocols. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 352--363, New Delhi, India, December 2007. Springer. C. Baier, N. Bertrand, P. Bouyer, Th. Brihaye, and M. Größer. Probabilistic and Topological Semantics for Timed Automata. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 179--191, New Delhi, India, December 2007. Springer. B. Bollig, D. Kuske, and I. Meinecke. Propositional Dynamic Logic for Message-Passing Systems. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 303--315, New Delhi, India, December 2007. Springer. S. Delaune, S. Kremer, and M. D. Ryan. Symbolic Bisimulation for the Applied Pi-Calculus. In Proceedings of the 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), volume 4855 of Lecture Notes in Computer Science, pages 133--145, New Delhi, India, December 2007. Springer. [BBS07] C. Baier, N. Bertrand, and Ph. Schnoebelen. Verifying nondeterministic probabilistic channel systems against ω-regular linear-time properties. ACM Transactions on Computational Logic, 9(1), December 2007. J.-L. Carré. Réécriture, confluence. Course notes, Préparation à l'agrégation, ENS Cachan, France, December 2007. E. Bursztein. NetQi v1rc1. Available at http://www.netqi.org/, December 2007. Written in C and Java (about 10000 lines). [Gas07a] R. Gascon. Spécification et vérification de propriétés quantitatives sur des automates à contraintes. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, November 2007. [GPT07] J. Goubault-Larrecq, C. Palamidessi, and A. Troina. A Probabilistic Applied Pi-Calculus. In Proceedings of the 5th Asian Symposium on Programming Languages and Systems (APLAS'07), volume 4807 of Lecture Notes in Computer Science, pages 175--290, Singapore, November-December 2007. Springer. P. Gastin and D. Kuske. Uniform satisfiability in PSPACE for local temporal logics over Mazurkiewicz traces. Fundamenta Informaticae, 80(1-3):169--197, November 2007. [CDG+07] H. Comon-Lundh, M. Dauchet, R. Gilleron, C. Löding, F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi. Tree Automata Techniques and Applications. November 2007. [Gas07b] P. Gastin. Algorithmique. Course notes, Magistère STIC, ENS Cachan, France, November 2007. E. Bursztein. Time has something to tell us about network address translation. In Proceedings of the 12th Nordic Workshop on Secure IT Systems (NordSec'07), Reykjavik, Iceland, October 2007. F. Jacquemard and M. Rusinowitch. Rewrite Closure of Hedge-Automata Languages. Research Report LSV-07-31, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2007. 22 pages. [HIRV07] P. Habermehl, R. Iosif, A. Rogalewicz, and T. Vojnar. Proving Termination of Tree Manipulating Programs. In Proceedings of the 5th International Symposium on Automated Technology for Verification and Analysis (ATVA'07), volume 4762 of Lecture Notes in Computer Science, pages 145--161, Tokyo, Japan, October 2007. Springer. S. Demri and A. Rabinovich. The complexity of temporal logic with until and since over ordinals. In Proceedings of the 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'07), volume 4790 of Lecture Notes in Artificial Intelligence, pages 531--545, Yerevan, Armenia, October 2007. Springer. S. Delaune, H. Lin, and Ch. Lynch. Protocol verification via rigidashflexible resolution. In Proceedings of the 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'07), volume 4790 of Lecture Notes in Artificial Intelligence, pages 242--256, Yerevan, Armenia, October 2007. Springer. V. Cortier and S. Delaune. Deciding Knowledge in Security Protocols for Monoidal Equational Theories. In Proceedings of the 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'07), volume 4790 of Lecture Notes in Artificial Intelligence, pages 196--210, Yerevan, Armenia, October 2007. Springer. [CDP07] F. Chevalier, D. D'Souza, and P. Prabhakar. Counter-free Input Determined Timed Automata. In Proceedings of the 5th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'07), volume 4763 of Lecture Notes in Computer Science, pages 82--97, Salzburg, Austria, October 2007. Springer. P. Bouyer and N. Markey. Costs are Expensive! In Proceedings of the 5th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'07), volume 4763 of Lecture Notes in Computer Science, pages 53--68, Salzburg, Austria, October 2007. Springer. [Laf07d] P. Lafourcade. Rapport final d'activité à 11 mois, contrat CNRS/DGA référence : 06 60 019 00 470 75 01 << Utilisation et exploitation des théories équationnelles dans l'analyse des protocoles cryptographiques >>. Contract report, DGA, October 2007. 6 pages. [ BibTex | Web page | PS ] [BGP07] B. Bérard, P. Gastin, and A. Petit. Timed substitutions for regular signal-event languages. Formal Methods in System Design, 31(2):101--134, October 2007. [BBBR07] P. Bouyer, Th. Brihaye, V. Bruyère, and J.-F. Raskin. On the optimal reachability problem on weighted timed automata. Formal Methods in System Design, 31(2):135--175, October 2007. [Pro07] A. ProNoBis. ProNoBis: Probability and Nondeterminism, Bisimulations and Security -- Rapport Final, October 2007. J. Goubault-Larrecq. Pronobis: Probability and nondeterminism, bisimulations and security. Rapport final ARC ProNoBis, October 2007. P. Chambart. Canaux fiables et non-fiables : frontières de la décidabilité. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2007. A. Da Costa. Propriétés de jeux multi-agents. Rapport de Master, Master de Logique Mathématique et Fondements de l'Informatique, Paris, France, September 2007. J. Villard. Logique spatiale pour le pi-calcul appliqué. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2007. C. Vacher. Accessibilité inverse dans les automates d'arbres à mémoire d'ordre supérieur. Rapport de Master, Master Parisien de Recherche en Informatique, Paris, France, September 2007. [CL07] C. Cremers and P. Lafourcade. Comparing State Spaces in Automatic Security Protocol Verification. In Pre-proceedings of the 7th International Workshop on Automated Verification of Critical Systems (AVoCS'07), Oxford, UK, September 2007. [AMNK07] S. Akshay, M. Mukund, and K. Narayan Kumar. Checking Coverage for Infinite Collections of Timed Scenarios. In Proceedings of the 18th International Conference on Concurrency Theory (CONCUR'07), volume 4703 of Lecture Notes in Computer Science, pages 181--196, Lisbon, Portugal, September 2007. Springer. M. Arnaud, V. Cortier, and S. Delaune. Combining algorithms for deciding knowledge in security protocols. In Proceedings of the 6th International Symposium on Frontiers of Combining Systems (FroCoS'07), volume 4720 of Lecture Notes in Artificial Intelligence, pages 103--117, Liverpool, UK, September 2007. Springer. S. Kremer and L. Mazaré. Adaptive Soundness of Static Equivalence. In Proceedings of the 12th European Symposium on Research in Computer Security (ESORICS'07), volume 4734 of Lecture Notes in Computer Science, pages 610--625, Dresden, Germany, September 2007. Springer. [BLMO07] Th. Brihaye, F. Laroussinie, N. Markey, and G. Oreiby. Timed Concurrent Game Structures. In Proceedings of the 18th International Conference on Concurrency Theory (CONCUR'07), volume 4703 of Lecture Notes in Computer Science, pages 445--459, Lisbon, Portugal, September 2007. Springer. J. Goubault-Larrecq. Continuous Previsions. In Proceedings of the 16th Annual EACSL Conference on Computer Science Logic (CSL'07), volume 4646 of Lecture Notes in Computer Science, pages 542--557, Lausanne, Switzerland, September 2007. Springer. [OBRS07] A. Ourghanlian, M. Bozga, A. Roglewicz, and A. Sangnier. Projet RNTL Averiles -- Fourniture F1.6 : Expérimentation, September 2007. 16 pages. LIAFA, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F1.4 : Prototypes d'outil, September 2007. 3 pages. [LCE+07c] LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F1.3 : Algorithmes de vérification, September 2007. 19 pages. [LCE+07b] LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F1.2 : Extraction de modèles, September 2007. 19 pages. [LCE+07a] LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag. Projet RNTL Averiles -- Fourniture F1.1 : Modèles, September 2007. 6 pages. [LCE+07d] LIAFA, CRIL Technology, EDF R&D, LSV, and Verimag. Rapport à mi-parcours du projet RNTL Averiles (analyse et vérification de logiciels embarqués avec structures de mémoire dynamique, September 2007. 4 pages. [BHJS07] A. Bouajjani, P. Habermehl, Y. Jurski, and M. Sighireanu. Rewriting Systems with Data -- A Framework for Reasoning About Systems with Unbounded Structures over Infinite Data Domains. In Proceedings of the 16th International Symposium on Fundamentals of Computation Theory (FCT'07), volume 4639 of Lecture Notes in Computer Science, pages 1--22, Budapest, Hungary, August 2007. Springer. [BGMNK07] P. Bhateja, P. Gastin, M. Mukund, and K. Narayan Kumar. Local testing of message sequence charts is difficult. In Proceedings of the 16th International Symposium on Fundamentals of Computation Theory (FCT'07), volume 4639 of Lecture Notes in Computer Science, pages 76--87, Budapest, Hungary, August 2007. Springer. [L+07] F. Laroussinie et al. Projet DOTS (ANR-06-SETI-003) : Rapport à 6 mois, August 2007. 7 pages. P. Gastin and D. Oddoux. LTL2BA v1.1, August 2007. Written in C++ (about 4000 lines). [Laf07a] P. Lafourcade. Intruder Deduction for the Equational Theory of phExclusive-or with Commutative and Distributive Encryption. In Proceedings of the 1st International Workshop on Security and Rewriting Techniques (SecReT'06), volume 171 of Electronic Notes in Theoretical Computer Science, pages 37--57, Venice, Italy, July 2007. Elsevier Science Publishers. [BJ07b] A. Bouhoula and F. Jacquemard. Verifying Regular Trace Properties of Security Protocols with Explicit Destructors and Implicit Induction. In Proceedings of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'07), pages 27--44, Wroclaw, Poland, July 2007. [BE07] C. Braunstein and E. Encrenaz. Using CTL formulae as component abstraction in a design and verification flow. In Proceedings of the 7th International Conference on Application of Concurrency to System Design (ACSD'07), pages 80--89, Bratislava, Slovak Republik, July 2007. IEEE Computer Society Press. [NT07] M. Nesi and R. Treinen, editors. Preliminary Proceedings of the 2nd International Workshop on Security and Rewriting Techniques (SecReT'07), Paris, France, July 2007. P. Gastin and P. Moro. Minimal counter-example generation for SPIN. In Proceedings of the 14th International SPIN Workshop on Model Checking Software (SPIN'07), volume 4595 of Lecture Notes in Computer Science, pages 24--38, Berlin, Germany, July 2007. Springer. J. Goubault-Larrecq. Continuous Capacities on Continuous State Spaces. In Proceedings of the 34th International Colloquium on Automata, Languages and Programming (ICALP'07), volume 4596 of Lecture Notes in Computer Science, pages 764--776, Wroclaw, Poland, July 2007. Springer. [BHPR07] Th. Brihaye, Th. A. Henzinger, V. Prabhu, and J.-F. Raskin. Minimum-Time Reachability in Timed Games. In Proceedings of the 34th International Colloquium on Automata, Languages and Programming (ICALP'07), volume 4596 of Lecture Notes in Computer Science, pages 825--837, Wroclaw, Poland, July 2007. Springer. V. Cortier, S. Delaune, and G. Steel. A Formal Theory of Key Conjuring. In Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF'07), pages 79--93, Venice, Italy, July 2007. IEEE Computer Society Press. J. Goubault-Larrecq. On Noetherian Spaces. In Proceedings of the 22nd Annual IEEE Symposium on Logic in Computer Science (LICS'07), pages 453--462, Wroclaw, Poland, July 2007. IEEE Computer Society Press. P. Bouyer, N. Markey, J. Ouaknine, and J. Worrell. The Cost of Punctuality. In Proceedings of the 22nd Annual IEEE Symposium on Logic in Computer Science (LICS'07), pages 109--118, Wroclaw, Poland, July 2007. IEEE Computer Society Press. [SC07] G. Steel and J. Courant. A formal model for detecting parallel key search attacks. In Proceedings of the 3rd Workshop on Formal and Computational Cryptography (FCC'07), Venice, Italy, July 2007. Ph. Schnoebelen. Model Checking Branching-Time Logics. In Proceedings of the 14th International Symposium on Temporal Representation and Reasoning (TIME'07), page 5, Alicante, Spain, June 2007. IEEE Computer Society Press. [BCD07b] S. Bursuc, H. Comon-Lundh, and S. Delaune. Deducibility Constraints, Equational Theory and Electronic Money. In Rewriting, Computation and Proof --- Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of his 60th Birthday, volume 4600 of Lecture Notes in Computer Science, pages 196--212, Cachan, France, June 2007. Springer. [ BibTex | DOI | Web page | PS ] [CKK07] H. Comon-Lundh, C. Kirchner, and H. Kirchner, editors. Rewriting, Computation and Proof --- Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of his 60th Birthday, volume 4600 of Lecture Notes in Computer Science, Cachan, France, June 2007. Springer. F. Chevalier. Logiques pour les systèmes temporisés : contrôle et expressivité. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2007. [Rey07b] P.-A. Reynier. Vérification de systèmes temporisés et distribués : modèles, algorithmes et implémentabilité. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, June 2007. S. Demri. Logiques pour la spécification et vérification. Mémoire d'habilitation, Université Paris 7, Paris, France, June 2007. [Enc07] E. Encrenaz-Tiphène. Contributions pour la conception et la vérification de systèmes matériels embarqués. Mémoire d'habilitation, Université Paris 6, Paris, France, June 2007. [Boz07] L. Bozzelli. Complexity results on branching-time pushdown model checking. Theoretical Computer Science, 379(1-2):286--297, June 2007. S. Demri and R. Gascon. The Effects of Bounding Syntactic Resources on Presburger LTL (Extended Abstract). In Proceedings of the 14th International Symposium on Temporal Representation and Reasoning (TIME'07), pages 94--104, Alicante, Spain, June 2007. IEEE Computer Society Press. R. Brochenin, S. Demri, and É. Lozes. Reasoning about sequences of memory states. In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer Science, pages 100--114, New York, New York, USA, June 2007. Springer. F. Laroussinie and J. Sproston. State Explosion in Almost-Sure Probabilistic Reachability. Information Processing Letters, 102(6):236--241, June 2007. B. Bollig and I. Meinecke. Weighted Distributed Systems and Their Logics. In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer Science, pages 54--68, New York, New York, USA, June 2007. Springer. S. Demri, D. D'Souza, and R. Gascon. Decidable Temporal Logic with Repeating Values. In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer Science, pages 180--194, New York, New York, USA, June 2007. Springer. P. Bouyer, Th. Brihaye, and F. Chevalier. Weighted O-Minimal Hybrid Systems are more Decidable than Weighted Timed Automata! In Proceedings of the Symposium on Logical Foundations of Computer Science (LFCS'07), volume 4514 of Lecture Notes in Computer Science, pages 69--83, New York, New York, USA, June 2007. Springer. [VG07] K. N. Verma and J. Goubault-Larrecq. Alternating Two-Way AC-Tree Automata. Information and Computation, 205(6):817--869, June 2007. M. Droste and P. Gastin. Weighted automata and weighted logics. Theoretical Computer Science, 380(1-2):69--86, June 2007. S. Delaune and F. Klay. Synthèse des expérimentations. Technical Report 10, projet RNTL PROUVÉ, May 2007. 10 pages. [CDFP07] N. Chamseddine, M. Duflot, L. Fribourg, and C. Picaronny. Determinate Probabilistic Timed Automata as Markov Chains with Parametric Costs. Research Report LSV-07-21, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2007. 17 pages. R. Bresciani. The ZRTP Protocol --- Security Considerations. Research Report LSV-07-20, Laboratoire Spécification et Vérification, ENS Cachan, France, May 2007. 23 pages. [Gas07c] P. Gastin. Langages formels. Course notes, Magistère STIC, ENS Cachan, France, May 2007. [Laf07c] P. Lafourcade. Rapport d'activités à 6 mois, contrat CNRS/DGA référence : 06 60 019 00 470 75 01 << Utilisation et exploitation des théories équationnelles dans l'analyse des protocoles cryptographiques >>. Contract report, DGA, April 2007. 5 pages. [LLT07] P. Lafourcade, D. Lugiez, and R. Treinen. Intruder Deduction for the Equational Theory of Abelian Groups with Distributive Encryption. Information and Computation, 205(4):581--623, April 2007. R. Brochenin, S. Demri, and É. Lozes. Reasoning about Sequences of Memory States. In Proceedings of the 1st Workshop on Heap Analysis and Verification (HAV'07), Braga, Portugal, March 2007. [Maz07] L. Mazaré. Computationally Sound Analysis of Protocols using Bilinear Pairings. In Preliminary Proceedings of the 7th International Workshop on Issues in the Theory of Security (WITS'07), pages 6--21, Braga, Portugal, March 2007. B. Bollig and D. Kuske. Muller Message-Passing Automata and Logics. In Preliminary Proceedings of the 1st International Conference on Language and Automata Theory and Applications (LATA'07), Tarragona, Spain, March-April 2007. M. Jurdziński, F. Laroussinie, and J. Sproston. Model Checking Probabilistic Timed Automata with One or Two Clocks. In Proceedings of the 13th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'07), volume 4424 of Lecture Notes in Computer Science, pages 170--184, Braga, Portugal, March 2007. Springer. [DDSS07] D. D'Aprile, S. Donatelli, A. Sangnier, and J. Sproston. From Time Petri Nets to Timed Automata: An Untimed Approach. In Proceedings of the 13th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'07), volume 4424 of Lecture Notes in Computer Science, pages 216--230, Braga, Portugal, March 2007. Springer. B. Bollig, J.-P. Katoen, C. Kern, and M. Leucker. Replaying Play in and Play out: Synthesis of Design Models from Scenarios by Learning. In Proceedings of the 13th International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS'07), volume 4424 of Lecture Notes in Computer Science, pages 435--450, Braga, Portugal, March 2007. Springer. H. Comon-Lundh, F. Jacquemard, and N. Perrin. Tree Automata with Memory, Visibility and Structural Constraints. In Proceedings of the 10th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'07), volume 4423 of Lecture Notes in Computer Science, pages 168--182, Braga, Portugal, March 2007. Springer. F. Laroussinie, N. Markey, and G. Oreiby. On the Expressiveness and Complexity of ATL. In Proceedings of the 10th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'07), volume 4423 of Lecture Notes in Computer Science, pages 243--257, Braga, Portugal, March 2007. Springer. P. Bouyer, K. G. Larsen, and N. Markey. Model-Checking One-Clock Priced Timed Automata. In Proceedings of the 10th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'07), volume 4423 of Lecture Notes in Computer Science, pages 108--122, Braga, Portugal, March 2007. Springer. S. Demri and D. D'Souza. An automata-theoretic approach to constraint LTL. Information and Computation, 205(3):380--415, March 2007. [BJ07a] A. Bouhoula and F. Jacquemard. Tree Automata, Implicit Induction and Explicit Destructors for Security Protocol Verification. Research Report LSV-07-10, Laboratoire Spécification et Vérification, ENS Cachan, France, February 2007. 21 pages. B. Ksieżopolski and P. Lafourcade. Attack and Revison of an Electronic Auction Protocol using OFMC. Technical Report 549, Department of Computer Science, ETH Zurich, Switzerland, February 2007. 13 pages. [DN07] S. Demri and D. Nowak. Reasoning about transfinite sequences. International Journal of Foundations of Computer Science, 18(1):87--112, February 2007. S. Bursuc, H. Comon-Lundh, and S. Delaune. Associative-Commutative Deducibility Constraints. In Proceedings of the 24th Annual Symposium on Theoretical Aspects of Computer Science (STACS'07), volume 4393 of Lecture Notes in Computer Science, pages 634--645, Aachen, Germany, February 2007. Springer. [Laf07b] P. Lafourcade. Rapport d'activités à 3 mois, contrat CNRS/DGA référence : 06 60 019 00 470 75 01 << Utilisation et exploitation des théories équationnelles dans l'analyse des protocoles cryptographiques >>. Contract report, DGA, January 2007. 3 pages. J. Goubault-Larrecq. Believe It Or Not, GOI is a Model of Classical Linear Logic. Research Report LSV-07-03, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2007. 18 pages. S. Demri and E. Orlowska. Relative Nondeterministic Information Logic is EXPTIME-complete. Fundamenta Informaticae, 75(1-4):163--178, 2007. [Rey07a] P.-A. Reynier. Diagonal constraints handled efficiently in UPPAAL. Research Report LSV-07-02, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2007. 4 pages. [Bau07] M. Baudet. Sécurité des protocoles cryptographiques : aspects logiques et calculatoires. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, January 2007. [DLN07] S. Demri, R. Lazić, and D. Nowak. On the freeze quantifier in constraint LTL: Decidability and complexity. Information and Computation, 205(1):2--24, January 2007. [Com07] H. Comon-Lundh. Soundness of abstract cryptography, 2007. Course notes (part 1), Symposium on Cryptography and Information Security (SCIS2008), Tokai, Japan. J. Goubault-Larrecq. Preuve et vérification pour la sécurité et la sûreté. In Encyclopédie de l'informatique et des systèmes d'information, chapter I.6, pages 683--703. Vuibert, December 2006. [BKŘS06] L. Bozzelli, M. Křetínský, V. Řehák, and J. Strejček. On Decidability of LTL Model Checking for Process Rewrite Systems. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 248--259, Kolkata, India, December 2006. Springer. doi: 10.1007/11944836_24. [BLMR06] P. Bouyer, K. G. Larsen, N. Markey, and J. I. Rasmussen. Almost Optimal Strategies in One-Clock Priced Timed Automata. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 345--356, Kolkata, India, December 2006. Springer. F. Chevalier. Decision procedures for timed logics. Invited talk, Advances and Issues in Timed Systems, Kolkata, India, December 2006. P. Gastin. Refinements and Abstractions of Signal-Event (Timed) Languages. Invited talk, Advances and Issues in Timed Systems, Kolkata, India, December 2006. P. Gastin, N. Sznajder, and M. Zeitoun. Distributed synthesis for well-connected architectures. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 321--332, Kolkata, India, December 2006. Springer. F. Chevalier, D. D'Souza, and P. Prabhakar. On continuous timed automata with input-determined guards. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 369--380, Kolkata, India, December 2006. Springer. [CKKW06] V. Cortier, S. Kremer, R. Küsters, and B. Warinschi. Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. In Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'06), volume 4337 of Lecture Notes in Computer Science, pages 176--187, Kolkata, India, December 2006. Springer. [Del06b] S. Delaune. An Undecidability Result for AGh. Theoretical Computer Science, 368(1-2):161--167, December 2006. [BBS06b] C. Baier, N. Bertrand, and Ph. Schnoebelen. On Computing Fixpoints in Well-Structured Regular Model Checking, with Applications to Lossy Channel Systems. In Proceedings of the 13th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'06), volume 4246 of Lecture Notes in Artificial Intelligence, pages 347--361, Phnom Penh, Cambodia, November 2006. Springer. L. Bozzelli and R. Gascon. Branching Time Temporal Logic Extended with Presburger Constraints. In Proceedings of the 13th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'06), volume 4246 of Lecture Notes in Artificial Intelligence, pages 197--211, Phnom Penh, Cambodia, November 2006. Springer. S. Taktak, E. Encrenaz, and J.-L. Desbarbieux. A Tool for Automatic Detection of Deadlock in Wormhole Networks on Chip. In Proceedings of the IEEE High Level Design Verification and Test Workshop (HLDVT'06), pages 203--210, Monterey, California, USA, November 2006. IEEE Computer Society Press. doi: 10.1109/HLDVT.2006.319992. V. Diekert and P. Gastin. Pure future local temporal logics are expressively complete for Mazurkiewicz traces. Information and Computation, 204(11):1597--1619, November 2006. Ph. Schnoebelen. De nouvelles applications pour le model-checking. Invited lecture, Journées à l'occasion des 20 ans du LIPN, Villetaneuse, France, November 2006. [KBL+06] F. Klay, L. Bozga, Y. Lakhnech, L. Mazaré, S. Delaune, and S. Kremer. Retour d'expérience sur la validation du vote électronique. Technical Report 9, projet RNTL PROUVÉ, November 2006. 47 pages. [B+06] P. Bouyer et al. ACI Sécurité Informatique CORTOS --- Rapport final, November 2006. 17 pages. [SBS06] Ph. Schnoebelen, A. Bouajjani, and G. Sutre. ACI Sécurité Informatique PERSÉE --- Rapport final, November 2006. 12 pages. P. Gastin. GasTEX: Graphs and Automata Simplified in TEX (v2.8), November 2006. Written in TEX(about 2000 lines). [BBBL06] H. Bel mokadem, B. Bérard, P. Bouyer, and F. Laroussinie. Timed temporal logics for abstracting transient states. In Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis (ATVA'06), volume 4218 of Lecture Notes in Computer Science, pages 337--351, Beijing, China, October 2006. Springer. [BHR06c] P. Bouyer, S. Haddad, and P.-A. Reynier. Timed Unfoldings for Networks of Timed Automata. In Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis (ATVA'06), volume 4218 of Lecture Notes in Computer Science, pages 292--306, Beijing, China, October 2006. Springer. S. Demri, A. Finkel, V. Goranko, and G. van Drimmelen. Towards a model-checker for counter systems. In Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis (ATVA'06), volume 4218 of Lecture Notes in Computer Science, pages 493--507, Beijing, China, October 2006. Springer. P. Bhateja, P. Gastin, and M. Mukund. A fresh look at testing for asynchronous communication. In Proceedings of the 4th International Symposium on Automated Technology for Verification and Analysis (ATVA'06), volume 4218 of Lecture Notes in Computer Science, pages 369--383, Beijing, China, October 2006. Springer. N. Markey. Verification of Multi-Agent Systems with ATL. Invited talk, FNRS meeting on "Synthesis and Verification", October 2006. [Ber06b] N. Bertrand. Modèles stochastiques pour les pertes de messages dans les protocoles asynchrones et techniques de vérification automatique. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2006. [G+06] P. Gastin et al. ACI Sécurité Informatique VERSYDIS --- Rapport final, October 2006. 10 pages. [BBS06c] C. Baier, N. Bertrand, and Ph. Schnoebelen. Symbolic verification of communicating systems with probabilistic message losses: liveness and fairness. In Proceedings of 26th IFIP WG6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE'06), volume 4229 of Lecture Notes in Computer Science, pages 212--227, Paris, France, September 2006. Springer. [MBDC+06] F. Mancinelli, J. Boender, R. Di Cosmo, J. Vouillon, B. Durak, X. Leroy, and R. Treinen. Managing the Complexity of Large Free and Open Source Package-Based Software Distributions. In Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06), pages 199--208, Tokyo, Japan, September 2006. IEEE Computer Society Press. doi: 10.1109/ASE.2006.49. [AB06] E. Asarin and P. Bouyer, editors. Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, Paris, France, September 2006. Springer. doi: 10.1007/11867340. [BGP06b] B. Bérard, P. Gastin, and A. Petit. Refinements and abstractions of signal-event (timed) languages. In Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, pages 67--81, Paris, France, September 2006. Springer. doi: 10.1007/11867340_6. [BGP06a] B. Bérard, P. Gastin, and A. Petit. Intersection of regular signal-event (timed) languages. In Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, pages 52--66, Paris, France, September 2006. Springer. [CEFX06b] R. Chevallier, E. Encrenaz-Tiphène, L. Fribourg, and W. Xu. Verification of the Generic Architecture of a Memory Circuit Using Parametric Timed Automata. In Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, pages 113--127, Paris, France, September 2006. Springer. F. Laroussinie, N. Markey, and G. Oreiby. Model Checking Timed ATL for Durational Concurrent Game Structures. In Proceedings of the 4th International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS'06), volume 4202 of Lecture Notes in Computer Science, pages 245--259, Paris, France, September 2006. Springer. [MOJ06] I. Mitsuhashi, M. Oyamaguchi, and F. Jacquemard. The Confluence Problem for Flat TRSs. In Proceedings of the 8th International Conference on Artificial Intelligence and Symbolic Computation (AISC'06), volume 4120 of Lecture Notes in Artificial Intelligence, pages 68--81, Beijing, China, September 2006. Springer. [Laf06] P. Lafourcade. Vérification des protocoles cryptographiques en présence de théories équationnelles. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2006. 209 pages. [Bel06] H. Bel mokadem. Vérification des propriétés temporisées
cc/2020-05/en_middle_0097.json.gz/line1418268
__label__cc
0.524674
0.475326
Search Results: 'Catherine the Great' 130 results for "Catherine the Great" Aggressive Christianity: A Passionate Call for Christian Social Justice Expressed by Christ By Catherine Booth & William Booth Paperback: List Price: $9.96 $5.98 | You Save: 40% This collection of lectures by Catherine Booth and William Booth form a passionate call to Christians to improve the dire social status of society's poor and downtrodden. Along with her husband... More > William Booth, who assisted in the preparation and publication of this splendid book, Catherine Booth was a fervent supporter of Christian charity; extending support and aid to help the disadvantaged was seen by the author to be a crucial tenet of good character. Throughout her life, Catherine Booth would point to Christ as a prime example of a Christian virtue and self-sacrifice. At the time Catherine Booth wrote these talks in the late 19th century, levels of poverty in the United States and Europe were abysmally great. It is by casting her gaze back to the life of Jesus Christ that Booth sees a clear inspiration for all in the face of such degradation. Only when Christians unite in opposition to poverty will social reform and improvements take hold in wider society.< Less Murder In Mind By Catherine Mikdadi-Pattinson Murder in Mind is a murder mystery novel set in a typical English village. Sarah Quentin returns home from university to the sleepy village of Hisbury and is confronted with mayhem and murder. She... More > teams up with two young men, one she has known all her life and one who has just arrived in the village, and together they attempt to solve the mystery but will they succeed or will they discover more than they bargained for. This is an ingenious plot with many unexpected turns, so curl up with this delightful novel and see if you can guess who the murderer is before he or she is revealed! A great gift for someone who loves to relax with a good book. The author, Catherine Mikdadi-Pattinson, is married and lives in Wiltshire with her 2 children. She has always loved writing but this is her first novel.< Less Divine Dining By Catherine Russo Epstein Transform your body using ancient techniques, modern tools, and expanded awareness. Simply by putting positive love and intention toward healthier eating habits, you will make sweeping changes in... More > your life. You will be able to tap into your own natural healing abilities and become master of your own world. It is not so much about what we eat, as it is about the energy that we bring to the act of eating. Any time we put our intention into anything, and pour forth great love, we are sure to reap positive results. Remember, with each day and each Now moment, we have the ability to create a new world and a new life! Let go of your guilt and old patterns, and open yourself to the possibilities and benefits of healthier eating. Bring your full awareness to the joy of Divine Dining!< Less Company Man By Harry Barrett Pratt & Catherine Hughes Diarists become historians when their lives are touched by momentous events, whether fleeing the Great Fire of London, or hiding in an attic from the Nazi’s. My grandfather Harry Barrett Pratt... More > was born in 1890 in the North East of England. He oiled the wheels of Sir Thomas Lipton’s grocery empire throughout the turbulent first half of the 20th Century, broken only by military service during WW1, which took him to the lesser known theatre of war in East Africa. He was a workaholic, intent on providing for his family. From shop floor to Board of Directors, he was a company man. He had the ear and respect of Sir Thomas. His career span two world wars and the financial depression He kept a meticulous diary during those years, which gives a fascinating insight into the impact of global conflict on a nation. This is a tribute to a generation.< Less Gandy ekwa kitohcikan By Catherine Mardon et al. My name is Gandalf, but you can call me Gandy. My best friend Barney and I are quite the adventurers. Our adventure this time around focused on music, heritage, great food, and keeping those you love... More > alive in your heart. I wonder what will await us next!< Less Edible Landscaping in The Desert - 2016 By Catherine The Herb Lady & Deane Stanton Photographer Calendar: List Price: $19.95 $11.97 | You Save: 40% Blessed with 300+ sunny days in a climate similar to the Mediterranean part of the world, the Valley of The Sun (Phoenix, Arizona Metro) we can grow vegetables, herbs and fruits year-round here. ... More > Most of the success is attributed to understanding when to plant for the variety. Tomatoes and Basil are warm weather crops, whereas kale, lettuces and roots are cool weather crops. With this month-by-month planting guide and tips YOU can garden 365 days a year, harvesting great food from your own backyard. If you live in USDA Zone 9b or Sunset Magazine Zone 13 - this calendar will work for you too!< Less Valley of The Sun Gardening Calendar - 2015 By Catherine The Herb Lady & Deane Stanton, Photographer Crack! - a Pantomime in Two Acts By Graham Rutt et al. Paperback: List Price: $16.50 $8.25 | You Save: 50% A pantomime script for use by any group of people who want to entertain themselves and their friends, the authors are quite happy for you to alter any of the script providing it remains suitable for... More > family entertainment. The central character is Dame Strong, who opens the play by discussing the meaning of life with a mirror. Dame Strong is ugly, and has a terrible secret, so dark that she tells no-one about it. Hearing of a potion that might make her more attractive, she sends her next door neighbours (three Fine Young Things called Dee Lisla, Sam Sun and Spare Part) to find the ingredients for this potion. Hearing all this, her sister (Marion) decides to run away to a nunnery. The evil butler (Wat Youwant) decides to send his minions to search for the ingredients, hoping to get them first and be in a position to make money by selling the potion to the Dame... The authors and the cast had great fun putting this pantomime on for their friends and hope you do too.< Less ME Robots: Mechanical Engineering Basics Level 1 - Student Workbook By St. Catherine University National Center for STEM Elementary Education Student workbook for the ME Robots curriculum. Includes Engineer-in-Training Certificate of completion. Great for the teachers or parents who use the ME Robots Training manual to teach the basics of... More > mechanical engineering.< Less << < 2 3 4 5 6 7 8 9 10 11 > >>
cc/2020-05/en_middle_0097.json.gz/line1418269
__label__wiki
0.952499
0.952499
5 Recent articles DOMESTIC VIOLENCE: LEKAN SHONDE SENTENCED TO DEATH March 11, 2019 AYODELE FAYOSE: OBANIKORO ADMITS RELUCTANCE TO TESTIFY February 4, 2019 AYODELE FAYOSE: SENATOR OBANIKORO TESTIFIES January 21, 2019 ERASTUS AKINGBOLA: TRIAL ADJOURNED AGAIN January 17, 2019 NBA President, Paul Usoro SAN arraigned for conversion, criminal breach of trust December 18, 2018 TRIAL CONTINUES IN CHARGE AGAINST DUDAFA AND FORMER MANAGER OF HERITAGE BANK The Reasonable Man October 28, 2016 Funmi Trial continued yesterday, the 27th of October 2016, in the criminal charge filed by the Economic and Financial Crimes Commission (EFCC) against Mr. Waripamo-Owei Dudafa, former Special Assistant to the president under the Goodluck Jonathan administration and Mr. Iwejuo Joseph Nna, the former branch manager of the Yenagoa branch of Heritage Bank. The duo are facing a 23-count charge on money laundering offences relating to concealing the proceeds of crime. Both are accused in the first count with conspiring to conceal proceeds of crime while they are individually charged in seven counts in respect of Mr. Joseph and eight counts in respect of Mr. Dudafa with procuring the services of several companies – Seagate Property Development & Investment Company, Avalon Global Property Dev. Co. Ltd, Ebiwise Resources, Pluto Property & Investment Co. Ltd, Rotato Inter Link Services Ltd and De Jakes Fast Food Restaurant Nig Ltd – to conceal proceeds of crime. Mr. Joseph is said to have carried out these acts on behalf of Mr. Dudafa. Mr. Dudafa is charged in the last seven counts of failing to furnish information to the Commission in respect of the monies held on his behalf in Ebiwise Resources, Avalon Global Property Dev. Co. Ltd, De Jakes Restaurant and Ibejige Services Ltd and his interest in two of the companies. The charge is pending before Hon. Justice Idris of the Lagos Division of the Federal High Court. Mr. Dudafa is facing another 15-count charge along with Amajuoyi Azubuike Briggs, Adedamola Bolodeoku and four companies – Pluto Property and Investment Company Ltd, Seagate Property Development & Investment Co. Ltd, Trans Ocean Property & Investment Company Limited and Avalon Global Property Development Company Ltd in respect of similar offences. Read the last report on that charge pending before Hon. Justice Kuewunmi here. Two prosecution witness had earlier testified in the suit, one is a staff of Heritage Bank who had come to tender documents particularly the mandate and different written instructions in respect of the accounts belonging to the companies with Heritage Bank. The second witness the Commission had called is a Bureau De Change Operator, Murtala Bashir Abubakar who runs three companies – Na Mu Duka Ventures, Yamusa Oil Services Ltd and 313 Ventures. He testified that he had known Mr. Dudafa since he was the Commissioner for Local Government in Bayelsa State under the administration of Governor Timipre Sylva and he had converted and disbursed monies on his behalf. He testified that he received instructions via text messages except in respect of one transaction where Mr. Dudafa invited him to the Presidential villa and handed him four million dollars in cash. His statements of account as well as those of his companies were tendered and he highlighted all the transactions between himself and Mr. Dudafa from 2013 to 2015. His telephone wherein he received instructions from Mr. Dudafa via text messages was also tendered. Under cross-examination, Mr. Abubakar stated that his transactions with Mr. Dudafa were legitimate and did not contravene any Central Bank of Nigeria regulations. He stated that he received instructions from Mr. Dudafa through three telephone numbers. Mr. Oyewole, counsel to Mr. Dudafa informed him that only one of those numbers is the registered number of Mr. Dudafa and asked him to state the message he received from that number. Mr. Abubakar stated that the only message he had received from the number was to ask the exchange rate of pound sterling to Naira to which he had replied. When asked by Mr. Abumere, counsel representing Mr. Joseph, Mr. Abubakar confirmed that he had never met Mr. Joseph or transacted with him. The Commission called two more witnesses yesterday – compliance officers from Guaranty Trust Bank and Heritage Bank. Mr. Olanrewaju from Guaranty Trust Bank testified that upon getting an enquiry letter from EFCC, they supplied the Commission with copies of the account opening documents and statements of account of De Jakes Fast Food. The documents were tendered by the Commission. He further testified that the signatories to the account of De Jakes Fast Food are Mrs. Priye Dudafa and Mr. Waripamo-Owei Dudafa. Prompted by Mr. Oyedepo, counsel representing the EFCC, he identified several entries in the statement of account of the company – on the 18th of March 2013, a total sum of 63.2 Million Naira was paid into the account by one Namuduka Ventures; on the 23rd of January 2015, there was a credit of 30 Million Naira to the account from a 313 BDC Ltd and a total of 78 Million Naira from Abubakar Murtala Bashir; on the 26th of January 2015, the sum of 1.2 Million Naira was credited to the account by Abubakar Murtala Bashir while a total sum of 40 Million Naira was credited to the account by Dambazzau Global and another total sum of 28 Million Naira was credited to the account by a Babura Global; on the 30th of January 2015, there was a credit of the total sum of 23.3 Million Naira to the account from Dambazzau Global. He further testified that from the incorporation documents submitted to the bank, there were three directors of the company named as Hon. Waripamo-Owei Dudafa, Mrs. Priye Dudafa and Dudafa (Jnr). Under cross-examination, Mr. Olanrewaju stated that the account in question was domiciled in Yenagoa. He agreed that if any funds were credited to an account in contravention of any banking or money laundering regulations or which looks like suspicious activity, a report would be made by the bank to the relevant regulatory authorities. He however could not say whether any report was made in respect of the transactions relating to the said account. He stated that he doesn’t know Mr. Joseph. EFCC also called Mr. Adeniyi Tunde, a compliance officer from Heritage Bank. He identified Mr. Joseph as a former branch manager of the Yenagoa branch of the bank and testified that upon receiving a letter from the EFCC inviting the account officers of certain accounts, the bank’s head office which is on Ahmadu Bello, Victoria Island, Lagos sent for Mr. Joseph and he replied that he would be coming the following day. He said that the following day, he called Mr. Joseph who said that he was close to Lagos and was in fact at Sagamu and subsequently became unreachable as his phone was switched off. When they could finally get hold of him the following day, he stated that he was ill and was in the hospital and that he would forward a medical report to the bank. He testified that Mr. Joseph finally showed up sometime in May 2016 and he was taken to the offices of the EFCC where he was detained by the Commission. He stated that EFCC officials subsequently brought Mr. Joseph to the Bank where he showed them how he wrote and signed instructions in order to release funds from the account. He added that Mr. Joseph was not forced by any of the EFCC officials present with them at the bank to sign the instructions. Under cross-examination, Mr. Adeniyi Tunde stated that the accounts in question were domiciled at the Yenagoa branch of the Bank. He stated that he does not know if any queries or reports were made in respect of the transactions in the accounts. He stated that from the 10th of May 2016 when Mr. Joseph reported to the bank till the 1st of June 2016 when he was brought by EFCC officials to the bank and he signed the instructions, Mr. Joseph was in detention at the EFCC and he cannot say what transpired between the EFCC and Mr. Joseph during that period. Upon being asked by Mr. Abumere who is representing Mr. Joseph, he confirmed that Mr. Joseph did scan a medical report to the bank when he was unable to come to Lagos immediately. The case has been adjourned to the 8th and 10th of November 2016 for continuation of trial. Dudafa, EFCC, Federal High Court, Justice Idris, Money Laundering About Funmi View all posts by Funmi → PATIENCE JONATHAN SEEKS TO DISCHARGE FREEZING ORDER ON HER FUNDS FORMER GOVERNOR, ORJI UZOR KALU RE-ARRAIGNED ON MONEY LAUNDERING CHARGES Tweets by @luminary_ng Terms & Conditions | Disclaimer | Copyright © 2020 by Luminaryng. Proudly powered by Index Tech-Land
cc/2020-05/en_middle_0097.json.gz/line1418270
__label__cc
0.707747
0.292253
+44 (0)208 687 6000opportunities@pingusenglish.comCONTACT International Kindergarten program (3-6+ years) Pre-school English enrichment program (3-9+) Tots pre-school program (18 – 36 months) Principles of Learning Meet Pingu and Friends Why Choose Pingu’s English Childcare Solutions Own a Master Franchise With Pingu’s English Steps to Franchise Ownership with Pingu’s English Why choose an English Training and Kindergarten Franchise? Benefits of a franchise partnership with us +44 (0)208 687 6000opportunities@pingusenglish.com http://www.pingusenglish.com/thailand-help-its-school-licensees-to-achieve-yle-preparation-center-certificate-from-cambridge-assessment-english-university-of-cambridge/b/ The Early Years Foundation Stage curriculum and Pingu’s English The Early Years Foundation Stage (EYFS) curriculum is the government created curriculum for all early years’ settings and schools in the United Kingdom.… Pingu’s English Indonesia opens new school in Batam Pingu’s English Indonesia have today announced the opening of the latest Pingu’s English school in the country, with the launch of Pingu’s… Pingu’s English Pakistan – the success story continues! Last week, Mr Mark Simpson, Business Development Manager with the Linguaphone Group was delighted to visit Pingu’s English Pakistan for a busy… We at the British Chamber of Commerce worked with Linguaphone Group to find them a new in-market partner for the Korean market. Throughout the engagement we had with Linguaphone Group, we found them to be passionate about education, supremely professional in their approach to business and both responsive and personable in their interactions with ourselves and Korean partners. Korean investors were attracted to the best-in-class program which Linguaphone Group offers, the strong reputation of the company and the heritage with which it is associated. These are qualities that resonate globally. British Chamber Korea Sean Blakeley, BCCK CEO Our Experience with Pingu’s English has been profitable and positive from the first year. We relied on their professionalism and heritage, their staff is always prompt to assist with the latest trends and ideas on the market. We were looking for a brand who can guarantee us quality and a solid method but at the same time would leave us the freedom and flexibility in order to succeed in our challenging and competitive market like the Italian one. We built Pingu’s English project in Italy by mixing their huge international experience in the English training with our knowledge of the Italian market. All this enabled us to do the right decision for our winning investment. Today we have over 40 Pingu’s English centres and thousands of happy children learning English. Daniele Arboit Pingu's English Master Franchisee Italy From our first training session in London 2009- from the academic side to customer service -we felt confident and well equipped with the necessary knowledge and skills to be successful Pingu’s English Master Licensees” At the moment, our services to all 23 networked schools across the country are effectively and efficiently backed by Pingu’s English. No doubt that we see no limit to expand our business to cover 30,000+ schools in the near future! Nipat Ungpakornkaew Pingu's English Master Licensee Thailand I knew about Pingu’s English School through a friend. After research about the school, I decided to enroll my daughter and it was one of the best things I could do to her. She loves studying at Pingu’s English and she cannot wait to the day of the class. I also love Pingu's English School, because there she learns by playing and I can see her progress day by day. Léia Rodrigues Pingu's English Student's mother / Brazil Now she is studying at Pingu’s English School, my daughter only wants to talk to me in English and she is always singing the songs. Cristiane Doimo Pingu's English Student's mother /Brazil Regarding the teaching method they use a figurative storytelling way of starting the lesson, trying hard to involve the child and make the them curious about the situation. Tom is very happy to go to Pingu’s English because he perceives the School as a playful moment and not just as a learning moment while at the same time he is learning a new language Pingu's English Student's Mother /Italy We love Pingu’s English School because the school gives my son the opportunity to learn and develop different skills, especially English skills. He is excited every time to go to school and is always happy when he comes home. Sapavoot Preedawipart Pingu's English Student's Mother/ Thailand Pingu’s English School is not just a school; it is as a second home for my kid. I like it when I see my kid growing and learning in a friendly and safe atmosphere. Most of all, I can see a lot of improvement in his English listening and speaking skills Piyatida Tudteam Pingu's English Student's Mother/Thailand I have being running my own school for 15 years. When I met Pingu’s English, it was love at first sight. Now I am offering the best English Course available to my students and they are loving it as well as their parents. Thank you Pingu’s English! Giedre Paula Pingu’s English Unit Franchisee in State of Mato Grosso do Sul Brazil is a huge Market and the preschool english education industry is growing very fast. All our franchisees are happy with the Pingu’s English methodology as well as the operational manuals Liguaphone offers to Unit Licensees. They feel very well assisted. Ronaldo Vieira Pingu's English Master Franchisee in State of Sao Paulo Abbas always tells me that Pingu's English is the most fun he has all day. I am very glad that this place makes him feel that way and noticeably develop his language skills too Pingu's English Student's Father/Bahrain Our students are very enthusiastic in studying at Pingu’s English. They always tell us how much fun and how much they learn here. Parents also keep saying how proud they are with the knowledge and improvements their children are making. Willian Veloso Rocha Pingu’s English Unit Franchisee in State of São Paulo info@pingusenglish.com 2018 Linguaphone Group Ltd © 2018 The Pygos Group © 2018 HIT Entertainment Ltd Receive news and articles on the magic Pingu's English World True I have read and accept the Privacy Policy. I consent to my details being shared with the relevant Pingu’s English local partner to contact me with further information, if needed. You must accept the terms of the Privacy Policy
cc/2020-05/en_middle_0097.json.gz/line1418272
__label__wiki
0.974066
0.974066
/ France French lawmakers postpone religious neutrality debate until after elections Children playing in a French nursery. AFP/Lionel Bonaventure Text by: RFI France's parliament announced on Wednesday it would postpone a debate planned for this week over proposals to impose religious neutrality in private nurseries until after regional elections at the end of March. Groups protecting Christian, Muslim and secular interests have criticised the bill. The draft law, proposed by the Radical Left Party, part of the parliamentary majority of the Socialist Party, was adopted by the Senate in 2012 and validated last week by the National Assembly's Laws Commission. It was due to be debated in the lower parliament on Thursday, but lawmakers said they were postponing it until after the elections due to its sensitive nature during a campaign period. Bruno Le Roux, president of the Socialist Party group of MPs, expressed "regret" the debate coincided with the campaign for elections in France's département administrative districts, arguing the bill "does not pose any great difficulties" in legal terms but "leads to debates that are often far from the reality" of its proposals. The proposals would oblige private nurseries, daycares and other establishments that watch over children aged six and under, and that receive public funds, to guarantee they are free from signs of religious expression on their premises and among their staff. Establishments that do not receive public funds would be given the means to oblige employees who have contact with children to abide by restrictions on religious expression, in a clear reference to the case of Baby Loup, a nursery that fired a staff member for wearing an Islamic hijab. In the past week, groups representing religious communities as well as France's secular values have come out against the draft law. "Extending the obligation of neutrality in religious matters to the private sphere is not in the spirit of the Law of 1905," said bishop Olivier Ribadeau Dumas of the Bishops' Conference of France, referring to France's law that officially separates Church and State but guarantees religious freedom. Abdallah Zekri, president of the Observatory Against Islamophobia within the French Council of the Muslim Faith, denounced a "tendency towards a policy of systematic religious intolerance, specifically led against Muslims". Zekri said the bill threatened "the spirit of living together shown by French citizens on 11 January", a reference to public demonstrations condemning attacks by religious extremists in Paris. The bill also garnered condemnation from Jean-Louis Bianco, a former Socialist government minister and now president of the Observatory of Secularism, a government body in operation since April 2013. Bianco said it was "paradoxical" that the Radical Left Party would "attempt to adopt a proposal that is also part of the campaign platform of the Front National" and that he saw in the bill "a great danger for cohesion of the country itself". The bill will enter debate in the National Assembly on 11 May. google-play-badge_EN French court backs creche's firing of hijab-wearing Muslim woman Lawyer challenges French burka ban, woman's trial postponed French court convicts Islamic veil-wearing woman L'Oréal, Danone among 'A-list' French brands leading climate fight Trial of suspected jihadist recruiter opens in Paris Investigation opened after video shows police striking protestor on ground 1000s protest proposal to offer single women, LGBT couples medically assisted procreation Paris' best known gay bookshop forced to move because of soaring rents French inquiry opened over police assault of protester Imane Ayissi brings anti-colonial Africa to Paris fashion week Fire at Paris restaurant where Emmanuel Macron eats may have been deliberate Tear gas, arrests in new anti-Macron protest in Paris Louvre reopens after pension reform strikers block entry France - Strikes Pension protestors perturb presidential night out Jean Paul Gaultier says au revoir to haute-couture
cc/2020-05/en_middle_0097.json.gz/line1418286
__label__cc
0.609348
0.390652
Just When I Thought It Couldn't Get Any Worse Trump Administration Asks Supreme Court To Legalize Firing Transgender Workers The Trump Administration continues its all- on attack of our community. This is mean- spirited and takes away a protection that will prevent us from working, simply because we are transgender. Some businesses will see this a chance to fire a transgender person for no other cause than the person's gender identity. With e-verify and employment application questions it is already difficult to get a job and now with this in place, any transgender person's job is at risk; during transition or being outed while working. If you are a casual "cross dresser", do not think that makes you safe. Already this has occurred - Oiler v. Winn-Dixie Louisiana, Inc. It is difficult for me to understand how anyone in our community could still support Trump. This has moved me from the outspoken category to the activist state. I will do all that I can do to prevent another four years of this outright attack on our rights. Without Justice Department support, as we have had in the past, our best hope is that the Supreme Court will rule that our transgender rights will continues to be protected under Title VII. I.e. - I believe that there are still reasonable Supreme Court judges. Going forward, that could be subject to change. Here are the details from Huffpost 08/16/2019 07:33 pm: The Supreme Court is considering three cases that look at whether LGBTQ employees are protected under federal civil rights law. By Antonia Blumberg The Trump administration is asking the Supreme Court to set a legal precedent that would make it OK for an employer to fire a person for being transgender. In a brief filed Friday, the Justice Department argued that Title VII of the Civil Rights Act of 1964 only protects workers from discrimination based on their “biological sex.” “Title VII does not prohibit discrimination against transgender persons based on their transgender status,” the Justice Department wrote. “It simply does not speak to discrimination because of an individual’s gender identity or a disconnect between an individual’s gender identity and the individual’s sex.” The Supreme Court agreed earlier this year to hear three cases that look at whether Title VII, the federal civil rights law that prohibits workplace discrimination, applies to LGBTQ workers. Friday’s brief pertains to one of the lawsuits, R.G. & G.R. Harris Funeral Homes Inc. v. Equal Employment Opportunity Commission, in which a transgender woman was fired after she transitioned. Aimee Stephens had reportedly presented as a man when she began working at R.G. & G.R. Harris Funeral Homes in Michigan in 2007. The company’s owner, Thomas Rost, fired her six years later, when she announced her plans to transition. The U.S. Court of Appeals for the 6th Circuit ruled that Stephens’ firing was discriminatory. “The unrefuted facts show that the Funeral Home fired Stephens because she refused to abide by her employer’s stereotypical conception of her sex,” the court wrote in a 49-page decision. “Discrimination against employees, either because of their failure to conform to sex stereotypes or their transgender and transitioning status, is illegal under Title VII,” the court said. “It is analytically impossible to fire an employee based on that employee’s status as a transgender person without being motivated, at least in part, by the employee’s sex.” But the Justice Department argued on Friday that “the ordinary public meaning of ‘sex’ was biological sex” when the Civil Rights Act passed in 1964. “It did not encompass transgender status, which Stephens and the Sixth Circuit describe as a disconnect between an individual’s biological sex and gender identity,” DOJ lawyers wrote. “In the particular context of Title VII — legislation originally designed to eliminate employment discrimination against racial and other minorities — it was especially clear that the prohibition on discrimination because of ‘sex’ referred to unequal treatment of men and women in the workplace.” Chase Strangio, a staff attorney at the American Civil Liberties Union, which is representing Stephens in her suit, argued that the case has implications beyond the trans community. “People don’t realize that the stakes are extending not just the trans and LGB communities, but every person who departs from sex stereotypes: Women who want to wear pants in the workplace, men who want more childbearing responsibilities. Those protections are also in peril with the arguments advanced by the Trump administration, presented at the Supreme Court,” Strangio told HuffPost. He added: “There isn’t a coherent way to carve out LGBT people without changing the standard that exists under the law.” The Supreme Court is also looking at two cases of employees fired over their sexual orientation: In Altitude Express Inc. v. Zarda, Long Island skydiving instructor Don Zarda was fired after he told a client he was gay. Last year, the U.S. Court of Appeals for the 2nd Circuit ruled that Zarda’s firing was discriminatory. But the 11th Circuit, in a similar case, Bostock v. Clayton County, Georgia, ruled that precedent suggested Title VII did not protect against discrimination based on sexual orientation. Posted by rhonda's escape at 4:14 PM As for the issue of 'Supporting T-rump'; The Log Cabin Republicans announced their support for same on this day. I suppose these individuals have to worry about 'daddys wealth' and subsequent inheritance. Remember Easu? rhonda's escape August 17, 2019 at 11:11 PM You must be "F...ing" kidding me. What hypocrisy especially when they do not know yet who will represent the opposition. Blinded by party affiliation. Sad! https://www.washingtonpost.com/opinions/trump-met-his-commitments-to-lgbtq-americans-he-has-our-endorsement/2019/08/15/fb9b741c-bf96-11e9-a5c6-1e74f7ec4a93_story.html As the poster of the first message, please be aware that the ONLY thing I have in common with DJT is white (orange?) skin. I-- (and you too, gender variant person, as if you have just recently outed yourself at your local 'DJT rally', by showing up 'full enfemmme' just so the info could travel back to your place of employment! --hope you did not work at Winn-Dixie!) -- have much more in common with working class persons of ANY variation, than I have in common with THE RICH, POWERFUL, MACHIAVELLIAN UBER CLASS, that somehow you think you are part. If you are so, so, "ALL THAT", (Then, why are you here?) try showing up at the DJT fundraiser at the COUNTRY CLUB in, say, Greenwich CT. AND Do so attend 'enfemme'! OH, HEY! bring along your teenage offspring to the soiree. Perhaps your youngster can be part of the debutante guild. (NOT! NO 'MUTTS' ALLOWED!) They will be sure, to offer you the 'rear door, service entrance' if you get in at all. Perhaps you will be able to assist in any contractor maintenance/custodial problems..... Maybe DJT can write you a check for your services.... OOPS! After all, in the scope of things greater, YOU TOO are just one of 'those, those, those, people'. You know, the ones 'not of the proper stripe' and 'simply dont know their OWN PLACE' and who did 'not try hard enough at prep school', or perhaps your NANNY failed to... As for my (disabled)wife and I, we will be voting along with the OTHER MINORITIES. Take a damn good look in the mirror, GENDER OUTSIDER MINORITY, BEFORE and AFTER you put on your MAKEUP! DJT will be appreciative (at least for a minute) of your ballot. After all, YOU are the dispensable, disposable, easily replaced HIRED HELP, arent you? The IRONIC HELL of it is, Years ago, living in the 'Southern Fried', 'Bible Thumping', PSUEDO-Christian, 'You gonna get your PIE in the SKY', 'Holier Than Thou', 'more BLESSED that YOU (heathen)', SOUTH, I USED to think the same way! V. is WOKE and has been that way for quite some time! joanna Santos August 18, 2019 at 4:45 AM This is a new low for this venomous administration. Vote them out in 2020! Friends Friday - Thanks Why I Hate Capris Why Don't Men Wear High Heels? Would You Wear It? - White Denim Skirt Congruence vs Transition The Bad News About Time The Southern Comfort Conference '19 - Followup Over 60 Fashion Basics Log Cabin Republicans Board Member Resigns Class Rejects the Church Over Anti-Gay (LGBT) Poli... Bra Shopping - The Soma Way Summer Sales '19 - Sandals Friend's Friday - Are Transgender Conferences Stil... The Southern Comfort Conference '19 Summer Sales '19 Trump Will Turn On Nation Genderfluid - What Is Our Big Deal? Stand Tall... Unfriend Friday The Flip-Flop/Thong True Blue Fashion Advice Victoria's Secret's First-ever Transgender Model Political Cartoons 8-4 (Graphic Content) Play Time - I Started Early Feminine Differential - Power National Girlfriend Day '19
cc/2020-05/en_middle_0097.json.gz/line1418287
__label__cc
0.594073
0.405927
Monday Morning Sentimonies: 40 Points?!? And We Lost?!?! Riders 41 – RedBlacks 44 Show of hands. If I had told you in advance of Thursday’s game that the Riders would score 24 points in the first half and 41 points by the end of the game, how many of you would have bet a considerable amount on the Riders? I know I would have. I’m honestly not sure what shocked me more, the fact that we scored 40 and lost or the fact that we scored 40 period. This was just an unexpected game. Two young QBs who had their struggles in Game 1, so of course they both throw over 350 yards and commit no turnovers. Two strong defensive units, so of course its one of the highest scoring games in recent memory. Just a whole lot of weird. It was a damn exciting game to watch but the end was yet another loss. Look I’m as encouraged as anyone that our offense suddenly broke out of a slump going back over a year but there are no morale victories. We lost again and we lost again because we aren’t playing good enough football. In both of the first 2 games we have played well in only 1 of 3 phases. First game it was the defense playing great, while the offense struggled. Thursday it was our offense playing well but our defense giving it up like a drunk co-ed on Friday night. There have been just two constants. 1 – We can’t play well in more than 1 phases at a time. 2 – Our special teams are brutal. Let’s start on the offense. With talk of rotating QBs in the air, Fajrado stepped in and seized the starter’s role and would not let go. He looked like a completely different QB from Week 1. Decisive, accurate, aggressive, protected the ball, seemed to be aware that passes longer than 4 yards were permissible. He hit 8 different receivers, leaning heavily on Moore and Evans (who finally broke his endzone curse). He got decent, but not great, protection up front (I mean he got sacked on a 3 man rush where a guy came clean off the edge). But you have to be happy with what the offense did… which is something we have not said around here for a long, long time. When we stepped back and chucked it deep at the end of the first quarter I damn near fell out of my chair in surprise. McAdoo seemed to trust Fajardo and open things up as a result. Hopefully that continues. Can’t remember the last time I said that I liked our game plan on O. Everything not related to the offense was utter garbage. Defense had no answer for Dom Davis (who shocked a lot of people, myself included with his play). Nick Marshall had a rough day. Some of it was just great coverage getting beat by an even better pass but some of it was just not good coverage. Solomon Means is terrible. I bet he was cheaper than retaining Butler but the drop-off in performance is staggering. He was 7 yards off and 2nd and 3. He was nowhere close to his receiver at other times. He just wasn’t good. Front 4 had their moments but haven’t been the game changers we need them to be. We also still do not have a turnover. It’s no secret that no turnovers for this team will make it really, really hard to win games. I feel reasonably confident that the D will get this fixed. I can’t say the same for the special teams… they have been consistently awful through the first 2 weeks. Where to start? It’s great that Lauther can hit from 57 (what a kick!) but it would be nicer if he could consistently make easier kicks, like say a convert. 3 missed kicks in 2 games is not a good start. He’s also averaging 10 yards less on kickoffs than last season. Get your crap together! Christion Jones has exactly 1 job on this team, return kicks. He literally does nothing else. When we have great returners like Thigpen, Moore and Purifoy on the roster who also do other things, Jones needs to be awesome to justify a roster spot. Mediocre returns and fumbles are not awesome. I’m not giving up on him but maybe a week off to think about things will be good for him. And yes I know some of it is blocking but when you watch him return he simply isn’t the same guy we were used to. Get your crap together! And how about the most popular man in Riderville, Jon Ryan? So far I would say he’s actually had a negative impact on our team. Sure he can kick far but he consistently outkicks the coverage leading to big returns. Now one solution is to find special team gunners who can run faster but I’m guessing its far easier to just have Ryan take a bit off his kick or angle it higher. Bartel had a weak leg by comparison but at least the coverage knew where to be and when. I’m shocked that Dickenson (a noted special teams guru) doesn’t have this unit better prepared. While they have come close in back to back weeks, the simple truth is that you can’t expect to win in the CFL when you only play good in one of three phases. I still feel a bit like I’m in bizzaro-land praising the offense and scolding the D and special teams. Not time to panic yet (we have started awful the past few years and recovered) but the window to get our crap together and remain relevant this season starting to close. · Everyone is jumping on Rider fans for their hypocrisy regarding Mak Henry. Look he was correctly penalized and he should he fined. No place in the game for that. I think a suspension is a bit harsh but wouldn't argue a 1 game too much… but if you think the Simoni hit and the Henry hit are comparable then you are an idiot. · Not a good look for Dickenson to miss challenging a play because he didn’t have his headset on. Someone needs to get the message to him. · First passing TD in 7 games… 7 games!.. in the CFL! · Did I mention that Solomon Means is useless? Great analysis! CD should have his headset on all the time OR perhaps someone at field level can tell him to challenge. Your major game changers upfront on D from last year are gone. No one's stepped up to make it happen. But it can be argued that Jones put players in spots to make a difference. May be same defensive schemes but not used the same. Less 3 man rushes & should have the personnel to do that with Michah Johnson on board. I'm hoping Micah Johnson isn't this year's Derek Dennis or Shawn Lemon who underdelivers in Regina before going back to his All-Star ways elsewhere. I expected more of a defence like Jones' buddy Lolley is rolling out in Edmonton. Offence was a big surprise but too early to know what that means with Fajardo. Argos on deck. I think it's safe to say this may be a must win. Home game, can't throw away 3 games on East opponents. Riders vs. Argos: Canada Day Home Opener Monday Morning Sentimonies: 40 Points?!? And We Lo... Riders vs. RedBlacks: Digging Deep Monday Morning Sentimonies: Well That Went Awful Riders vs. Hamilton: Season Opener Official Prophecies 2019 Monday Morning Sentimonies: Preseason and Roster T... Riders vs. Bombers: Preseason Game 2 Monday Morning Sentimonies: At Least We Weren't Sh...
cc/2020-05/en_middle_0097.json.gz/line1418288
__label__wiki
0.755585
0.755585
BREAST BADGES ROC BREAST BADGE (PRE-1941) The Observer Corps breast badge was issued pre-1941. ROC BREAST BADGE (1941) The ROC breast badge was issued from 1941 through to 1947. The first badges were issued to be used on overalls, however with the gradual introduction of the RAF style (No.2 Battledress) tunic ("Hairy Mary") the badge found its way onto that uniform. From 1941 the control of the Corps was transferred to the Royal Air Force and the influence of such may be seen on the badge with the use of the "bird of Prey rather than the standard ROC badge. ROC BREAST BADGE (1985/6) These badges were issued during mid-1980's. They were worn by post observers on standard issue green overalls for use within the underground monitoring posts. Badge location on Overall SHOULDER BADGES ROC SHOULDER BADGE These were located on the shoulder of each arm. The number represents the group to which the wearer belonged. '23' in this case relates to 23 Group - Durham. 'SEABORNE' SHOULDER BADGE ROC Seaborne shoulder flash, worn below the "Royal Observer Corps" shoulder flash and group numerals, on both sleeves BERET / CAP / LAPEL BADGES OBSERVER CORPS BERET / LAPEL BADGE This badge was issued to all Observers and was generally worn on their beret or as a lapel badge. Note the reference to 'Observer Corps'. The 'Royal' title was issued to the Corps by King George VI in 1941. These badges were usually made from sterling silver. ROC LAPEL BADGE (QUEENS CROWN) Following on from the beret / lapel badges from before the war, after 1941, the badges were changed to represent the 'Royal' significance of the Corps. This example shows a Queens Crown lapel badge which were issued after the Queens Coronation in 1953. Badges made pre-1968 were generally made of hallmarked sterling silver, however post-1968 badges were made from cast metal. ROC BERET BADGE (KINGS CROWN) Beret badges were developed to follow a similar RAF style. The badge represented the elizabethan firelighter with either kings crown or queens crown on the top. This example shows the kings crown version from 1941 to 1952. The difference between the two crowns may clearly be identified when the crown is compared to the image above. PROFICIENCY BADGES SPITFIRE AWARD BADGES Blue Spitfire Badge - Awarded after 1 Successful 'Master Pass' Red Spitfire Badge - Awarded after 5 Successful 'Master Passes' Gold Spitfire Badge - Awarded after 25 Successful 'Master Passes' The need for all observers to be able to clearly identify enemy as well as friendly aircraft formed the major roles of the ROC during its formative years through to its initial stand-down in 1991. As a result, aircraft recognition formed the basis of training of the Corps throughout this period. Initial recognition tests were undertaken during World War 2 and used to assess the overall level of competency of the Observers. This was undertaken using a set of silhouette cards of aircraft in which the Observers had to clearly identify correctly. Later tests were undertaken using photographic slides which were projected onto a screen using a "Flash Trainer" projector. The move towards nuclear fallout monitoring and public warning from 1955 led to such tests being modified to incorporate a mix of aircraft recognition (generally focusing on aircraft of the Warsaw Pact nations) and a series of questions relating to nuclear warning and monitoring. All observers were required to undergo such tests in order to maintain their knowledge and expertise to carry out their role, and depending upon the number of tests successfully completed determined whether they were issued with a Blue, Red or Gold coloured Spitfire badge which was to be worn on the sleeve of the Observer Corps uniform. To be successfully awarded the Blue Spitfire badge, the Observer was required to gain a single 'Master Pass' i.e. a score of 90% or above. After five successful 'master passes' of the test led to the award of a red spitfire badge and after a maximum 25 'master passes' led to gold spitfire badge. Subsequent successful 'master passes' resulted in the award of gold stars to a maximum of three followed by the Gold Spitfire. The following table lists the awards issued for successive successful passes of the Master Test. Number of Master Test Passes Description of Badge Pale Blue embroidered Spitfire badge Red embroidered Spitfire badge Red embroidered Spitfire badge plus one red embroidered star Red embroidered Spitfire badge plus two red embroidered stars Red embroidered Spitfire badge plus three red embroidered stars Gold embroidered Spitfire badge Gold embroidered Spitfire badge plus one gold embroidered star Guide to fitting - 1972 Pattern Uniform Location of badges on uniform Further information relating to Aircraft Recognition may be found on the Aircraft Recognition page.
cc/2020-05/en_middle_0097.json.gz/line1418291
__label__wiki
0.973439
0.973439
Home / Internationals / South Africa / Springboks sign former Stormers assistant Proudfoot Springboks sign former Stormers assistant Proudfoot By Rugby Week on 17th May 2016 Matt Proudfoot has joined the Springbok coaching staff Former Stormers Western Province and the Kobe Steelers assistant coach Matt Proudfoot has joined the Springbok coaching staff ahead of the June Internationals. Proudfoot has signed a four year contract with SA Rugby to be an additional assistant of Springbok coach, Allister Coetzee, after his Japanese club agreed to release him from his contract. The 44-year-old Proudfoot joins the current Springbok coaching staff, consisting of head coach Coetzee, Johann van Graan and Mzwandile Stick. His term with the Springboks starts immediately. Coetzee, who was last month appointed to succeed Heyneke Meyer as coach of the national rugby team, welcomed Proudfoot to the Springbok coaching staff. “I know Matt very well from our coaching stints together in Cape Town and Japan and has a lot of respect for his ability to build a powerful pack and his rugby philosophy,” said Coetzee. “I am confident that he will add a lot of value to our management staff and the coaches are looking forward to working with him.” Coetzee explained that Van Graan will be in charge of all team attack and lineout play, while Proudfoot’s responsibility will be the Springboks’ scrummaging, breakdown and all aspects related to contact areas. Pieter de Villiers will continue to be available as scrum consultant to the national team. Proudfoot is a former Bulls front ranker who featured in the first two seasons of Super 12 rugby (now Super Rugby), in 1996 and 1997, and also played four Tests for Scotland, between 1998 and 2003. He first caught the attention as a promising coach when the NWU-Pukke won the 2008 National Club Championships under his guidance. In 2009, he was recruited by current GM: Rugby at SA Rugby, Rassie Erasmus, to join the Stormers as a scrum consultant, following the appointment of Gary Gold to the Springbok coaching staff. He later joined Coetzee as assistant coach at the Stormers and Western Province respectively, where he was responsible for the forwards. Proudfoot said he was excited about the opportunity to join the Springboks: “The Springboks are at the beginning of a new era under the coaching guidance of Allister and I am very excited and very grateful for this opportunity. It is a huge honour to part of the Springbok coaching staff and I am looking forward this challenge. “I am very grateful to the Kobe Steelers for allowing me to join the Springboks. I enjoyed my time with them immensely and I want to wish them all of the best for the future,” said Proudfoot. Coetzee, Proudfoot and other members of the Springbok management staff are currently conducting a series of visits to the local Super Rugby teams in preparation for the announcement of the Springbok squad who will do duty against Ireland next month. The Springboks and Ireland will meet in the June International Series, which consists of three Tests, in Cape Town, Johannesburg and Port Elizabeth. Related ItemsSpringboksSouth AfricaRugbyJune ToursJune InternationalsSummer Internationals ← Previous Story Gatland names Wales squad to tour New Zealand Next Story → Lamont added to Scotland squad for June tour
cc/2020-05/en_middle_0097.json.gz/line1418296
__label__cc
0.704264
0.295736
About Study Options Student support systems and quality assurances Colleges in Australia Working on a student visa When do I apply? Home > Australia > Australian Capital Territory > Canberra Institute of Technology (CIT) > Samantha O Donoghue (Ireland) Samantha O Donoghue (Ireland) Advanced Diploma in Business "I was already living in Canberra when I decided to start studying and from my research I thought that CIT would be best suited to me and for my choice of study, especially because of the study paths that were available to me. "I found that the teachers at CIT are very supportive and always had time to answer any questions or to provide advice when needed. The teaching styles are interactive and engaging with open discussion as well as lots of group discussion, which I think is really important, it encourages everyone to contribute, share ideas and give their input. "The student support systems such as the student tutorials and the learning centres were extremely helpful throughout my studies and still are, it is a great service. "My first impressions of CIT were great. I found that the international students unit were very helpful and assisted me with all that I needed to begin my studies. They were my first point of contact. I then had my international orientation and was made feel very welcome and given all the information I needed. "I really enjoy my classes and the type of learning used in CIT. It is a happy atmosphere. My teachers are great; all they want for their students is success. "I love the fact that there is so many opportunities available to further my education, initially I had only planned to complete my certificate 3 and 4 in Business Administration but was encouraged by my teachers to complete my Diploma in Business Administration. "I am now working towards the Advanced Diploma in Business and am also considering doing a degree. It’s all about continuous improvement. I am very thankful to the teachers that encouraged me to do so as now I have great skills and a good education. "I enjoy my entire course. The content of each subject is going to allow for a smooth transition into the workforce, I can already see it. My classes are very interesting and believe it or not so are the assignments. "The different types of assignments are good, it’s not all tests it varies there is report writing, presentations and group work. I find this allows it to be a balanced workload and not get boring or overly stressful. "All that I learned and the skills I have gained will definitely help me for my future. During my Diploma of Business Administration, we were required to complete work experience. I was lucky enough to work in the Department of Defence for a whole week, this was an unforgettable experience. "I was absolutely amazed by how well I did in the office environment. The skills I had learned at CIT were relevant to the tasks I was given on a day-to-day basis. Being able to put everything that I had learned into practical use was so rewarding after all the hard work. It really enhanced my drive to continue studying and motivated me to do even better. "Canberra is a nice city. I like the calm and easygoing atmosphere here in Canberra, it works for me as a hectic city lifestyle doesn’t suit me. I have made some great friends and also met my partner in Canberra nearly two and half years ago, we are now engaged and I am very happy here. "My long term goals are to have a career in Business and I have no doubt that the education I am receiving at CIT will help me achieve my goal. I have come so far since I began studying at CIT, I can hardly believe how much I have matured and improved already. "I would tell other international students not to hesitate to study here at CIT, everyone is so welcoming, I absolutely love my course, my classmates and my teachers. The facilities are great, the teachers couldn’t be more friendly and supportive and the opportunities available to further your education are vast." Canberra Institute of Technology (CIT) Copyright © 2012 - 2020 Study Options Global
cc/2020-05/en_middle_0097.json.gz/line1418305
__label__wiki
0.698019
0.698019
Soundtrack review: Chicken run (John Powell and Harry Gregson Williams – 2000) “Chicken run” is an animated movie from 2000 which gained almost unanimous acclaim and this is rare for this kind of movie. I might even watch it seeing how everyone reacted to it. It’s another animation score written by John Powell in collaboration with Harry Gregson Williams, as they did for Shrek. This review is part of “John Powell month”. Animation scores for me are hit and miss, it depends on my mood and on how the composer manages to keep it interesting. First off I notice that the track length are grown up size: 20 cues for one hour. That means the theme have time to develop. I’m warming up to this one at the end of the main titles when a sort of jolly fanfare puts me in a really good mood. The circus fun continues with “The evil Mrs Tweedy”. This cue is enjoyable but I don’t know if I can make it through an hour of this. “Rats!” makes me think of the “Police academy march”. “We need a miracle” is the first romantic moment of “Chicken run”. It completely changes the mood of the score and it makes me think of the mandatory dramatic moments in romantic comedies, while the ending is downright Christmasy. “Rocky and the circus” starts with jazzy fun before returning to the sound this score established already. “Flight training” mixes it up again and the kid in me loves this tune. It’s light, fun melodic and it has a lovely rhythm. I think the kids will love this track. “A really big truck arrives” lasts for 6 minutes and it’s the longest piece of this score. It’s engaging and adventurous and makes me want to fly. For me all the right elements come together in this track and make for the most exciting few minutes form “Chicken run”. I was kind of lukewarm on the score until now but this cue makes it all worth while. With a piece like this and the variety of the music styles which becomes obvious in “Cocktails and flighty thoughts” or “Babs’ big beak” this score gets entertaining. It actually makes me want to see the movie even more because it sounds like a lot of fun. The big band inserts and the joyful motifs bring a sunny party feeling. “Up on the roof” gets serious and melancholic. This no longer sounds like an animation score but a drama one. There’s a trumpet which makes me think of the wake up call in army movies and I am very curious what scene this cue supports. With this track I got all I needed from this score and I am expecting it to end. But there are still 6 regular sized cues left and I feel it’s a little too much. They are still entertaining enough but they just recycle the motifs already played until now. This was my biggest problem with “Chicken run” I guess, the fact that it felt a little stretched. It didn’t need an hour of music. 40 minutes of variety and themes would have been enough. Still it was enjoyable and it’s worth a listen. Cue rating: Total minutes of excellence: Album excellence: Harry Gregson Williams Soundtrack review: Effie Gray (Paul Cantelon – 2015) Soundtrack review: Going clear (Will Bates – 2015)
cc/2020-05/en_middle_0097.json.gz/line1418314
__label__cc
0.525824
0.474176
2007 Annual Elections – RESULTS Home / 2007 / July / 25 / 2007 Annual Election... TSA Webmaster Posted: Wed Jul 25, 2007 3:57 pm Post subject: 2007 Annual Elections – RESULTS TO OUR MEMBERS, BENEFACTORS AND FRIENDS: The Spaatz Association’s 2007 elections have concluded by breaking of some new ground for our Association. This year saw an outstanding slate of candidates, any of whom would be a powerful addition to your leadership team. Unfortunately, only a finite number of vacancies existed — however — there is really no loser in a contest like this; our Association and its members have emerged the true winners! While your votes filled a number of positions, we have a four-way tie for one of our Board Seats which will necessitate an on-line run-off election — but more about that in a moment… Certificate of Proficiency (“COP”) Membership Initiative: In a precedent-setting move, the membership of The Spaatz Association voted a 74% approval to establish a new membership category — “COP Membership” — for our Association. This clears the way for former CAP Cadets who held the highest-level Certificate of Proficiency Award (“COP”) earned in the original Cadet Program (“pre-Spaatz”, etc.) to join our Association as a non-voting member. This is in recognition of the COP being the capstone Cadet Program award available in that iteration of the Cadet Program. We will quickly assemble an Action Team to formulate the authentication process by which COP Members can join TSA. These criteria will be established in consultation with CAP National Historians Col. Leonard Blascovich, CAP and Col. Louisa Morse, CAP (ret.). Outgoing Board Members: Before we announce the newest members of your leadership team I would like to recognize and appreciate some of the outgoing members of your Board of Directors. Bobbie Tourville (#940a) is leaving as our National Vice-President and this is the second time she served TSA in that capacity. She was the champion of our very successful “Eagle Flight Initiative”; a key fund raiser benefiting our scholarships program. We acknowledge her initiative and hard work in producing this program. Tim Cheslock (# 1173) is departing after a record-setting tenure as our National Treasurer. Under his sure hand and dedicated stewardship TSA saw both a careful conservation and a significant growth of our funds. Additionally, his initiative in moving our Federal tax preparations in-house saved our Association thousands of dollars in accounting fees. Tim’s partnership with Webmaster Matt Johnson (#901) also achieved our long-sought objective of bringing the convenience of on-line transactions via PayPal to TSA. Marla Patterson (# 101) is best remembered as our Founding President and has served faithfully as a Board member since the very inception of TSA. Her most recent contribution – one of many — was as Program Manager for 2007 Annual Dinner and Awards Event in Arlington, VA. This dynamic program set records for attendance, for the number of Aerospace Leadership Scholarships given and as a powerful fund-raiser for our scholarships program. Returning Board Members: Returning to our Board are three veteran directors, Mike Murphy (# 115), Bob Mattes (#445) and Austyn Granville, Jr. (#579). Mike Murphy has served the Association in a number of elective positions, including National Vice-President and National Secretary. We welcome the continuity and working knowledge he contributes to our Association. In addition to Director, Bob Mattes also serves as TSA’s Scholarships Coordinator. Under his watchful eye and focused stewardship our Aerospace Leadership Scholarships (ALS) program is the long-pole of our efforts as a premier benevolent association. For a decade now, and thanks to his leadership, over $50,000 has been disbursed to outstanding CAP Cadets as our ALS makes their dreams take flight! Austyn Granville, Jr. was recently Commander of New York Wing and member of CAP’s National Board. He has been a long-standing member of TSA’s Board of Directors, lending useful insights in driving our successful relationship with CAP’s National Board and other key leaders. A New Officer Assignment and A New Board Member: Moving into a new position of leadership is Alternate Director Bruce Krell (# 44), who will don the mantle of TSA’s National Treasurer. Bruce holds several advanced degrees, is a published author, recognized expert in IT and consultant to the Defense Department and major corporations. His extensive experience in the arena of business, large and small, will easily move our financial affairs to the next level. Also, he most recently led TSA’s Action Team that produced our corporate position on CAP Cadet Program Milestone awards; notably the “Eaker Award”. I would also like to welcome the newest member to our Board of Directors, C/Col. Susanna Marking (# 1614). One organizational vision is to actively involve CAP Cadets in the leadership of our Association. Perhaps one day all positions will be held and all affairs will be administered by active CAP Cadets! Susanna has served in numerous leadership positions in the Cadet Program and is now a Regional delegate to the National Cadet Advisory Council! C/Col Marking has already stepped-up to make an impact in TSA by volunteering for a leadership role in the execution of our 2008 Dinner and Awards event! This note would not be complete without appreciation for our outstanding Elections Team. Once again they have delivered an on-line election process that set a new level of inclusiveness and integrity. I want to thank WebMaster Matt Johnson (#901), By-Laws Committee Chair Tom Hurley (# 305) and By-laws Committee Member and former National Legal Officer David Simmons (# 447) for their focused and expert support. A Run-Off… What remains now is to resolve a four-way tie to fill a remaining vacancy on our Board. The four run-off candidates will be invited to post updated position statements on our website and our “Voting Booth” poll will soon open for a special election. Members who have already registered to vote do not need to re-register. When the polls open on 1 August, simply logon and vote; one vote for one candidate. The timetable of key events is below. 31 July — candidates updated position statements due (optional) 1 August — polls open for run-off election 15 August — polls close 22 August — Elections Team certifies elections 25 August – results are publicized 1 September — new Board of Directors is seated I am excited by the prospects for our Association that this outstanding group of leaders portends. Each will be challenged to take an active role in outreach to our members and in developing high-impact programs and events for you. Feel free to contact any of us via The Spaatz Association Website with your ideas, thoughts and suggestions on how we can continue our journey on the goal of growing as a premier fraternal and benevolent association. Thank you, as always, for your friendship and support! Stephen Austen, # 161 About the author: TSA Webmaster The Question Mark Welcome to The Question Mark, the online and print newsletter of The Spaatz Association. This newsletter is updated online 2-4 times each month (as time allows) and published in a condensed, print form on a quarterly basis. We want to hear from you! Submit your Spaatz story, a picture, or Letter to the Editor on our Submissions page. All Items are subject to editing for style, clarity, accuracy, length, and propriety. Receipt of items will not be acknowledged. For other questions , see our contact us page. About The Question Mark Publisher's Information Flight of the Question Mark
cc/2020-05/en_middle_0097.json.gz/line1418316
__label__cc
0.687116
0.312884
Space Politics Because sometimes the most important orbit is the Beltway… « Reacting to China’s space white paper The other December 2012 countdown » Campaign '12 A review of the candidates’ space positions (or lack thereof) By Jeff Foust on 2012 January 3 at 7:05 pm ET While you’re awaiting the results of tonight’s Iowa caucuses (or even if you’re just watching the Sugar Bowl), you can catch up on the positions of the Republican presidential candidates on space in this article published today in The Space Review. It largely recaps what has been posted here over the last few months, with a little bit of additional material: for example, I looked into the voting records of some of the candidates who are or have been in Congress in lieu of position statements from the various campaigns (none responded to a brief questionnaire I sent to them last month.) We may hear more from some of the candidates—at least those who survive the initial rounds of Iowa and New Hampshire—on space issues when they start spending more time in Florida, whose primary is at the end of this month. 106 comments to A review of the candidates’ space positions (or lack thereof) Marcel F. Williams In an extremely important swing State like Florida where sometimes only a few thousand, or even a few hundred, votes can determine who the next President will be, you’d think the candidates would be more focused on a Federal program that is so important to the Florida economy as NASA is. But, I guess, if politicians were truly geniuses then the country wouldn’t be in the trouble that its in right now:-) Matt Wiser January 3, 2012 at 10:44 pm · Reply Interesting piece. One does expect Space to come up as an issue at the Florida GOP debate in two weeks. Want to win Florida in either the primary or the General Election? You need the I-4 Corridor (Tampa-Orlando-Daytona Beach). Lots of folks in that area work on the Space Coast, or for contractors inland (Orlando, say). Want them to vote for you? Then you’d best come out in favor of the Space Program. Stephen C. Smith January 4, 2012 at 8:41 am · Reply Living here in the Space Coast, I expect the candidates to spend a few days blowing through here reciting talking points written by the Brevard County GOP without having a clue what they’re talking about. Then they’ll move on and we’ll never hear from them again. No doubt they’ll be advocating a return to the government monopoly over access to space, hoping to win over the few votes of the hard-liners who work (or worked) at KSC. The lone exception will be Newt Gingrich — if he’s even still in the race by the time the roadshow arrives in Florida. His anti-NASA rhetoric will cost him here. Philosophically, this area is Tea Party Central and is probably more likely to go for Ron Paul. But let’s not think that anyone outside Brevard County gives a hoot about NASA or the space program in general. Those who have space-related jobs don’t live in Orlando or Tampa or Daytona Beach, for the most part. They’re in north Brevard County — mostly Titusville, north Merritt Island, the city of Cape Canaveral and Cocoa Beach. No candidate is going to stump statewide in Florida on space simply because it’s not a significant issue anywhere outside of these few towns. An article in the latest issue of Space Coast Business detailed how commercial space is leading to a diversification of the local economy, which is surging ahead of the statewide average. Commercial space is the future, and it’s the winner for Brevard County. If the GOP candidates blow through here advocating a return to a failed past, well, anyone who votes for failure will get what they deserve. Robert G. Oler January 4, 2012 at 11:00 am · Reply Matt Wiser wrote @ January 3rd, 2012 at 10:44 pm ” Want them to vote for you? Then you’d best come out in favor of the Space Program.” all you are suggesting is pander politics (“support the space program”…what space program?) and in any event you dont understand what happened in Iowa. The GOP has now nicely fractured along three basic lines…the older more successful folks (Willard), the bible banger wing (Ricky) and then what is left of the true conservatives…The Ron Paul wing. Neither of those groups have as any pressing matter “the space program” (whatever you define that as) and it is unlikely that any of those people or at least a significant part of them will have “the space program” as an overriding concern in terms of votes unless it is a pure pocket book pander vote… Sadly other then the perfunctory photo op with Newt imploding (or exploding as the case may be) it is unlikely that there will be any serious debate on the space effort from the GOP hopefulls. The last act to be played out is 1) how Newt bows out (it will be messy as is Newts style) and 2) what chance any of this gives Huntsman to maybe get some traction. The interesting thing about all three groups now of the GOP is that few if any of them will vote for someone in the other group. Commercial space is going to be the big hit in 12. The SLS crowd is to quote Dick Cheney “a bunch of dead enders” LOL RGO @ Robert G. Oler wrote @ January 4th, 2012 at 11:00 am I told you that Newt would go nowhere. And I don’t think he has the cash to move forward for much longer. He may be an interesting voice to keep around though. At least for the fun of it. Huntsman? Who is that? Anyway… I am surprised at the surge by Santorum though and I think it is just a reflection that the GOP does not know where to go. He may stay there for a while but he’ll fade. The most consistent so far are Romney and Paul. I suspect that Paul has the public support even more so than Romney and if he manages an Obama-like campaign he might even sustain his position. Romney has the power of money and he’ll be always near the top just because of that. And most likely the support of old fashion GOP lobbyists. But he’ll lose 2012. Bachman… Here goes the Cain way… Now as far as Florida and Space Program go I am with you. Those who think that the “space program”, whatever that means, is of any importance even in Florida are delusional. But then again they support SLS/MPCV. Coastal Ron There is a chance, a slim chance, that Romney will somehow tie his latest push for manufacturing to something space related when he visits the space coast. However, as Stephen C. Smith points out, that may just as likely be commercial aerospace as a government one – Romney fancies himself a “government is not the solution” type of guy, so you fill in the blanks. For Paul, he would defund NASA along with everything else that isn’t specifically called out in the Constitution. Santorum could be the only currently strong candidate that would argue for a strong government space program, and I say that only because he seems to be a strong military type (bomb Iran, etc.), and using our space program as one of the tools of “containing China” wouldn’t be surprising to hear from him. I doubt we’ll hear any specific details that will make “Moon First” or Mars First” types swoon. Just generic “we need a stronger space program”, and “I’ll do better than Obama”, which isn’t detailed enough to hang a hat on. common sense wrote @ January 4th, 2012 at 11:14 am Newt is the orginator of the politics of personal destruction and it was going to be hard for Newt to avoid the now dejure effort at GOP politics which is the politics of personal destruction. It will be entertaining to see if he (Newt) can or will do a similar thing to Willard as he (Newt) “goes down”. The GOP primary race is about to enter the Wagner stage where they all use the GOP weapons so nicely honed against Democrats and particularly Obama against themselves. Santorums speech last night was first rate. It was not only good politics but it was splendid attack. Rick was babbling on about his grandfather…which is a clear contrast to Willards, whose father left the US when the pologomy laws shut that down in Utah…and then Willards grandfather came back, from Mexico to restart life in Utah. It nicely brings in the “morman” thing which is anathema to the right wing evangelicals. Newt and Willard are competing for the same votes…and NH might turn into a bash Willard party… What this all means for space politics and policy is that 1) it is unlikely that any GOP candidate will now make as a centerpiece “a return to Apollo”…and 2) the one guy who had a clue as to how to make space a place like aviation or anything else…is likely going to go down in flames. It is hard right now to predict the GOP nominee…there is a path now where the GOP cycle that started in the 80’s closes with a pretty massive defeat of a right wing evangelical who then allows the party to restart…or well like I said its hard to predict. Except the constant…there will not be any massive call for SLS…that program is a dead person walking. RGO vulture4 Romney will Speak in Brevard County and, as he normally does, blame everything bad, particularly the job losses, on Obama and “European Socialism”. Romney will be sure to say that Obama spoke at KSC and that he “broke his promises”. The Brevard Tea Party will eat it up. Never mind that Obama promised he would support the “space program”, not “Constellation”, and that his $850M request for Commercial Crew was crushed by Republicans in Congress, delaying the return of US human spaceflight by years. There is a ridiculous vanity that just because you happen to be interested in space, that its going to be the issue that decides the election and that the candidates will go nowhere unless they appease your marginal interest. There is the belief that space fans somehow have politicians by the balls over an issue like space. Its out of touch with reality to say the least. Space is not going to be even in the top ten issues that decide the election. Actually, its more likely to be a liability. Saying we’re going to the Moon and Mars in a time when people can’t make ends meet is going to be shot down as irresponsible government waste. People will think you are a lunatic. More down to earth issues are going to be the focus of the campaigns. Better keep quiet about it and say some meaningless vague talking points in favor of “leadership”, “security” and “inspiration” than making firm commitments to colonies or proposing a budget for it. Those that think NASA will favor better under the republicans in these times are in for a lesson from the school of hard knocks. People have been waiting for getting the “right” politicians to fulfill their space fantasies for 40 years and so far that hasn’t worked out. There is no reason to believe that is going to change in the future either. Politicians only have so much room to manouevre on space issues. NASA’s budget going significantly up is not likely in the near term. The solution will have to be policies that allow it to do the most things with the budget it has. amightywind It is hard right now to predict the GOP nominee… It was hard yesterday. It is a lot easier now. It’s the Mitt and Santorum show now. Either GOP nominee can be expected to pick the low hanging fruit of the disaster that the Obama presidency has been to the Space Coast. If Obama hands you a cudgel, why not use it on him? And yes, that means pandering to the legions of unemployed NASA workers. Romney will be under pressure to walk the walk as a conservative, and that means a traditional NASA policy. Rand Simberg I asked some space policy questions of Mitt Romney the other day. I’m not holding my breath waiting for answers. Newt is the orginator of the politics of personal destruction and it was going to be hard for Newt to avoid the now dejure effort at GOP politics which is the politics of personal destruction. What stupid nonsense. It’s the Mitt and Santorum show now. And Huntsman, and Gingrich, and Perry, and Paul. No delegates have even been selected yet. AMW, That’s too funny for words. I will agree, it would be “conservative” in the sense that it keeps NASA doing things as it always has done, but it doesn’t fit in with the pro-market rhetoric of the Republicans. Politicians are trying to conserve something, but its a model more akin to Soviet era design bureaus. Which is fine if you support that model, but at very least be consistent. Supporting that NASA model whilst screaming at the top of your lungs about how Obama is an evil “SOCIALIST!!!” does fill one with a sense incredulity. That’s like the example a person uses to explain to a small child what ‘hypocrisy’ is. You couldn’t make this stuff up!! DCSCA U.S. space policy has always been essentially reactive, not proactive. And there’s little evidence this ‘ fits ‘n’ starts’ mind set of the American character has changed. Beyond the basic needs of defense, communications and land/weather observations, space operations, particularly the luxury of HSF, will remain a low priority until events beyond the shores stir competitive juices. Like the PRC initiating manned missions back to the moon. But even that may produce little more than a yawn from Americans (as recent news reports noted) and the cry of ‘been there, done that’ half-a-century earlier. More’s the pity. For that kind of reaction is reminiscent of past powers in decline reacting to fresh initiatives by assertive nations moving center stage in the world- as when the British century yielded to the American century. A saving grace may be the ‘excitement of the new’ and ‘the thrill of just beginning’ for young engineers, scientists, technicians and politicians. Something Goddard, Von Braun and Korolev knew very well. @Rand Simberg wrote @ January 4th, 2012 at 1:20 pm “Newt is the orginator of the politics of personal destruction and it was going to be hard for Newt to avoid the now dejure effort at GOP politics which is the politics of personal destruction.” “What stupid nonsense.” In fact, Newt, along with crony Bob Walker, are among the most nonsensical political dinosaurs around. Yes the ever petulant Gingrich and his pals are famous for that kind of stupid nonsense. Their brand of failed, ultra-conservative politics, clinging to the discredited and defunct policies of Reagan, who was last on a ballot over 27 years ago, make for good copy for print media and entertaining TV for cable news shows but more importantly, present a glaring reminder to Americans of the damaging legacy of their politics of destruction. Romney’s wave-of-the-hand, churlishly dismissive comments about Gingrich’s space musings reveals Mitt’s mind set on real world space policy. Besides, as a Mormon, he expects to get his own planet one day, anyway, on faith. NASA Fan What is going to make the biggest difference in the future fortunes of NASA has nothing to do with who is President. NASA needs to build the stuff it’s building ON TIME and ON BUDGET. Then the swirl of dysfunctional organizations surrounding them may, MAY, take notice and reward good behavior. Who is president will make no difference what so ever. Never does. Ben Joshua There are a lot of great things happening at NASA right now despite the budget, policy and bureaucratic doldrums. However, the unique political circumstance that led to Mercury, Gemini and Apollo disappeared (forever) and left behind a design bias sans funding and purpose. Call it Apollo Entropy. SLS shows us how long it is taking to play out. Run of the mill politicians shy away from the current transition, knowing any strong stance on space policy will lose more votes than it gains. Politicians in the know (count ‘em on one hand?) see a very different model for spaceflight emerging, and are biding their time, knowing a premature stance makes them look fringy. Should CCDev edge successfully to maturity, more than a few people in both parties will think. “Hey, where did THAT come from?” Then they will place finger in the wind and decide whether or not to rally to the new space patriotism, and fork over a few more meager bucks for a happening approach. NASA Fan wrote @ January 4th, 2012 at 4:47 pm “NASA needs to build the stuff it’s building ON TIME and ON BUDGET.” That is important, but only half of it. What it builds needs to be of use, otherwise all that effort to build it on-time and on-budget will have been for naught. For instance, do we really need to build the SLS right now? There are no payloads or missions for it, so it would appear to be either A) not needed at all (i.e. NASA will never really use it, or be able to afford to use it), or B) not needed right now (i.e we’re building way before we need it). People have speculated that some day we’ll need the ability to put 10m diameter and/or 100MT+ payloads into space, but we’re not close to needing that right now. I hope we get there someday, since that will mean that we have lots of activity going on in space, but again, no one, including NASA, can afford that level of activity today or in the near future. As of today, what is more important – NASA’s ability to get crew & cargo to LEO, or the need to put 130mt payloads into space? One addresses an immediate and widely recognized need, the other doesn’t. So yes, building things on-time and on-budget is important, but building the right products/solutions is even more important. @ NASA Fan wrote @ January 4th, 2012 at 4:47 pm It is not the problem. The problem is Congress mingling in NASA affairs telling NASA what and when to build for an arbitrary amount. It does not matter they are on budget, on time. We just saw that after Constellation was terminated, our dear Congress revived it so that we now have a zombie program. If Congress was serious about this they would tell NASA: VSE is the law. Here is the money you need/ask, go do it. But Congress does not. NASA does not want SLS and probably not MPCV. NASA wants real money for commercial crew. And, so far, COTS and CCDev are delivering far more than Constellation ever did and more than SLS/MPCV ever will. A successful CCDev will terminate SLS/MPCV. Yes even for exploration beyond LEO. Just watch. “Who is president will make no difference what so ever.” Agreed. See above. Probably of more space policy import than who will lose to Obma…. http://spaceflightnow.com/atlas/av019/120103rescue.html If it does turn out that you can take the slow boat to GEO from LEO using electric propulsion and not get fried in the Van Allen belt (for unmanned missions)….. That could change things quite a bit. Even for manned missions – set off from LEO unmanned. The spam can join later via can (aka capsule), after the belt has been passed through. Doug Lassiter If space is going to be even a minor factor in the upcoming election, it seems plausible that to the extent Obama has lost support from the Space Coast for his decisions about Constellation, he has gained support from the rest of the country for those same decisions. That is, should it become a campaign issue, he can credibly spin his decisions as ones of fiscal responsibility to the taxpayer. Same with his encouragement of commercial spaceflight. Obama’s NASA budget has been increasing, not decreasing, and most of that money is for jobs. Just not necessarily jobs on the eastern coast of central Florida. That being the case, the number of space jobs has actually increased, outside of a small circle around Cocoa Beach. It’s amusing that “space jobs” are often defined as being held by people who have sand between their toes and palm trees over their heads. In this respect, there are many places other than Florida that space could easily enter into campaign discourse. In fact, I would take more seriously pronouncements about space from candidates who aren’t in Florida (or maybe Houston and Huntsville) when they make them. Those pronouncements would speak to why space is good for the country, and not just why it’s good for Florida. Rand Simberg wrote @ January 4th, 2012 at 1:20 pm I asked some space policy questions of Mitt Romney the other day. I’m not holding my breath waiting for answers.>> good thing…aside from the fact that Willard has no real incentive to talk about “space”, the way you pose the questions is slanted as if you have a candidate and you are trying for a gotcha. You have done better. Its weak RGO Prez Cannady @Lassiter: For instance, do we really need to build the SLS right now? There are no payloads or missions for it… Well, that’s not true. @ Prez Cannady wrote @ January 5th, 2012 at 12:49 am There is no payload. There is no funded payload. Powerpoints do not make budgets. Prez Cannady wrote @ January 5th, 2012 at 12:49 am That wasn’t me, but I feel the same way. Even if they were affordable, the missions you point to are either serviceable in other ways, without an SLS, or are close to one-shot deals. How many SLS-scale large space telescopes do you really think that SMD can afford in the next three or four decades? In fact, in-space construction is a more sensible and extensible approach to achievement of such a telescope. Well, that’s not true.>> sure it is…all those are are viewgraphs. SLS/Cx whatever has had those for a long time. There are no funded payloads. Until Congress and the President allocate money, it is true. Right now there are preliminary plans, wishes, and dreams. But no funding streams. The point that Doug Lassiter makes about affordability is a good one. Take all of the ideas that are being proposed, stack them up into payload missions that use an SLS once or twice per year for a couple of decades, and how much will that cost? Far more than any Republican Presidential candidate would propose without some sort of boogeyman threat, and I don’t think China is a big enough threat in space to merit that much spending. The SLS is a public works project that is too expensive to use after it’s finished, and leaves no lasting infrastructure after all the money has been spent. @ Coastal Ron wrote @ January 5th, 2012 at 10:46 am “I don’t think China is a big enough threat in space to merit that much spending.” Threat in what way? If we are talking national security then the DoD is taking care of it, not NASA. An economical threat? I am sure you know we owe them already and quite a bit I might add. He3? I think that unless they have the technology to use it we are safe for a little while. But as far as I remember for us to ensure delivery of oil to our shores we use the military, don’t we? Why would it be any different for He3 – even if I believe this scenario to be outrageous? A threat for prestige? A threat to our fertile virility? What threat is China that would require NASA to take care of it? And not say the DoD? I don’t think you are one of those advocating those absurd notions but you brought it up… MrEarl You guys keep blathering on, pushing your ideas about how NASA should be doing space exploration. All have merits and may or may not be better than using an HLV. That is no longer the point. This fact remains; Congress has supported the building of an HLV (Aries V and SLS) for the past 8 years. They have been presented with various versions of all of the ideas you espouse and still comeback to support HLV and MPCV. Call it pork, stupidity, ignorance or whatever; the course has been set. This fight only leads to more time and money wasted. The job now is to: 1: Develop and implement the SLS and MPCV as cheaply and quickly as possible. From what I’m been reading it seems that NASA has finally learned that lesson. 2: Design missions that best leverage the existing LV’s (Delta, Atlas, Falcon and others) and the SLS to get the greatest bang for the buck. NASA is in the process of doing that and we should begin to see the fruits of that in mission plans being proposed in the next 6 months. 3: Bring in more commercial participation in HSF as they prove their abilities. COT’s and CCDev are areas this is starting, another may be fuel depot construction and supply. 4: Partner with Europe and Japan for the design and construction of habitat modules, landers and other ancillary equipment that could be launched on the SLS. As much as anything else, it’s the backstabbing and undermining that has caused the US HSF program to be stuck in LEO for the past 40 years and it’s time for it to stop so we can move ahead. Vladislaw Looking at the James Webb and it’s blown schedule and budget can you imagine the cost of a 130 ton telescope? The 130 ton launcher will not be around until 2030, that’s only 18 years away, if they want a big telescope they better start on it and get the funding in place. I can have a view graph with 1000 ton lander but it doesn’t take out of the realm of wishful thinking. There is no money authorized for the development of any payloads bar Orion itself. Congress doesn’t seem to actually care that there will be nothing to launch if SLS is finished in 10 years time. @ MrEarl wrote @ January 5th, 2012 at 12:49 pm “You guys keep blathering on, pushing your ideas about how NASA should be doing space exploration. ” Hmmm. What did you just do? Who’s to say you own the process of what needs to be done “now”? Tss tss tss. Coastal Ron wrote @ January 5th, 2012 at 10:46 am None. But that hasn’t stopped many people who post here and other places from insisting that we need NASA to somehow “respond” in some national security way. However this being an election year, and some on the Republican side thinking that chest thumping is the way to the White House, it wouldn’t surprise me if this line of thinking came up at some point, especially when the candidates stump somewhere near KSC. I’m entitled to be as arrogant and opinionated as anyone else who posts here. I’ll entertain any idea YOU may have of how the SLS can be used to further our exploration of space, besides consigning it to the dustbin of history. Other than that, We are not amused. lol MrEarl wrote @ January 5th, 2012 at 12:49 pm For those of us that see the SLS as a waste, fighting to cancel it is our way of saving NASA literally $Billions in the future. The SLS, just like the Shuttle, will eat up a set amount of NASA’s budget no matter how little it flies, and that will be a yearly waste that will hold back NASA from leaving LEO. As to your list: “1: Develop and implement the SLS and MPCV as cheaply and quickly as possible.” It is ironic that Administrator Bolden, by getting NASA to stick to budgets, is giving the SLS the best chance it has to survive. That will only last until it gets built, and then the lack of payloads and missions will doom it anyways. “2: Design missions that best leverage the existing LV’s (Delta, Atlas, Falcon and others) and the SLS to get the greatest bang for the buck.” All NASA missions currently use existing launch vehicles, and all proposed mission hardware can fit on existing and near-term commercial launchers. So why do we need the SLS? “3: Bring in more commercial participation in HSF as they prove their abilities.” Yes, we need Boeing and Orbital Sciences to prove that they can build spacecraft and launch rockets before NASA decides to depend on them… This is the funniest bit of backwards logic that has be proffered as of late. Who do you think builds, and for the most part operates, all of NASA’s hardware in space? The commercial aerospace industry. Maybe what you’re saying is code for “SpaceX”? The solution to making sure that commercial companies can do what NASA wants them to do is to have competition. The COTS and CCDev programs are doing far more with far less money than any cost-plus program, so why stop at just cargo and LEO crew? Keep using the same process to develop whatever is next on NASA’s agenda – why not? No President before Bush 43 was interested in leaving LEO, so let’s not forget that. And with the Shuttle consuming NASA’s time and money, we couldn’t afford to go anywhere without a big increase in NASA’s budget – that didn’t happen. Much as I’d like to send people off exploring beyond LEO, we don’t have the infrastructure in place to support it yet, and that’s what we need to work on (and no, the SLS doesn’t address that). That and getting the politicians and public interested in going beyond LEO, since none of them really care to right now. @ Coastal Ron wrote @ January 5th, 2012 at 1:50 pm “But that hasn’t stopped many people who post here and other places from insisting that we need NASA to somehow “respond” in some national security way.” I do know what you mean but I think it’d be better to stop the chest thumping nonsense to focus on real economic issues with/within NASA. I don’t think it is worth entertaining those antagonistic notions that make no sense whatsoever. In addition the US public today is much more informed (Internet) than in the 60s and they can easily see that China is not a threat to which NASA can have any worthwhile response. Except for a few here and there… @ MrEarl wrote @ January 5th, 2012 at 1:52 pm Hey! I am not arrogant, just common sense. You must mistake me with someone else. “any idea YOU may have of how the SLS can be used to further our exploration of space” Here is a great idea, not arrogant, just plain common sense: Dump SLS/MPCV and use the cash instead to do something worthwhile. For example, finish CCDev with proper funding and give the rest to firms who can actually go to the Moon and beyond for a fraction of this yet-another-failure to be. The 130 ton launcher will not be around until 2030, that’s only 18 years away For comparison we have COTS which has been underway for 6 long, expensive years. They’ve only blown their original schedule by 3 years, and have still launched nothing to a pointless destination. But who’s counting? It would be nice if there was money to do things with the SLS, or even a mandate to do them…… Oh Ron and CS, where to begin……. “No President before Bush 43 was interested in leaving LEO” Not true, there was Bush 41. CS “Here is a great idea, not arrogant, just plain common sense: Dump SLS/MPCV and use the cash instead to do something worthwhile. For example, …” Ron “For those of us that see the SLS as a waste, fighting to cancel it is our way of saving NASA literally $Billions in the future.” Both of you fall into the trap of believing that money not spent on SLS will be used for your pet projects. Not bloody likely. I think the past two budgets show that congress is hell bent on developing an HLV. The Obama administration tried killing it outright in the FY 2011 budget but it was resurrected as SLS. Then they tried to starve it in the FY 2012 budget but congress cut CCDev way back to give SLS the funding it needed. Fighting it hasn’t worked and just depletes the programs that you want the needed cash. It should be clear to most people paying attention that an HLV is going to be built and that any effort to derail it will just make it more expensive and extend the time to build it. Ron “All NASA missions currently use existing launch vehicles, and all proposed mission hardware can fit on existing and near-term commercial launchers”. Doesn’t make sense to seriously design for what is not available yet. There are plans out there for payloads that will need an HLV but they remain Power Point slides until the SLS project is further along. Ron “Yes, we need Boeing and Orbital Sciences to prove that they can build spacecraft and launch rockets before NASA decides to depend on them… ”. CS “For example, finish CCDev with proper funding and give the rest to firms who can actually go to the Moon and beyond for a fraction of this yet-another-failure to be.” Since we’re talking about human space flight, yes Boeing, Orbital and the rest need to show that they can design, build, launch and handle operations for human space flight. Some are further along than others but no company is there yet. As for the moon, since not one of these companies have even proven itself in LEO operations, it’s safe to say that none of them “can actually go to the Moon and beyond for a fraction of this yet-another-failure to be.” While I believe that commercial entities like Boeing, SpaceX and the rest could maybe someday go to the moon more economically than NASA, it’s only the development of large scientific and exploration stations on the moon and the EML 1 and 2, made possible by an HLV and MPCV, that makes it economical for them to do so. But the real point here is this; Congress has shown that building an HLV and MPCV is the only way they will fund HSF post shuttle. Why continue to tilt at windmills rather than try to make the best of what is coming to pass? Michael from Iowa @amighty Santorum’s victory is going to be short-lived. He only managed to carry the same counties as Huckabee did in ’08, and by a much smaller margin. He’s not polling well in the next couple contests and odds are he’ll drop out before Super Tuesday in March. That leaves Romney – who will just side with whatever the popular opinion of the moment is. Gingrich – who wants to “restructure” the space program (substantial cuts) and Paul – whose advocated shutting down NASA since the 1980s Or, alternatively, there’s Obama. There is money to do things with SLS. Partnering with Europe and Japan will leverage their funding and expertise with our own, as for a mandate, Congress has supported a return to the moon using an HLV and Orion/MPCV for 8 years now. In the ADD world of American politics that’s as good as it gets mandate wise. @MrEarl wrote @ January 5th, 2012 at 3:34 pm “Both of you fall into the trap of believing that money not spent on SLS will be used for your pet projects. Not bloody likely.” Believe me. I know very well what you are saying. I was only day-dreaming. Arrogantly. That’s all. “I think the past two budgets show that congress is hell bent on developing an HLV.” No. Congress is hell bent on preserving jobs. They did not provide enough money beyond that. “The Obama administration tried killing it outright in the FY 2011 budget but it was resurrected as SLS. Then they tried to starve it in the FY 2012 budget but congress cut CCDev way back to give SLS the funding it needed.” Are you enjoying yourself now? Spraying salt into the wound. How un-nice of you! “Fighting it hasn’t worked and just depletes the programs that you want the needed cash.” Maybe, maybe not. Too early to tell. No it won’t. Just watch. At least not the SLS. This is extremely poor management and one of the reason those projects are doomed to failure. “Since we’re talking about human space flight, yes Boeing, Orbital and the rest need to show that they can design, build, launch and handle operations for human space flight.” Are you sure? Who designed and built Shuttle? Apollo? EELVs? “Some are further along than others but no company is there yet.” Just a matter of cash and personnel. “As for the moon, since not one of these companies have even proven itself in LEO operations, it’s safe to say that none of them “can actually go to the Moon and beyond for a fraction of this yet-another-failure to be.” Oh yes we can. “While I believe that commercial entities like Boeing, SpaceX and the rest could maybe someday go to the moon more economically than NASA” Orion is being built by Lockheed Martin and SLS by ATK, possibly Boeing. Why do you trust them more? Or less? “Congress has shown that building an HLV and MPCV is the only way they will fund HSF post shuttle. Why continue to tilt at windmills rather than try to make the best of what is coming to pass?” Because it is not true. They are also funding CCDev. Politics are more devious than you (seem to) think. I hope they enjoy lithobreaking… Michael from Iowa wrote @ January 5th, 2012 at 3:35 pm Santorum’s victory is going to be short-lived. >> It all depends. I’ve looked at the county by county in Iowa as well and Santorums victory is far more impressive then Willards. but in any event what happens the next two or three weeks will determine a lot in the GOP. There is no certainty right now in any of the folks who are viable still, getting the nomination. The “money” should be on Willard. Since 1964 the GOP has always nominated someone who either ran for President before or who was the sitting President…and the GOP “elite” are rallying around Willard… However, something is breaking out there in my view and Ricky’s victory in Iowa cannot be understated. The “nuts” (OK my word for the right wing base) of the party are pretty tired of getting lip service time after time and then the nominee is someone who they really dont care for. Bush 43 kind of had them going for a bit, but he really did not pay them back on all the social issues that they care a lot about. Ricky’s campaign is all about that group of the party. If they coalesce around him (a big if) then he is viable AND what is impressive about the Iowa entrance polls is that they more or less SEEMED to. The social “right wing” are ready to beat Obama with anyone except they dont like either Morman, dont want a woman to get the nood, the guy who is the poster child for adultery is out and Rick Perry is just to dumb. That leaves Ricky who I think is a whackjob but who honestly believes the stuff he pushes. Ricky could be this centuries (or at least the first half of it) AuH2O…ie the guy who came from nowhere oriented a group toward him and then rode into oblivion. Ricky is the one person who is viable…who Obama will simply cream . None of this will matter for space politics…other then Newt, who is toast none of them care about Space. MrEarl wrote @ January 5th, 2012 at 3:34 pm “Both of you fall into the trap of believing that money not spent on SLS will be used for your pet projects.” Actually I haven’t stated where I would allocate the SLS/MPCV money, so apparently I did not “fall into the trap”. However my preference would be for NASA to be charged with partnering with U.S. industry to put in place the space infrastructure we’ll need to start exploring beyond LEO. What that means is that NASA would not build and operate the infrastructure, but would contract for services for the majority of it. NASA will likely always have a need for bleeding-edge exploration hardware, but they have no need to be in the routine transportation business. “Doesn’t make sense to seriously design for what is not available yet.” Apparently you haven’t looked at the plans. They do include the SLS (and previously the Ares V), but they also show that commercial launchers can do the same job, just with more launches. The question remains – what do we need the SLS for? Having worked in manufacturing for most of my career, I don’t share your lack of faith in U.S. aerospace. There is nothing magical about traveling to/from space, and there is nothing extremely hard. What has been missing is a commercial market demand for commercial vehicles, since NASA had the Shuttle to rely upon. Now that the Shuttle is gone, and NASA is finally publishing standards for commercial companies to use if they want NASA business, U.S. industry will be able to develop vehicles that meet the newly released specs and are safer to fly on than NASA’s Shuttle. Again, the solution to both of our concerns is for NASA to use the same process it has been using for COTS and CCDev. Companies that fail to perform are replaced without much lost, and NASA has insight into what’s going on so it can address issues immediately. That combined with the companies putting up part of the money for the program creates a competitive and cost effective way for NASA to get what it wants. “Congress has shown that building an HLV and MPCV is the only way they will fund HSF post shuttle.” Not quite. Don’t forget that Congress has stated that commercial providers are the primary method of transport to the ISS, and the MPCV is only a backup, so this is really a matter of priority and methods. Does Congress want to keep using Russia for access to the ISS? Once that becomes an issue, which could happen during the Presidential election cycle, then CCDev will regain full funding. “Why continue to tilt at windmills rather than try to make the best of what is coming to pass?” Because I believe there is still time to “right the ship” regarding the funding priorities Congress has set, and I see no possible future where the SLS will be considered an asset for the U.S. None. Nada. Zero. In my eyes the SLS is stopping us from leaving LEO – what would you do in my position? Stay silent? Michael. First, good job on the caucuses. You Iowans didn’t do anything kooky, like we feared, and you elevated a reasonable number 2. I agree Santorum is an underdog to Mitt. I like Santorum better (that boy is crazy man!), but I think Romney has broader appeal (not a hair out of place!), and I want to win foremost. All the other candidates are goners. I also think Romney will be on his best behavior to keep the conservative base happy, thus I think he will pursue a Bush like NASA policy, and the end of NASA activism. I don’t believe that Gingrich would be as restrained. @common sense: There’s no funded payload for Falcon 9. What’s your point? There is, Dragon and a whole list of commercial payloads. $1.6 Billion for resupply flights to ISS There would be money for more NASA payloads like depots, landers and habitats if it were not all going to pay for SLS. Me “congress is hell bent on developing an HLV.” CS “No. Congress is hell bent on preserving jobs.” Tomato, tomato….. still comes to the same thing. Congress is doing what I want, why question the reason? CS “They are also funding CCDev.” The president’s budget had $850 million for CCDev but way underfunded SLS and MPCV. Congress raised funding for both SLS and MPCV substantially while cutting the CCDev funding to $400 million with $100 million on hold till NASA proves sufficient progress is made on the SLS. Which one do you think congress values most? As for what commercial is able or not able to do with HSF……. My main concern is not so much with design and building with Boeing but with launch and operations. With SpaceX I have concerns on all four points but success with the COT’s missions would go a long way tword them proving themselves. “Oh yes we can.” You forgot to say “Nanner Nanner”. That wasn’t me, but I feel the same way. Even if they were affordable, the missions you point to are either serviceable in other ways, without an SLS, or are close to one-shot deals. Possibly, but we can dispense with the “no payload” nonsense right here and now. How many SLS-scale large space telescopes do you really think that SMD can afford in the next three or four decades? If space telescopes are the end all be all for payloads you see worth lifting over the next three or four decades, we might as well fold up the space program right now. In fact, in-space construction is a more sensible and extensible approach to achievement of such a telescope. The single experience we’ve had with on orbit construction cost $100 billion to complete assembly, and $50 billion more to date. With 37 shuttle, 88 Soyuz, 50 Progress, and 5 ATV flights, that’s $65 or so billion after total launch cost–or 54 shuttle flights. You’re going to have to do better than that if you want to kill HLV. @Coastlal Ron: Until Congress and the President allocate money, it is true. If that’s the case, then there are no funded payloads for Falcon 9. Right now there are preliminary plans, wishes, and dreams. But no funding streams. You know, sort of like new commercial lift, propellant depots, etc. The point that Doug Lassiter makes about affordability is a good one. Take all of the ideas that are being proposed, stack them up into payload missions that use an SLS once or twice per year for a couple of decades, and how much will that cost? I thought you weren’t interested in unfunded payloads? Now we’re talking proposals? I’ll pit my imaginary 70 ton nuclear reactor against your imaginary cislunar vehicle. Far more than any Republican Presidential candidate would propose without some sort of boogeyman threat… How do you figure a GOP President wouldn’t release a $15-$20 billion a year budget request? …and I don’t think China is a big enough threat in space to merit that much spending. Be nice if you bothered to spell out how much spending you have in mind. The SLS is a public works project… …that is too expensive to use after it’s finished… Made up. …and leaves no lasting infrastructure after all the money has been spent. The most immediate threat would be an order of magnitude increase in the PRC military satellite count. @gregori: There is, Dragon and a whole list of commercial payloads. Where’s the money? $1.6 Billion for resupply flights to ISS. Again, where’s the money? There would be more money for depots, landers and habitats if it weren’t all being wasted on SMD. There are dozens of funded payloads for Falcon 9, including several Dragons currently under construction and one flying next month. From what planet are you posting this? Prez Cannady wrote @ January 5th, 2012 at 5:12 pm I know you think you are making a point, but apparently not one that can be understood by anyone. SpaceX has customers that have reserved flights on Falcon 9, and likely even paid deposits to hold their spots in line. Their launch backlog is almost evenly split between NASA and commercial customers. If you bothered to look at their website you would know this. So what is the point you’re trying to make? I don’t know what your background is, but mine has been in manufacturing, including production & factory scheduling. I’ve been the guy that upper management looks to when they need to find out if we can make the revenue plan with the available capacity, and if we’re going to make our weekly production numbers. That means I have to be able to know what the limitations are across the factory for building the product. It’s a team effort to figure all this stuff out, but my department and I are the ones that pull everything together. Because of this I tend to look at our space plans with the same eye. If we look at when the SLS will be available and start planning a full-use schedule for it, then it becomes easier to see when payloads and missions for it will need to be created and funded. Your 70 ton nuclear reactor example isn’t being built for itself but for some intended use (whatever that is). But just for the reactor, I would say that we’re talking about more than ten years and likely more than $10B. If that is representative of the payloads that we’ll be putting on top of the SLS, then pretty soon the SLS payload budget will increase to an average of $10B/year. Add on top of that the operations budget for the reactor and every other payload, and pretty soon we get to a pretty big number – far bigger than NASA’s current total budget. Since Congress hasn’t even started discussing what they intend to use the SLS for, I would say that we’re already behind schedule on fully using the SLS at this point. Remember the Shuttle had payloads being planned for it at the same time it was being designed, so this has been done before. Now you may think that things are fine, and we still have plenty of time to build the 1-2 payloads per year that are needed to make the SLS a successfully program, but I haven’t seen any evidence of that. Certainly not any from Congress. Because of all of this, from my professional perspective the SLS program is already behind schedule for being used. You and others may disagree, and I hope you provide some reasons or logic why. @Simberg: Well, hot damn. By that yardstick, guess there is a funded payload for SLS. @ Prez Cannady Do you know what this means right below? http://www.spacex.com/launch_manifest.php Please show me a launch manifest for SLS. It seems you are one of the “there would be more money”-type if this or that or or whatever. There is the money there is. No more no less, but possibly less in the near future. So far F9 has funded payloads, see above, and SLS does not. They all have Powerpoint charts that’s for sure but SLS does not even exist. At the risk of being arrogant (MrEarl?) and as Rand is asking “From what planet are you posting this?”. @ Prez Cannady wrote @ January 5th, 2012 at 5:15 pm And that would be of NASA’s concern because????… NASA is going to stop the PRC from sending satellites to orbit? How? With SLS? And the super-duper-raygun they are developing at Area 51? The same raygun that is one of the super-super-payload the DoD plans in secret for SLS? Anywho. Hmm just in case… So you think Boeing has no launch ops experience? Really? You know USA right? http://www.unitedspacealliance.com/about-USA.cfm “USA is a Limited Liability Company (LLC), equally owned by The Boeing Company (NYSE:BA) and Lockheed Martin Corporation (NYSE:LMT).” And I am sure you know ULA right? http://www.ulalaunch.com/site/pages/About_Overview.shtml “Formed in December 2006, United Launch Alliance (ULA) is a 50-50 joint venture owned by Lockheed Martin and The Boeing Company.” Try something else my friend… Just in case “Oh yes we can! Nanner Nanner”. With SLS, which is arguably unaffordable, especially if you want to do anything with it, we’re not talking about being stuck in LEO. We’re talking about being stuck on the ground. SLS won’t fly for a decade or more. You’re exactly right. But that was a key payload in the reference you pointed us to. A credible illustration of capability, but a lousy illustration of need. That “single experience” you refer to was a fourteen year process that gave us a 450,000 kg human-rated space station. We’re talking about a 20,000 kg non-human rated telescope (say, three times the size of JWST). So that’s a nonsensical comparison. But hey, a 450,000 kg telescope sure would be awesome! In fact, we have quite a bit of experience in on-orbit construction if you include all the rendezvous and dockings, and even grapplings, we’ve accomplished. As it turns out, most of those involved ISS, but they didn’t have to. Many of those efforts didn’t even need people attached. Seriously, when your largest facility, science or otherwise, is limited by lift vehicle size, you’re all done. Your discipline is kaput. Time to change professions. In-space construction is the only way out. Better get good at it. LOL I dont think its funded to completion or launch RGO According to you, something other than a budget and therefore not worth considering. You have me confused with gregori. I haven’t asked for more than that. Really? Where’s the money? You have a web page with no specific dates or contract details for a lifter which has yet to support a single customer. A planet where you get called on moving the goalposts. Non-sequitur much? @Coastal Ron: I don’t know what your background is, but mine has been… Yeah, we know. You bring it up every other month or so. If you’re going to simply make up numbers, you could at least follow through and show: 1. How you get to $10B/yr, and 2. How you figure operating a nuclear reactor in space and its associated payloads adds another $10B/yr. Since Congress hasn’t even started discussing what they intend to use the SLS for… I see we’re still pretending that Congress is developing and managing SLS. …I would say that we’re already behind schedule on fully using the SLS at this point. Remember the Shuttle had payloads being planned for it at the same time it was being designed, so this has been done before. The Shuttle had reference missions, as does SLS. Now you may think that things are fine… I don’t. SLS is a horrible HLV architecture. …and we still have plenty of time to build the 1-2 payloads per year that are needed to make the SLS a successfully program, but I haven’t seen any evidence of that. Certainly not any from Congress. Why are you looking to Congress to dream up the in-space elements in the first place? She is not a body shop for reference mission design, a committee of procurement officers, or a lead contractor. The role Congres has and continues to play is negotiating with the Administration and agreeing to enact policy into law, as well as authorize, appropriate, and oversee expenditures for compliance with Congress’ letter and intent. Because of all of this, from my professional perspective the SLS program is already behind schedule for being used. I don’t know about your professional perspective, but slips in SLS and MPCV development are a matter of public record. Congress made not a subtle point of this in the last appropriation. You and others may disagree, and I hope you provide some reasons or logic why. It’s sort of insane to think that MPCV is a payload for SLS, considering the disparity between its weight, and the SLS capability. And the fact that it doesn’t really exist… “There are dozens of funded payloads for Falcon 9, including several Dragons currently under construction and one flying next month.” ROFLMAO 2012 starts with more shilling and more press releases… for pencilled in flights that always seem to miss their highly touted target dates. Not a good sign for a commerical, for profit firm to not deliver goods and services on time as advertised. Meanwhile– tick-tock, tick-tock, no operational Dragons are flying and no crewed Dragons will fly for years– if ever. @Simberg:: It’s sort of insane to think that MPCV is a payload for SLS, considering the disparity between its weight, and the SLS capability. And yet that’s precisely what it is. And the fact that it doesn’t really exist… A little more and no less than most CCDev alternatives. There’s a ton of things wrong with SLS. This payload point is one of the dumbest objections to it. @DCDSA: ROFLMAO 2012 starts with more shilling and more press releases… for pencilled in flights that always seem to miss their highly touted target dates. How many SLS flights scheduled for 2012? Not a good sign for a commerical, for profit firm to not deliver goods and services on time as advertised. When has SpaceX missed a date? Meanwhile– tick-tock, tick-tock, no operational Dragons are flying and no crewed Dragons will fly for years– if ever. If MPCV is the “payload” for SLS, its a gigantic waste of money. MPCV could be launched on vehicles we already have or that are soon to be available. A return to lunar orbit without a lander doesn’t justify the expense as this can be achieved very easily and sooner with current vehicles. Space Adventures has intends to perform such a mission in 2015 for only $300 Million, a mere fraction of what it will cost for NASA to repeat this stunt in 2021. They have already sold one ticket to do this. Prez Cannady wrote @ January 5th, 2012 at 11:58 pm 1. How you get to $10B/yr” Same place you do, only I think I have better assumptions. Flying a minimum of one SLS payload flight per year means that NASA must finish building one significant payload per year, and then must be able to pay for operating it for whatever the lifetime of the payload is. Everything significant NASA does these days seems to take about 10 years, and if the JWST is going to cost $8B for a 7 ton telescope, then it’s not a big stretch to figure a 70 ton nuclear space reactor would be in the same price range. I think it would be far more, but I decided to use a small number to make it easy for comparison. So for every year you think the SLS will operate, add a new program with the same budget profile. Go ahead, write it down on paper to see how it works, and you’ll see why none of the SLS supporters even try to show that the SLS can be built and flown on a yearly basis within NASA’s current budget. The President and NASA did not advocate for the SLS, and Congress has been pretty clear that they think the Administration hasn’t supported the SLS as much as Congress wants. If you can’t see that Congress is driving the SLS, then there’s not much we’ll be able to do to educate you. The Shuttle had payloads being built for it. The SLS only has the MPCV, and nothing beyond that. “SLS is a horrible HLV architecture.” If MPCV is the “payload” for SLS, its a gigantic waste of money. What else is new? Of the 84 launches last year, only 16 were on EELVs, Arianne or the Shuttle. Not much of value is ever launched in the 10 ton and up range. MPCV could be launched on vehicles we already have or that are soon to be available. Undoubtedly. But we can do away with this silly little line about SLS lacking payloads, especially if we’re to consider Dragon a payload. I’ve made no assumptions at all, so not sure what you’re talking about. On the other hand, it appears you’ve pulled $10B/yr directly out of thin air. Scratch that, I mean your long experience doing this and that and whatever. Flying a minimum of one SLS payload flight per year means that NASA must finish building one significant payload per year, As it stands now, NASA’s preliminary DRMs envision only manned an unmanned MPCVs. I require only one launch for the reactor. …and then must be able to pay for operating it for whatever the lifetime of the payload is. The lion share of which is subsumed by the cross-agency support line item. Everything significant NASA does these days seems to take about 10 years. and if the JWST is going to cost $8B for a 7 ton telescope, then it’s not a big stretch to figure a 70 ton nuclear space reactor would be in the same price range. Destiny was 16 tons, took six years from the start of construction to launch, and cost under $2 billion in present dollars. Not a good sign when a relationship you tease out of two data points–one hypothetical–is demolished by a third, concrete one. I think it would be far more, but I decided to use a small number to make it easy for comparison. Doesn’t really matter when you’re pulling them out of thin air. The President and NASA did not advocate for the SLS… They didn’t? …and Congress has been pretty clear that they think the Administration hasn’t supported the SLS as much as Congress wants. If you can’t see that Congress is driving the SLS, then there’s not much we’ll be able to do to educate you. You might start with documentary evidence. Last I checked, there wasn’t a single Congressman or Senator on any of the RAC teams. The Shuttle had payloads being built for it. So does SLS. And unlike the Shuttle, SLS–should she fly–will actually launch with said payload. “As it stands now, NASA’s preliminary DRMs envision only manned an unmanned MPCVs.” Is there any other kind of MPCV (i.e. manned or unmanned)? “I require only one launch for the reactor.” Uh huh. Is it a 70 ton nuclear paper-weight in orbit, or was it going to be used to power something? If it is intended to be useful, then when do the other mission elements get funded, built, launched and used? And are manned & unmanned MPCV flights and your imaginary 70 ton nuclear reactor the only missions you foresee for the SLS? Who, NOAA? Who are you dreaming is using this 70 ton nuclear reactor in space? Who is pulling what out of thin air? “Destiny was 16 tons, took six years from the start of construction to launch, and cost under $2 billion in present dollars.” I guess another one of your assumptions is that a 16 ton pressurized aluminum can is equivalent to a 70 ton nuclear reactor in cost and complexity? Riiiggghhhttt… They didn’t. Apparently you’re not aware of the history of the SLS, and I’m not going to restate it, so you should go get educated if you want to appear informed. Start here (NASA FY2011 Budget Proposal). RAC teams don’t drive budget or policy. @Prez Cannady So you support wasting vast amounts of money on a capability that is not needed? Why? No. Are you usually this obtuse? Uh huh. Is it a 70 ton nuclear paper-weight in orbit, or was it going to be used to power something? If it is intended to be useful, then when do the other mission elements get funded, built, launched and used? Probably a combination of before and after. What does NOAA have to do with cross-agency support? By your rule, it would cost considerably less, given that Americans build 2000 -4000 ton reactors in pressurized compartments for under $1 billion. They didn’t. My budget request trumps your news article. Apparently you’re not aware of the history of the SLS… Apparently you’re in denial. So where are all these design references, trade studies, development schedules and mission planning pieces authored by Congress? You first. Or you might consider rephrasing your question. Falcon 9 is designed ideally to carry a Dragon capsule so its sensible payload for that class of rocket. And there are many other payloads beside the Dragon. SLS only has one payload, the Orion, which its is not needed to carry. Therefore its an enormous waste of money. That’s hard to justify, other than if your aim is to funnel money into certain contractors and districts. You know, I do you the courtesy of directly responding to your comments. You might consider doing the same. Falcon 9 is designed ideally to carry a Dragon capsule so its sensible payload for that class of rocket. SLS carries MPCV? What’s your point? And there are many other payloads beside the Dragon. SLS only has one payload, the Orion. There are many other prospective payloads, but that measure is apparently frowned on by your crowd. That’s not true. …which its is not needed to carry. By that measure, Dragon doesn’t require Falcon 9. What’s your point? Therefore its an enormous waste of money. SLS is an enormous waste of money, but not for the dodgy reasons you lay out. And why you and others think it’s necessary to harp on this point day in and day out is beyond me. That’s hard to justify, other than if your aim is to funnel money into certain contractors and districts. That’s precisely what Congress aims to do. In fact, it’s about the only thing sustaining their interest in civilian space in the first place. Prez Cannady wrote @ January 7th, 2012 at 8:45 am I was trying to copy your style – apparently it worked… What a weird example, especially since terrestrial nuclear reactors exist and your 70 ton space one doesn’t. I guess you assume it will cost $0 to develop one. “ My budget request trumps your news article.” The NASA FY2012 budget request was after the SLS was created and authorized by Congress over the objections of NASA and the President. Even so the FY2012 budget was criticized by Congress for not supporting the SLS enough. So far you haven’t proved your point, if you every had one, but you have shown that you are not familiar with the history of the SLS. Based on the comments you’re also having with others on this subject you seem like you’re just arguing for the sake of arguing – or something along those lines, since you never fully explain what you are saying, only that everyone else is wrong in interpreting what you’re saying. I’ll bow out and let others see if they can tease a complete thought out of you… In your own mind, which is apparently prone to veering off into non-sequitur. What a weird example, especially since terrestrial nuclear reactors exist and your 70 ton space one doesn’t. No future nuclear reactors exists. That’s why it’s called the future. I guess you assume it will cost $0 to develop one. Prometheus final report pegged $5 billion for a demonstration 1 MWe reactor in the <10 ton range, so no. The NASA FY2012 budget request was after the SLS was created and authorized by Congress over the objections of NASA and the President. When did the President ever object? And if NASA had actually objected, why bother with HEFT–which proceeded the 2010 Authorization and provided the requirements listed therein–in the first place? Even so the FY2012 budget was criticized by Congress for not supporting the SLS enough. So far you haven’t proved your point, if you every had one, but you have shown that you are not familiar with the history of the SLS. You’ve shown you’ll make up history as it suits you. SLS is not needed to carry MPVC at all. Current launchers can do that job just fine and for far cheaper. Building a 70-130 ton launcher to carry a 22 ton spacecraft is idiotic and indefensible. “prospective” payloads don’t count. That merely wishing there are things to launch and expecting them to appear out of thin air. NASA has had a good few decades of doing that. The other payloads for Falcon 9 actually have companies funding them. But even if there was no Falcon 9, yes Dragon could be launched on other vehicles. It would be more expensive but possible. Its flexible. SLS is not flexible like this. SLS is not needed to carry MPVC at all. Current launchers can do that job just fine and for far cheaper. Falcon 9 is not needed to carry Dragon at all. Building a 70-130 ton launcher to carry a 22 ton spacecraft is idiotic and indefensible. Not if you intend to fly it mated with something else. “prospective” payloads don’t count. Then stop harping about Falcon 9. That merely wishing there are things to launch and expecting them to appear out of thin air. Which, by your yardstick, at minimum includes IDIQ contracts NASA and the Air Force have extended to SpaceX. The other payloads for Falcon 9 actually have companies funding them. But even if there was no Falcon 9, yes Dragon could be launched on other vehicles. It would be more expensive but possible. Its flexible. SLS is not flexible like this. SLS isn’t Dragon. They aren’t comparable. You can believe whatever you want. However the facts disagree with you – Congress criticized the Administration’s FY2012 budget for not supporting the SLS enough, and we had many discussions about it here on Space Politics last year. If it really matters to you, then I suggest you look at the Space Politics posts from that period to get a better understanding of the issues. I can believe in the facts; you apparently have none. However the facts disagree with you… If you had any… …Congress criticized the Administration’s FY2012 budget for not supporting the SLS enough, and we had many discussions about it here on Space Politics last year. …you’d present them, rather than simply restate your assertion. Give it your best shot. What do you mean, “where’s the money?” Don’t be so obtuse. Do you mean do the companies have money to back up their orders, or have they paid money to SpaceX? What? Or are you pretending to be a simpleton for the fun of it? So what? What’s your point? Falcon 9 is the least expensive rocket for SpaceX to use, so why wouldn’t they? Have you no business sense? This whole line of conversation that you’re having about the SLS is rather odd. SpaceX has, and ULA for that matter too, signed contracts with customers for future launches. No doubt they have also taken launch deposits on the contracts too. The SLS only has two planned missions, both considered test flights. Everything else on the launch manifest is TBD regarding actual hardware and funding. Oh sure there are lots of teams working diligently to design new and expensive payloads and missions, but they have no guidance on what the budget profiles will be, and what the goals are. Moon, depots, GEO satellite servicing – no clue. So instead of you asking “where is the money?” for a commercial launch provider that has signed contracts with multiple customers, you should be asking Congress “where is the money?” for the SLS, since they are the ones that are pushing so hard for it. @Oler: What do you mean, “where’s the money?” Don’t be so obtuse. I guess in your world a handshake settles deals amounting to hundreds of millions of dollars. Do you mean do the companies have money to back up their orders, or have they paid money to SpaceX? What? Or are you pretending to be a simpleton for the fun of it? I’m asking very simple questions on the theory that not even you can be this dumb. This whole line of conversation that you’re having about the SLS is rather odd. SpaceX has, and ULA for that matter too, signed contracts with customers for future launches. Possibly. Delta IV’s first flight carried a civilian payload. No doubt they have also taken launch deposits on the contracts too. That’s a huge assumption. In that case, Falcon 9 has only 2 planned missions, both considered test flights. Considering that they have to present these potential payloads to Congress in for FY2013, what’s your point? Why can’t I ask both? The zenit would not be anywhere near as cheap as SpaceX using one of their own Falcon 9’s. They would have to pay to ship the dragon to the launch site, pay intergration fees as a commercial costumer. They can launch the F9 for cost, not the commercial price they charge others. They would not incur the same shipping or intergration costs. By using their own rocket it would be a lot cheaper than paying to have the dragon launch on anyone else’s rockets. “@Lassiter: and @Oler:” You keep forgetting who your are responding to. Not a morning person? Now you must really be responding to Lassiter or Oler, since I never made such a statement. In this type of business, signed contracts are the norm. I don’t know what you do for a living, but obviously contracts are unfamiliar territory for you. If you want to become competent on the subject, I suggest starting with some business classes at your local community college. Again, business does not seem to be your strong suit. It’s not just the unit cost, but the total cost compared to alternatives that has to taken into account. That is why SpaceX keeps the vast majority of manufacturing in house. Shipping a Dragon capsule to Kazakhstan would also be an ITAR nightmare. We’ve already talked about your ignorance concerning contracts – those contracts constitute planned missions, regardless what you think. And as a point of clarification, except for the first Falcon 9 flight, all other Falcon 9 flights are revenue flights. For instance, SpaceX was paid $5M by NASA for successfully completing Falcon 9 flight #2, which was COTS Demo 1 Mission. They will get $10M if they successfully complete the upcoming Demo 2/3 mission. All future Falcon 9 flights have paying customers, which right now stands at more than 30 planned Falcon 9 launches. “Considering that they have to present these potential [SLS] payloads to Congress in for FY2013, what’s your point?” That beyond testing the MPCV, the SLS has no funded payloads or missions. @Vladislaw: The zenit would not be anywhere near as cheap as SpaceX using one of their own Falcon 9′s. They would have to pay to ship the dragon to the launch site, pay intergration fees as a commercial costumer. So you’re telling me the Russians would pass up a 50 percent markup to drive integration and shipping costs up to the point where Zenit couldn’t complete? They can launch the F9 for cost. Provided cost is a third cheaper than their present asking price. Where you and Oler are concerned, it’s not worth the effort to draw a distinction. Now you must really be responding to Lassiter or Oler, since I never made such a statement. In this type of business, signed contracts are the norm. I don’t know what you do for a living, but obviously contracts are unfamiliar territory for you. Apparently, you live in a world where there are no voidable contracts. If you want to become competent on the subject, I suggest starting with some business classes at your local community college. If you want to come across as something other than a resume-inflating fabulist just of junior college, you might want to appeal to actual evidence rather than your unverifiable experience. Again, business does not seem to be your strong suit. Making stuff up isn’t yours, so why don’t you just give it up? It’s not just the unit cost…[blah, blah, blah] No one said anything about unit costs, so please feel free to expound on unrelated issues with someone else. Shipping a Dragon capsule to Kazakhstan would also be an ITAR nightmare. Wasn’t for Orbital. In that case, NASA’s cost scenarios constitute planned missions, regardless of what you may think. And as a point of clarification, except for the first Falcon 9 flight, all other Falcon 9 flights are revenue flights. Clarifying what exactly? Neither does Falcon 9, beyond Demo 2/3. Stop repeating this nonsense. Even ignoring the huge commercial manifest for the vehicle, there are several more Dragons under construction in Hawthorne right now. They are funded. How you figure? Demo 2/3 is funded with carryover and NASA hasn’t announced its spending intentions for 2012’s commercial funds. pathfinder_01 “How you figure? Demo 2/3 is funded with carryover and NASA hasn’t announced its spending intentions for 2012′s commercial funds.” Space X and orbital have a contract with NASA until 2016 for 12 flights of Dragon delivering 20 tons of cargo. The COTS 1-3 flights do not count towards the 12 flights so yeap there are funds for Dragon. The money will come out of the ISS’s budget instead of out of the COTS program. I mean Space X has 12 flights. Orbital has 8. Here is the old news: http://www.nasa.gov/home/hqnews/2008/dec/HQ_C08-069_ISS_Resupply.html If needed more Dragon’s and Cygnus can be ordered at the prices listed(should you want to assemble someting at the ISS, a supply line is already in place). Prez Cannady wrote @ January 10th, 2012 at 7:05 pm “…NASA hasn’t announced its spending intentions for 2012′s commercial funds.” It’s funny how you reference the NASA FY2012 proposed budget for your arguments, but apparently have never read it. As pathfinder_01 pointed out, the CRS contract is funded out of the ISS account, which you can see on page “BUD-4″ of the budget, line “ISS Crew and Cargo Transportation”. And in case you’ve forgotten (or never knew), NASA signed the CRS contracts with SpaceX and Orbital Sciences back in December of 2008 – stable funding so far. @pathfinder Space X and orbital have a contract with NASA until 2016 for 12 flights of Dragon delivering 20 tons of cargo. Here are the contracts, as amended, binding OSC and SpaceX. Show me where any of these requires NASA to guarantee SpaceX or OSC 12 flights. @pathfinder: Pardon, here are the contracts: OSC. “Show me where any of these requires NASA to guarantee SpaceX or OSC 12 flights.” I know you’re trying really hard to be a contracts expert, but why don’t you just look at what NASA says about this: NASA Awards Space Station Commercial Resupply Services Contracts Well those are some contracts, but not necessarily ALL of the relevant contracts. The information you can’t find may be on the contracts you don’t see. You apparently need to dig deeper to find the documents that NASA references in their press release, although since finding that information disproves your point I wouldn’t imagine you’ll do it. As always, what was the point you were supposed to be making? That the future could change? Wow, I’ll alert the press… That link didn’t have anything about what hoops they had to jump through if any and what ITAR related to their system. I would rather use Robert Bigelow for an example and he has expressed, more than once, how it was a real pain in the A$$ to launch his payloads from russia. He had a lot of additional expenses to the point he was close to not launching from there. Those are all costs SpaceX would not incur by launching on their own rocket. the zenit was 45 million per your article but that was older data, I would bet it is closer to the 50 now with the way the fed has inflated the dollar. SpaceX was going to be at a 15 – 20% gross margin or about 37- 40 million for the basic F9, that was from Musk a few years ago, do not know if those are still his gross margins. In house ingration versus having a foreign country doing it would also be cheaper. If you had read the contract you would have seen this: “INDEFINITE QUANTITY (FAR 52.216-22) (OCT 1995) (h) This is an indefinite-quantity contract for the supplies or services specified and effective for the period stated in Clause I.A.2. The quantities of supplies and services specified in the Schedule are estimates only and are not purchased by this contract. (i) Delivery or performance shall be made only as authorized by orders issued in accordance with Clause II.A.7, FAR 52.216-18, Ordering (Oct 1995). The Contractor shall furnish to the Government, when and if ordered, the supplies or services specified in the Schedule up to and including the quantity designated in the Schedule as the “maximum.” The Government shall order at least the quantity of supplies or services designated in the Schedule as the “minimum.” (j) Except for any limitations on quantities in Clause II.A.8, FAR 52.216-19 Order Limitations (Oct 1995) or in the Schedule, there is no limit on the number of orders that may be issued. The Government may issue orders requiring delivery to multiple destinations or performance at multiple locations.” The 12 launches is only an estimate NASA can demand more or less. The contract has a 25 million dollar milestone fund that NASA pays out for current milestones on any of the COTS launches not counting the demos. So if SpaceX is welding up the tank for the first delivery launch they are getting paid already for parts of those future launches, up to 50% of the cost of each launch can be paid out before the actual launch. I know you’re trying really hard to pretend to be an engineer, but why don’t you do what you were told to do and show us where in those contracts NASA guarantees 12 flights. Well those are some contracts, but not necessarily ALL of the relevant contracts. These are all the relevant CRS contracts. Get to work, buddy. Apparently I have, since I’m calling BS on claim that SpaceX has a binding agreement for 12 flights and 20 tons by 2016 and you’ve just made the case. And no, it didn’t. Because it’s utterly irrelevant to the fact that Orbital and other American companies looking for launch services go ahead and do it anyway. I would rather use Robert Bigelow for an example and he has expressed, more than once, how it was a real pain in the A$$ to launch his payloads from russia. So not only are you cherry picking, but you resort to the gripes of a man who obviously didn’t find ITAR and shipping costs so nightmarish that he wouldn’t use Russian launchers for his payloads. the zenit was 45 million per your article but that was older data, I would bet it is closer to the 50 now with the way the fed has inflated the dollar. I’d advise you to stop making up numbers, but I’m amazed you’ve chosen ones that still cast Zenit with a better $/kg than Falcon 9. There are loop holes for both to get out from under the contract, but I have absolutely no doubt that NASA is not only is going to order those 12 flights but I believe they will be adding more and will asking for more down cargo. I also belive that once Bigelow is up and running that NASA will jump in and try and lock other countries out by leasing as much as possible. They made sure that the COTS contract allows for sending cargo to multiple locations, so they will have the logistics in place once bigelow opens for business. Just my opinion, but we will see how it plays out in the next few years and see if I was on the mark. “So not only are you cherry picking,” Were you not cherry picking by using a link that made it seem everything is rosey for ALL itar launches? I mearly showed that everyone that launches with russia breezes though ITAR regs. Almost the entire aerospace industry has been lobbying for ITAR reform, it it wasn’t an issue there wouldn’t so many calls for reforming it. Bigelow decided not to do the Galaxy launch and module because of escalating costs and instead will use it as an inhouse test module. So costs WERE a factor. I am not making numbers up. Prices have risen with the fed’s move on increasing the money supply. In some cases companies have absorbed it in other cases not. You have seen it in a lot of imports rise in price to match the moves and you saw it in the jump for domestic food costs. The zenti 2 was listed per your link at 45 million but that is a 2009 price and I have not been able to find a current price on that rocket, maybe because it is being retired and the new zenit 2m will be replacing it. Couldn’t find any prices for that either. Leave a Reply to Rand Simberg Cancel reply Copyright © 2020 Space Politics - All Rights Reserved
cc/2020-05/en_middle_0097.json.gz/line1418317
__label__cc
0.629165
0.370835
America Revealed Today we face a climate of ever increasing misdirection by popular media. This site, along with others, aims to reveal the reality of America and the loss of fact inherent to the over riding theme of our current political and social confusion: Purposeful deception. Deficit battle shaping up as GOP victory by Lisa Mascaro and Christi Parsons, Washington Bureau Credit: Reuters/Jim Young Regardless of any tax concessions President Obama achieves, the end result would favor Republican goals of cutting spending and government services. Even as the political battle mounts over federal spending, the end result for federal policy is already visible — and clearly favors Republican goals of deep spending cuts and drastically fewer government services. President Obama entered the fray last week to insist that federal deficits can't be reduced through spending reductions alone. Federal tax revenue also must rise as part of whatever deficit reduction package Congress approves this summer, he said. Obama has been pushing to end a series of what he calls tax loopholes and tax breaks for the rich. But even if Obama were to gain all the tax-law changes he wants, new revenue would make up only about 15 cents of each dollar in deficit reduction in the package. An agreement by the Republicans to accept new revenue would be a political victory for Obama because "no new taxes" has been such an article of faith for the GOP. But substantively, budget experts note, the plan would still be dominated by cuts to government programs, many of them longtime Democratic priorities, such as Medicaid and federal employee pensions. Acquiescing to GOP demands would be the third major compromise for Democrats in the past year — a point of considerable frustration for the party's liberal base. Despite Democratic opposition, Congress voted in December to extend the Bush-era tax breaks for the wealthiest Americans and agreed this spring to steep budget reductions to avert a federal government shutdown. Some Democrats believe Obama set the stage for the current situation by opening negotiations on deficit reduction this spring with a proposal that contained a 3-to-1 ratio between spending reductions and tax increases. Administration officials defend that move, saying the president began discussions at what one senior official called a "realistic starting point," not one designed to maximize his bargaining position. The current debate involves two issues: As of Aug. 2, the Treasury Department says, the government will hit its statutory ceiling for borrowing money. Administration officials and congressional leaders agree that a failure to raise the ceiling could cause economic chaos by undermining faith in the government's creditworthiness. Republicans have insisted they will not approve a debt-ceiling increase without agreement on a major reduction in the government's long-term deficit, although their spending plan would also require raising the debt ceiling. They have demanded that deficit cuts match the new borrowing authority, dollar-for-dollar, and have vowed to oppose any increase in tax revenue. About $2.4 trillion in new borrowing capacity would be needed through 2012, Treasury officials say. Obama has intensified his efforts in recent days, campaigning for what he terms a more "balanced" approach as negotiations enter their final weeks. The White House wants an agreement well before the Aug. 2 deadline. "This is not just a numbers debate," Obama said Thursday in Philadelphia. "This is a values debate." GOP leaders have seized on the unpopular debt ceiling vote as an opportunity to further their goal of reducing the size and scope of government. Democrats have largely accepted more than $1 trillion in spending reductions as a signal that they are willing to make difficult choices — including, a Democratic official said, $200 billion in cuts to Medicare and Medicaid. Details of such cuts are still unknown, but they will slice across every domestic agency, reducing funds for education, transportation, health and welfare. The Pentagon may be spared under the GOP plan. Even some Republicans worry about the scope of reductions, which could affect up to $35 billion in agricultural subsidies in farm states, and billions more in infrastructure projects or social services in home districts. However, few Republicans have spoken out, many fearing potential primary election challenges by conservative organizations and "tea party" activists. The White House is seeking about $300 billion in new revenue over the decade, less than half the amount it sought when Obama first outlined his goals last spring, based on the proposals in negotiations. Obama once targeted the wealthiest Americans, the top 2% who earn beyond $200,000 a year, proposing to cap their income tax deductions. But weeks of closed-door talks have diminished that goal. Now, even a deduction cap on those Americans earning beyond $500,000 a year — just 1.3 million Americans, fewer than 1% of all taxpayers — has been dashed. The latest offer on the table would be a more limited cap, to generate an additional $130 billion. With just a few weeks remaining to reach an agreement, Democrats now are fighting mainly for the most populist tax reforms: ending tax subsidies for oil and gas companies, eliminating a tax break for hedge fund managers, closing an ethanol loophole and changing the way businesses write off inventory, according to those familiar with the talks. In an appeal to the sensibilities of ordinary Americans, Democrats have gone after notable tax loopholes: tax breaks for owners of corporate jets or thoroughbred race horses. Such reforms produce only modest revenue — $3 billion in the case of corporate jets — but Democrats believe they carry political value. House Speaker John A. Boehner (R-Ohio) is aware that he will probably need Democratic votes to pass a deal, much as he did earlier this year to avert a government shutdown. That would require adding sweeteners. The White House view is that all sides have a lot at stake over the next few days. Polls show that slightly more Americans would be inclined to blame Republicans than Democrats for the impasse. But many would blame both sides. "At this point, you shouldn't even call it a debt ceiling debate," said Stan Collender, an author and expert on the federal budget who now blogs about the topic. "It's an impasse. And if it stays that way, it hurts everybody to some degree." lisa.mascaro@latimes.com I want to hear from you but any comment that advocates violence, illegal activity or that contains advertisements that do not promote activism or awareness, will be deleted. America Revealed: Join us on Facebook Educate and inform the whole mass of the people... They are the only sure reliance for the preservation of our liberty. ~Thomas Jefferson AR Fascism Tracker: 14 points of Fascism From Civil Disobedience to Civil Defiance Boehner’s Hoax The United Loony Bin Of America America's New Civil War A Call For A Progressive Presidential Campaign In ... The Biggest Threat to Western Values Bill Approved To Create Massive Surveillance Datab... We're Still in the Middle of the Storm Food, Control and the Growing Police State How The Military Became Our New Civic Religion U.S. Needs To Replace Pentagon's Approach With Pea... Is America Caught In The Closed Mind Trap? A Victory In The War Against Profiteering Debt Madness Was Always About Killing Social Secur... What Sharia Is and Isn't--Panel at Center for Amer... The Oslo Attacks: More False Flag Evidence As The U.S. Empire Spreads Abroad It Becomes A Pol... Audit of the Federal Reserve Reveals $16 Trillion ... Norway's Attacks Reveal World of Hatred A Ruinous Meltdown Gov. Rick Scott’s Plutocratic Florida Is Climate Change a Global Security Threat? Pledge Circus The Arts of Life They Changed Into the Arts of Dea... The Fix Is In: Washington's Planned Social Contrac... Militarizing Latin America ECHELON -- The Global Eavesdropping Scheme Dwarfs ... The Road Home For Veterans The New Party of Reagan Would Michele Bachmann be a submissive president? 20 Signs That The Fabric Of American Society Is Co... NYC Schools Approve $2.7 Million Deal with Murdoch... The Master's Children On 9/11, The American and Israeli Governments Ente... The Eleventh Day Looking at FBI Entrapment Is There Anything We Are Still Free To Do Without ... The Corporate Supreme Court Debt Political Theater Diverts Attention While Ame... The War on Terror, now starring Yemen and Somalia America’s Disappeared An American Awakening Phone Hacking Scandal Brings Out WSJ’s Fear of Wik... The Clash of Generations Murdoch Meltdown: News Corp Imploding; Raising Que... A Zoo Of Our Own Making Making A Mockery Of Empire’s End The Riddle of the Middle Obama's Continued Reneging on His Promises Which Republican Party Do You Support? Obama Is Establishing An Executive Dictatorship Yes, I'll dare call it treason Wait: Did the USDA Just Deregulate All New Genetic... Pentagon Declares The Internet A War Domain Smaller Businesses Seeking Loans Still Come Up Emp... PIIGS, Presstitutes, and the Global Meltdown Jeremy Scahill Reveals CIA Facility, Prison in Som... Murdoch Media Empire: A Journalistic Travesty Are New Voter ID Laws Jim Crow By Another Name? As the Romans Did What Doesn't Work in America: The Story of a Cant-... The Republican Case for Compromise Put Down Your Rights and No One Needs to Get Hurt!... God's Lobbyists: The Hidden Realm of Religious Inf... CIA Most Likely To Continue Criminal Ways Under Pe... We Do Not Take Care Of Each Other Banking on the Future A New Year for the Great American Deception John F. Kennedy's Secret Society Speech Bohemian Grove: The New World Order Revealed? How the Terrorists Killed America's Middle-Class Michele Bachmann’s White-Washed America Why is the Most Wasteful Government Agency Not Par... Extremism, Endless War, Apathy and Passive Indiffe... The Great Unravelling Anonymous - We Are All Capable Of Great Things! Reagan Mythology is Leading U.S. Off a Cliff Obama Administration Using Anti-Terror Laws to Int... Risk-Free And Above The Law: U.S. Globalizes Drone... House Passes $649B Defense Spending Bill How Free Trade and Globalism is Hurting America US Protestors Are Losing Free Speech The Hypocrisy of the Casey Anthony Trial Doctor finds cure for Cancer but is shut up by Fed... The Essential Rules Of Liberty Why Do the Police Have Tanks? The Strange and Dang... America's New Culture War: Free Enterprise vs. Gov... Leaving The Church of Free Market Miracles: Where ... Where Our Heroes Have Gone Union Workers Replaced With Prison Labor Under Sco... It's Time to Get Outraged War Fever Subsides in Washington Truth Decay: Conspiracy Theories and Hoaxes Are Bl... If American Exceptionalism Were a Reality, Here's ... Torture Crimes Officially, Permanently Shielded Julian Assange of WikiLeaks & Philosopher Slavoj Ž... Health Care Cuts Proposed In Deficit Negotiations S. Paul Articles 9-11’s Anniversary Only “Celebrates” America’s Destruction A Government by The Fascists for The Fascists A Liberal's Perspective of The Tea Party A Liberal’s Awakening to the Reality of Obama Care After bin Laden: It is Time to Stop the War Machine America is Not a Christian Nation American Nationalism: Is Our Freedom Under Attack? Americans are Reaching a Breaking Point America’s Illegal Immigration Debate Misses the Mark America’s Misconception of Freedom America’s New Slavery And The Hate Machine Rolls On: HHS, Obama and the Catholic Church Beware the Rising Ire of a Forgotten Generation Christmas in a Material World Communists Are Taking Over Wall Street? Defunding Education to Send America's Future Abroad Genetically Modified Foods and the Monsanto Initiative God has no place in Politics God is a Weapon Homeless in the Land of Milk and Honey Hope Lost If America's future is to be secure, regressing to a religious state is not the answer Independence Day: We Shall Overcome Lost and Bewildered in America Marching Toward the Death of the American Dream Political Vitriol and Society’s Fringe Element Private Prisons and the American Police State The Continuing Loss of Our Political Representation: Part I The Death Panels That Aren’t The Environment: Corporate America’s Sacrificial Lamb The Modern American Political Plague: 6 ways to protect against its destructive toll The Secret to FOX News' Success The State of the Union: Politics as Usual The Unfortunate Reality of Bin Laden’s Death The War On Terror: How it is Affecting Politics and Society Today by S. Paul Forrest They take our money for WAR To Serve and Protect; America’s Institutional Fallacy Today's Austerity Measures Are Taking From Us, Our Once Great Dream We the People Must Protect Our Liberty, No Matter the Cost We the People Support Occupy Wall Street; Why Doesn’t Congress? When Democracy Silences the Voice of a People Where Has Journalism Gone? Will Our Nation Experience Another Kent State? Activist Radio The Bottom Up Radio Show New Dissident Radio Forward Blitz Battle Line Radio Show Why Iran assassination plot doesn't add up for Iran experts by Scott Peterson , Staff writer Christian Science Monitor S. Paul Note: The U.S. has been trying to ramp up public support of military... How Christian Fundamentalism Helped Empower the Top 1% to Exploit the 99% by Frank Schaeffer Alternet As the Occupy Wall street movement spreads across the country and the world, we must bring attention to... A repeated post from 4 months ago...Since repeal is in the air, I will restate my case. S. Paul Forrest On December 24, 2009, H.R. 3590 -- ... S. Paul Forrest Land of Milk and Honey , Sally Burton America was once called the Land of Milk and Honey. It was so named for the p... Are Scientists Confusing the Public About Global Warming? Climate Central By Nicole Heller “Do you believe in global warming?” I assure you no one in the earth science community is asking that qu... The Rise of Dominionism - Remaking America as a Christian Nation The Public Eye Magazine By Frederick Clarkson When Roy Moore, the Chief Justice of the Alabama State Supreme Court, installed a two-and-... Is America Truly Broke? SPaul note: America is not broke. Broke defines a state where one can no longer pay for itms and sevices...America keeps doing that in gran... Is There an American Caste System? Sulekha.com Spaul note: I absolutely love to read articles from years past and think of the words in terms of today's societal situati... American Imperialism, 2011 Libya and Obama's Embrace of the Imperial Presidency Huffington Post Joseph A. Palermo Associate Professor, American History, Califor... by S. Paul Forrest This article was originally written for an interview with New Dissident Radio 's Lakota Phillips on Brea... Newsvine - Get Smarter Here In Ukraine scandal, Devin Nunes has some... - The more information about the Ukraine scandal comes to light, the more it appears Rep. Devin Nunes (R-Calif.) has some explaining to do. Announcing the 3rd Annual REAL Fake News Awards! - It's a new year so it's time to bust out the dinos once again! That's right, James Corbett will be hosting the 3rd Annual REAL Fake News Awards this Friday... Dear Care and Feeding: Is It OK to Keep My Daughter From “Playing Funeral” With Her Grieving Friend? - Parenting advice on playing funeral, pot-smoking neighbors, and apologizing girls. A Plague Of Locusts, Earthquakes In Diverse Places, And Weather That Has Gone Completely Nuts - It is almost as if someone flipped some sort of a switch as 2020 began, because we have been seeing really weird things happen all over the globe so far th... OpEdNews On MLK Day - Memories of the Fortieth Anniversary rally of MLK's I Have a Dream speech held on Washington, DC, on August 23, 2003 on the steps of the Lincoln Memorial. ... NJ Officials Insult Dr. Martin Luther King Jr. 1,771 Ways - Ask 100 New Jersey residents who is Dr. Martin Luther King Jr. and more than 90 will quickly reply, a civil rights leader. Ask 100 New Jersey resident wh... Xenobots are here: Tiny bio-robots inside your veins may heal you & will definitely be weaponized by West to take out ‘bad guys’ - Peter Andrews is an Irish science journalist and writer, based in London. He has a background in the life sciences, and graduated from the University of ... Intercontinental Cry Evangelical gangs in Rio de Janeiro wage ‘holy war’ on Afro-Brazilian faiths - The expression “evangelical drug trafficker” may sound incongruous, but in the Brazilian city of Rio de Janeiro, it’s widespread. Charismatic Christianity ... The Refreshment Center ANNOUNCEMENT: TRC Has Moved to Wordpress, With A New Name - A message from TRC founder, Gabrielle Jones-Price Greetings to my long-time patrons and followers. The Refreshment Center's archives have been imported to ... GLOBAL POLITICAL AWAKENING 5 Tips for Voters from a Non-Voter - I hope all who operate from a position of love will invest a few minutes to watch this beautiful expression of consciousness concerning true freedom as it... Website is a success! - For those of you wondering, the Wordpress website went offline due to an overabundance of traffic. My web designer, who builds websites for a living, told... Musings Of A Tired Soul I Could Use this! - Information used in this blog is reproduced in accordance with Section 107 of title 17 of the Copyright Law of the United States relating to fair-use... http://kfor.com/2017/04/03/education-advocates-call-on-lawmakers-to-penalize-themselves/ - OKLAHOMA CITY – The April 1 deadline to fund education has come and gone for yet another year with no education budget from the legislature. House Bill 124... Jim Hightower's News and Commentaries Parsing the PR lies of Goldman Sachs - CorporateSpeak is an inane language that conveys seriousness without any sincerity. Consider this example from Goldman Sachs: "We are pleased to put thes... Yelps from the Closet PC - It's not the Intelligent Concept You'd Expect - As Popeye would say, 'That's all I can stands, I can't stands no more!' The point of no return is on the horizon and, in this case, the world is flat. Hum... US’s Saudi Oil Deal from Win-Win to Mega-Lose - By F. William Engdahl Who would’ve thought it would come to this? Certainly not the Obama Administration, and their brilliant geo-political think-tank neo-... Say No To Corporate America The "JADE" In Jade Helm 15 Is An A.I. SOFTWARE Program - Deceived World A System of Control - It’s all around you. It tells you what to think, how to act, what you are allowed to do, how you may care for your family, how you may make a living, and ... American Politik A Huge Forced Dose of Reality for Conservatives - *Editor's Note: A quick post about the election. I haven't posted here much with Facebook to rant on and the immediacy that seems to provide but I got on b... The Urban Liberal It’s The Little Things. - So, we all know the basics we’re thankful for every year on Thanksgiving: family, friends, food, clothing, a roof over our heads, having a job. Absolutely.... TruthNexus Earthjustice In The News | Earthjustice Antemedius - Liberally Critical Thinking This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. It is being made available in an effort to advance the understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, and so on. It is believed that this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. If you have an original article that contributes to the theme of this blog, please send to spaul@spaulforrest.com This blog is for educational value only and neither represents nor advocates social or political dissension lest it be in a peaceful, intelligent manner through the legal rights granted to us by the U.S. Constitution.
cc/2020-05/en_middle_0097.json.gz/line1418318
__label__wiki
0.877979
0.877979
‧Features Home / Features Mon, Jun 25, 2018 - Page 8 News List China’s transgenders ‘step forward’ from the shadows Long pressured to deny their identities, Chinese transgenders are quietly asserting themselves, with advocacy groups forming and doctors reporting increasing gender-reassignment surgeries By Kelly Wang and Dan Martin / AFP, Shanghai A drag queen on June 9 performs with dancers onstage at the ShanghaiPRIDE opening party in Shanghai. Lan spent years trapped between two identities: the male gender assigned to her at birth and the woman she was inside — a living “torture” in a China not yet ready to fully embrace transgenders. The Shanghai native, who asked that her full name be withheld, misled friends and family with a macho facade but eventually, depressed by her identity crisis, underwent gender-reassignment surgery in 2015. “I was always between those two voices,” said Lan, 31, looking prim in a blue blouse and shoulder-length auburn hair. “I was lonely, helpless and in despair. Now I’m living my dream.” Long pressured to deny their identities, Chinese transgenders are quietly asserting themselves, with advocacy groups forming and doctors reporting increasing gender-reassignment surgeries. Surgeon Zhao Yede performed 20 to 30 operations annually two decades ago. He now does around 200 per year, crediting a burgeoning online trans community with bringing people forward. “What’s clear is [patients] are getting younger. We used to see people at 26, 27, or 30. Now we see more and more 20-year-olds,” he told AFP. Transgenderism’s place in China has long been something of a paradox. Ancient depictions of cross-dressing abound, and men typically played female roles onstage. Today, a few transgenders have become minor celebrities, and the lack of strident religiosity in Chinese culture minimizes overt persecution. But Chinese transgenders say they remain deeply misunderstood, subject to abuse from relatives and routine discrimination. China’s trans population is unknown, but estimates say up to 0.6 percent of Americans identify as trans. That percentage in China would equal more than eight million people. A survey by the non-profit Beijing LGBT Center last year found nearly 62 percent of Chinese transgenders suffer depression, nearly half contemplated suicide and 13 percent attempted it. A UNDP report last year said that among China’s LGBTs “trans people face the highest levels of discrimination, especially within the family, schools and workplaces.” Chinese society prizes male heirs and continuing the family line, and transgenders, particularly vulnerable youths, often suffer physical and emotional abuse at home, said Zhuo Huichen, a transgender woman. Authorities typically dismiss such abuse as family squabbling, taking no action, said Zhuo, who co-founded the Guangzhou-based Trans Center in 2016, one of China’s first trans-led NGOs. “Some cases we see are horrible. Parents may even want to kill their children,” said Zhuo, 25. Even Zhuo, wearing make-up and with her long hair flowing from a cat-eared cap that says “beautiful” on it, hasn’t told her parents she is transitioning to female. The center is seeing increasing numbers of transgenders seeking help, and steady reports of suicides. “Many are minors. It’s a serious problem,” she said. Post-surgery, Chinese trans can change their gender on government IDs but face major obstacles revising diplomas and academic records, often resulting in denial of jobs or further schooling. Trans unemployment is three times the average, the Beijing LGBT Center’s survey said. Marginalized, some may drift into sex work. A transgender man known as “Mr C,” who was assigned female at birth but has transitioned, was fired by a health-care company in southwestern China in 2015 over his gender identity.
cc/2020-05/en_middle_0097.json.gz/line1418320
__label__cc
0.674424
0.325576
Give the Gift of Knowledge through Books During this holiday season give the gift of knowledge and adventure. Edgecombe and Nash counties roots are deep in storytelling through song and words. In the Twin County Hall of Frame, we have three inductees nationally-known for their way with words as we... We had the honor recently of induction a new class of members to the Twin County Hall of Fame in Rocky Mount, North Carolina. It was an evening filled with respect and joy. Let us introduce you to the new class: Ann W. Bailey Ann W. Bailey, possibly the first female... 18th Annual Thelonious Monk Jazz Festival Jazz Legend’s 100th Birthday Twin counties celebrate the American Jazz Legend and Rocky Mount native, Thelonious Monk, with the 18th Annual Thelonious Monk Jazz Festival. Events will take place on October 6-7, 2017 with concerts, lectures, and book signings... Announcing Twin County Hall of Fame 2017 Twin County Hall of Fame Class of 2017 Announced Twin County Community Pride, Inc. is pleased to announce the 2017 Inductees to the Twin County Hall of Fame. This year’s class of nine includes a bandleader, two businessmen/community leaders, a pioneering... African-American Music Appreciation Month Celebrating African-American Music Appreciation Month During the month of June, we celebrate African-American Music Appreciation Month. Music has been a rich part of Edgecombe and Nash counties past and present. We have been fortunate to have musicians and performers... Preserving History of Rocky Mount Mills History Harvest Captures Rocky Mount Citizen’s Stories Memories began to fade with the passing of generations. Valuable oral histories along with diaries and photos are being lost forever. Important everyday stories about how people lived that create a rich... Photographs Now Available to View 2016 Hall of Fame Dinner Photographs Now Available to View We would like to say thank you to everyone who supported the 2016 Twin County Hall of Fame Induction Dinner. Thirteen amazing community members were inducted into the Hall of Fame. They were supported by,... Unveiled! 2016 Twin County Hall of Fame Portraits Twin County Hall of Fame Inductees Portraits Unveiled Close to 400 people packed Nash Community College’s Brown Auditorium to celebrate the induction of thirteen community members who have had a huge impact on Edgecombe and Nash Counties in North... Meet the 2016 Hall of Fame Inductees Meet the 2016 Hall of Fame Inductees We are pleased to introduce you to the 2016 Twin Counties Hall of Fame Inductees. Our mission is to share the rich heritage of Edgecombe and Nash counties. The Rev. Joseph B. Cheshire Sr. and the Rev. Joseph B. Cheshire Jr. The... Twin County Hall of Fame Inductees Featured! Twin County Hall of Fame Inductees Featured! Thank you to the Rocky Mount Telegram for featuring the 2016 Hall of Fame Inductees on Sunday, September 11, 2016. To see the article in full, visit the Rocky Mount Telegram. Join us to celebrate! Please join us... Campaign honoring Kyser earns national award Twin County Hall of Fame 16th Annual Induction Banquet Announced Norfleet Sugg (2011 Inductee) cuts ribbon at Veterans’ Military Museum Re-opening Check Out Our Portraits in the Rocky Mount Event Center Event Center Opening October 25th, features Hall of Fame Exhibit
cc/2020-05/en_middle_0097.json.gz/line1418324
__label__wiki
0.617139
0.617139
Superbowl XL, The Game View next topic eddie_baby The Geek Next Door Location: between alpha and omega Posted: Mon Feb 06, 2006 9:15 am I saw it as a very ugly game with some really questionable calls by the officials. I watched the Steelers #53 jump offsides twice in a row without a call. The Seahawks touchdown was taken away without a review (the ball crossed the plane before he was out of bounds and he knocked over the pylon). As a fan of the game, I hate to see bad calls. As a result of all the bad calls, the Seahawks started playing very poorly, and Hasselbeck got sloppy. Whenever a young quarterback starts trying to win the game for his team, you know its already over. Cowher had the good sense to keep the ball out of Rothlisbeger's hands, and go with the classic NFC North style of run to run out the clock. My vote for MVP, the Steelers fans who made a game in Detroit a home game. No one on the field deserved it. TH Defender of the faith since 1999. I'm not good with names, but the Steelers had the best play with the double reverse and pass for a touchdown. The guy that threw the ball did an awesome job, considering he's not a QB. eddie_baby wrote: I saw it as a very ugly game with some really questionable calls by the officials. Actually, the many people I've talked to were all in agreeance as this was one of the better Super Bowls of the recent past. The Seahawks touchdown was taken away without a review (the ball crossed the plane before he was out of bounds and he knocked over the pylon). As a fan of the game, I hate to see bad calls. The call was made because he never had possession in-bounds at that time. If he had, then there would have been a different result. It was a good call or else Holmgren would have been a little more insistent about it getting looked at. Any fan of the game hates to see bad calls, but we do need to realize that The Super Bowl is under so much scrutiny that it probably features the least amount of "bad calls" of any game during the season. As a result of all the bad calls, the Seahawks started playing very poorly, and Hasselbeck got sloppy. Whenever a young quarterback starts trying to win the game for his team, you know its already over. I completely disagree with this statement! To blame a few calls for the Seahawks not playing well is just not correct. Seattle battled through the entire game, but Pittsburgh's defense was just that much more battle-hardened. It wasn't the refs that demoralized the team, it was the Steeler D. Seattle took their shots but never landed that knock-out blow. As you're referring to a "young quarterback," just look at Big Ben! This is his second year! He ran when he had no other option and then took the game into his hands... look how he did! Hasselbeck tried to keep his team in the game mentally and that's what he's supposed to do!!! Cowher had the good sense to keep the ball out of Rothlisbeger's hands, and go with the classic NFC North style of run to run out the clock. "Stall Ball" is an NFL staple. I hate The Steelers and wanted them to lose... until I realized that I was going to win $350 if they won Snouffman Uber-Geek Location: An Evil Island Somewhere in the Carribean Steveness wrote: Anton Randel-El (I believe that's the correct spelling) was the passer on that play and was a good choice considering he played QB in college. The Yellow Dart Lifeless Reject Posted: Mon Feb 06, 2006 10:10 am Antwaan, but otherwise Matt got all the info right. It was a beautiful spiral! They've done that gimmick play before with Randle-El. It's the advantage of being able to convince a QB that he'll get to play with the team more if he moves to WR. They tried that with Kordell Stewart when they drafted him, with O'Donnell. Kordell wanted the ball too much so it didn't work. The fact that your #2 WR is a very capable QB gives you a lot of options when you need a gimmick play to throw the defense off their game. Note Randle-El is arguably the fastest guy on the team, possibly next to Willie Parker (Mr. 75 yd TD!). There was an argument over that TD pass, and I agree that had it been a closer call, Holmgren would have challenged it. He clearly stepped out on the wrong side of the pylon, and it was questionable whether or not he made the catch before stepping out. "If there is a God, and if I ever meet him, I'm just going to kick him in the balls over and over." - Penny Arcade "Laura, it was nice boozin with your UD friends. I'll happily share another blowjob with them anytime." - Christi bigsado Mistress E Location: planet earth (most days anyhow) the TD pass for the seahawks def went out of bounds. he did not have posession til he was out and he knocked over the pylon from the outside. -Boss of Things That Go "Bump" in the Night, Elisa Amy Levin "I can't believe i gave my panties to a geek" -MR the game was not that good offensively. Sure, both defenses came and played, but nothing stellar. Name one stand-out defender. Seattle shot themselves in the foot with three holding penalties to stop three different drives in the first half. Both quarterbacks never really seemed to calm down effectively as passes were overthrown, erratic, or nearly intercepted(underthrown). Seattle's punting was horrendous, every ball for touchback and when they did have an opportunity to down at the 1 yard line, the seahawk was already in the endzone. Cowher did much better at coaching than holmgren, he recognized big ben was not in complete control, so he went to running more and a few big trick plays. And, one or two brilliant pass plays by Ben, one that should have been intercepted instead of putting the steelers on the 3 yard line, do not counter his poor play. Holmgren was upset about big ben's touchdown, too close to call. but the officials did a poor job in calling a tighter game(jackson's pass interference would have been legal in regular season game) and hasselbeck's tackle after interception being a chop block penalty. WHO DID HE HIT? THE GUY WITH THE BALL, NOT HIS BLOCKER. so, what made it one of the better games in the past few years? The fact that the game was somewhat close through 3 quarters of play? ***edit*I will admit, that Pittsburgh, as a team, played better than Seattle, as a team. *** High_Lord_Galen wrote: Yes... the fact that the game was close actually DOES make it watchable. While Team A blows out Team B is fun for the fans of Team A, the rest of the country gets bored. Last year, speaking as a die-hard Eagles fan, it was close, but the score made it look a lot closer than it really was as New England completely outclassed The Eagles on every facet of the game. The Super Bowl before last year (XXXVIII) was a great game coming down to a field-goal winning it at the wire by Vinatieri. Both Carolina and New England scored at-will in the 4th and it came down to a nail-biting conclusion. This one, however, looked pretty evenly matched going into half-time and still was close broaching the 4th quarter. There was no overwhelming "Pitt is running away with it" sentiment. SB 37 was a blow out as was 35. 34 was that game where the Titans literally lost the game by a foot when their receiver was tackled just shy of the winning touchdown to give Saint Louis the win. 36 was watching New England pull another rabbit out of the hat as they blew a 12 point lead at the half going into the final second of regulation when Vinatieri kicked THAT game-winner. So yes... this game was one of the best since at least 2000 in terms of evenly-matched teams putting on a good show. I'm looking forward to seeing them rematch in the regular season next year. If the schedule permits. The AFC North plays the NFC South next year, so there will not be a Regular Season rematch. Preseason? Close may be watchable, but BETTER? I need flashy, highlight reel plays to do that. I guess we just look for something different in our entertainment. I am glad you enjoyed the game. To be fair... I started REALLY watching the game when I realized I had a better than average shot of winning a few hundred bucks. That could explain my rapt attention at the end of the game while screaming at the TV to "shut those f*cking Seahawks DOWN!" Should have been yelling at the refs then, they were running the game.
cc/2020-05/en_middle_0097.json.gz/line1418327
__label__cc
0.678551
0.321449
PAF: Interview with Gini Koch + giveaway! Today's guest is new to the blog: the wonderful Gini Koch. I really enjoy her books and I'm quite excited to see what she has in store for us in ALIEN DIPLOMACY, the fifth book in her Alien series, which is being released today. (Happy book birthday!) Keep reading to learn all about Gini's Alien series and enter to win a copy of ALIEN DEMOCRACY! Hi, Gini, and welcome to Tynga’s Reviews! We’re so happy you’re able to participate in Paranormal April Fools’. Thanks! It’s great to be here! To start, can you tell us a little bit about your Alien series, for those of us who are new to your world? The Alien series follows Katherine “Kitty” Katt, the world’s best accidental badass, as she discovers first that the Roswell rumors are true, but with a twist -- the aliens are here to help us, and as a side benefit, they’re all gorgeous. She then learns that the world isn’t like what she though it was, but that’s okay, because Kitty’s nothing if not adaptable. Kitty first get involved protecting herself and her world from evil parasitic superbeings from outer space. As the series goes on, she discovers more plots and conspiracies -- both internal and extremely external -- to foil and disrupt. From alien invaders to insane politicians and everything in between, Kitty’s always ready with a quirky worldview, sly sense of humor, a well-stocked iPod, her mom’s extra Glock, and all the extra-hold hairspray a girl could need. f you only had 10 words to tease ALIEN DIPLOMACY, what would you say? See Kitty in Washington. See Kitty and Washington not mix. ALIEN DIPLOMACY is the fifth book in the series. Did anything about it surprise you while you were writing? I’m continually surprised, because I’m an extreme linear writer. I start with the title, and the first line, and go from there. There were plenty of things that surprised me with Alien Diplomacy, not the least of which being who the real Big Bad of the book is. Who would you cast as your main characters if the series was adapted for TV or the big screen? This is a hard question, for a variety of reasons, the biggest being I like readers to see the characters in their minds, to decide for themselves just who they think Martini or Kitty or Christopher look like. However, I can’t pretend I don’t think about it, either. ;-D My business answer is: whoever could open the movie/TV show well, have the right on-screen chemistry, and ensure the movie had legs or the show went at least 5-7 seasons. The answer you WANT, however, is, as of right now (versus who I said, say, a few months ago or who I‘ll say a few months from now): Martini - Chris Hemsworth (aka Thor) Kitty - Emma Stone Christopher - Chris Pine Reader - Matt Bomer (who stars in White Collar and is, frankly, THE perfect embodiment of Reader) Gower - D.B. Woodside Tim - Joseph Gordon-Levitt Claudia - Jessica Alba Lorraine - Scarlett Johannson Chuckie - Joel McHale These answers are always subject to change, other than Matt Bomer as Reader, because he is literally perfect. Will we see more of Kitty and Jeff in the future? Can you give us any exclusive tidbits about what’s to come in the series? Yes. I’m working on Book 6, Alien vs. Alien, right now, which is out December 2012, and Books 7 & 8, Alien in the House and Alien Collective, are coming in 2013. As for exclusive tidbits, well, I live spoiler free. But not teaser free. Things will keep on changing for everyone’s favorite inter-species couple. And they won’t always change in a good way. The question of Paraguay and what’s really going on there gets answered, but the answer doesn’t necessarily mean good things for the world in general and our team of heroes in particular. Oh, and there’s a new Alpha Four animal in town that’s going to give the Poofs some competition for Kitty’s affections. (Though nothing can compete with the Poofs in terms of adorableness.) And now I have a couple April Fools’-related questions: Is there a trick you fall for every time? The hubs tends to be able to fake me out with “news” that isn’t real. It’s gotten so I don’t believe anything he tells me at first blush. Meaning he’s telling the truth, of course. And then the moment I figure he’s stopped and believe the NEXT story… How would Kitty and Jeff react to being pranked? By laughing. And then getting even. In a big way. Hey, it’s how they roll. Thanks for participating in our Paranormal April Fools’ event, Gini! It’s been lovely and I can’t wait to see what Kitty and Jeff get up to next. =) Want to know more about ALIEN DIPLOMACY? Here you go! Being newlyweds and new parents is challenging enough. But Jeff and Kitty Martini are also giving up their roles as super-being exterminators and Commanders in Centaurion Division while mastering the political landscape as the new heads of Centaurion's Diplomatic Corps. Enter a shadowy assassination plot and a new set of anti-alien conspirators, and nothing will ever be the same... And here's the rest of the series: We have two (2) copies of ALIEN DIPLOMACY for our readers, thanks to the generosity of Penguin! To enter the giveaway, fill out the Rafflecopter form below. Ends Sunday, April 15, 2012 (like all of our Paranormal April Fools’ giveaways) Gini Koch lives in Hell’s Orientation Area (aka Phoenix, AZ), works her butt off (sadly, not literally) by day, and writes by night with the rest of the beautiful people. She writes the fast, fresh and funny Alien/Katherine “Kitty” Katt series for DAW Books and the Martian Alliance Chronicles series for Musa Publishing. She also writes under a variety of pen names (including G.J. Koch, Anita Ensal, Jemma Chase, A.E. Stanton, and J.C. Koch), listens to rock music 24/7, and is a proud comics geek-girl willing to discuss at any time why Wolverine is the best superhero ever (even if Deadpool does get all the best lines). She speaks frequently on what it takes to become a successful author and other aspects of writing and the publishing business. She can be reached through her website. Posted by jenn at 06:00 Alien, Gini Koch, giveaway, Interview, Paranormal April Fools', Penguin 38 People left their mark Born and raised in the Toronto area, Jenn moved to St. John's, Newfoundland, eight years ago for school. She's still in school (thankfully on another degree!), now trapped in her dissertation. When she's not dissertating, which happens more often than it should, Jenn spends her time reading, watching movies, playing volleyball, travelling, and enjoying the local music scene. Her latest addictions: yoga and Almond Crunch cereal. Rebe 3 April 2012 at 11:29 My favorite tv show about aliens was 3rd Rock from the Sun. I LOVED Mork & Mindy when I was a kid, but now it seems very, very dated. Kinda like me, lol... SandyG265 3 April 2012 at 11:42 My favorite when I was a kid was My Favorite Martian. Victoria 3 April 2012 at 12:30 I'm going with The X-Files. I loved that show. Jessica ( frellathon ) 3 April 2012 at 12:31 Okay my comment just up and disappeared on me while typing. Ugh Alf and Alien Nation come to mine is what I wanted to say and I love your blog I'd love for you to join in on a book tour for a fantasy book some publisher friends of mine are having I think you'd be a great fit. Let me know if interested and I can send you some details. frellathon(at)gmail(dot)com My favorite tv show about aliens is also 3rd Rock from the Sun. Kristy 3 April 2012 at 13:44 3rd Rock from the Sun is my favorite, but Futurama comes in a close second. Hi, Great interview!! I have mad crazy love for this series, so this is actually my favorite series of books about aliens!! Love Gini's style of writing. Hoping Chuckie will get his HEA!! Have a great day!! Can't wait to read this book. And also that the series continues. Mariann at Belle's Book Bag Brenda Hyde 3 April 2012 at 18:34 Falling Skies on TNT-- it's only been on one season but I love it. I had to check, but it didn't get cancelled and is suppose to come back this summer! Thanks for the character matches Gini-- I hadn't pictured Chris Hemsworth as Martini but I'll take cause damn, he's hot. Barbara E. 3 April 2012 at 19:40 My favorite book (or rather books) about aliens is definitely Gini Koch's Alien series, I've absolutely adored all four of the books out so far and I can't wait to read Alien Diplomacy. Television shows - I enjoyed all the Star Trek series, Farscape, and Babylon 5 - love me some aliens. NoraA 3 April 2012 at 19:57 Yes I got caught this week. I follow an online comic whose author/artist has dropped off the map, leaving us hanging for almost 2 years. Yesterday another artist posted an update of that comic and said that the artist had been missing and according to the police presumed dead. She went through a whole song and dance that sounded extremely plausible, and then at the very bottom there was a short link, which when clicked said GOTCHA!... so yeah, I got caught. LOL Mare/TommyGirl 3 April 2012 at 21:22 It could be so bad, but I used to love Roswell a lot. Farscape is good stuff too. I love Gena Showalter's Alien Huntress series. The heroes are hot and the women sure know how to kick butt :-) Bethany C. 3 April 2012 at 21:40 Definitely loved the X-files. Barb P 3 April 2012 at 22:13 There are soooo many! How about Men In Black or E.T.! Love the Alien series! Thanks for the wonderful giveaway! Aurian 4 April 2012 at 01:58 Thanks for the great interview Gini, I am so looking forward to the next books. And two next year as well, yeah! Krista 4 April 2012 at 03:15 The V, loved it the first time, can't believe they canceled it! Nice review! Awesome Interview, I loved the aliens show. I'll have to add this. Susan 4 April 2012 at 07:31 Roswell was my favorite tv show about aliens. Thanks for the giveaway. Anne 4 April 2012 at 08:01 X-Files and Farscape. I was also a fan of Roswell and the first V when I was younger. Tore923 4 April 2012 at 10:45 I love Falling Skies. I can't wait until the season starts up again. I also liked the original V rissatoo 4 April 2012 at 14:08 I've loved so many alien books/movies/tv shows! How could you try to make me choose? I will admit that I'm a new big fan of THIS series in particular... I picked up the first book at the library just over a week ago. Enjoyed it so much I had to break the budget and buy the next two! Just waiting for payday for Proliferation... and crossing my fingers I win Diplomacy. :) Some other titles that come to mind: ET; Star Trek; Star Wars; The X Files; Mork & Mindy; Alien; Enemy Mine; Men in Black; ...and so many more! I think I like aliens! :) SacredmOOn 4 April 2012 at 15:03 The X Files is by far my favorite for TV/Series. I also loved Men in Black for a movie aliens. :) DeAnna Schultz Natasha 4 April 2012 at 15:14 The X Files. Squenn 4 April 2012 at 19:15 I love, love, love gini's books!! Pamk 5 April 2012 at 00:00 I believe it was called Alien Nation and my other favorites was V and Men in black totally campy by totally fun. bn100 5 April 2012 at 02:44 Sariah 5 April 2012 at 12:28 I would have to say Men in Black and Independence Day. Apparently Will Smith must be on the brain. Lol! I haven't read this series but they sound like a really great read!! Thanks for the chance. JenM 6 April 2012 at 14:32 I loved the original Alien movie, even though I don't usually like horror. Sigourney Weaver was so kick-ass in it. ML 8 April 2012 at 21:05 I haven't really read much in the way of alien literature. For TV/Movies my favorites are definitely X-Files, Men in Black, and Independence Day. Melissa (Books and Things) 10 April 2012 at 17:17 I'm a nerd... if it's sci fi I will watch it. I've loved Star Wars, Star Trek, Farscape, oh and so many more... Samantha R. 13 April 2012 at 11:33 I loved Roswell, though it got kind of tired during the second season. Star Trek in all its versions alicia marie 13 April 2012 at 20:41 i always liked the x-files and roswell. i can't think of any alien things i've seen recently. Julie@My5monkeys 14 April 2012 at 19:37 X files and futurama are also loved Roswell too . I also love MIB and and star trek. OMG Love Matt Bomer as reader ...nods head in agreement and love the chris Pine as christopher :) Natalia J 15 April 2012 at 16:43 For me it's Doctor Who, X-files,Rosewell and Firefly. I am so far reading the first book of the Kitty series and I love it. Great interview loved it. Vicki B. 15 April 2012 at 19:53 Although I like almost all alien series (hey it's a fun topic) I think my favorite is 3rd Rock From The Sun, followed by My Favorite Martian, which I watched in college on reruns rather than studying. thekrazikat 16 April 2012 at 23:06 You are awesome Gini! julieanderson 2 November 2012 at 07:57 Lovely interview nice conversation!You really rock.Good about the way you have given the interview! The long awaited Lily-Ann is now here + Stacking t... Random Act of Kindness: May Edition Deadlocked by Charlaine Harris Shaedes of Gray by Amanda Bonilla Bitterblue by Kristin Cashore Wicked Road to Hell by Juliana Stone Daring You To Read… Mind Games by Carolyn Crane Julie Kagawa on The Immortal Rules + giveaway! The Immortal Rules by Julie Kagawa (Double Review)... "When I'm not writing" with Ada Adams + giveaway! ReVamped by Ada Adams Women of the Otherworld mini-challenge! Darkness Rising by Keri Arthur The Goddess Test by Aimée Carter The Immortal Rules trailers Illuminate by Aimee Agresti Daring You To Read...Stormwalker by Allyson James Giveaway: Deadly Descendant by Jenna Black Croak by Gina Damico "When I'm not writing" with Lois D. Brown + giveaw... Stolen by Kelley Armstrong Tons of books for less than 5$ on Book Depository!... Giveaway: Royal Street by Suzanne Johnson Royal Street by Suzanne Johnson Insurgent Animated Cover! The Doomsday Vault by Steven Harper Last chance to enter the Paranormal April Fools' g... Fan made Insurgent Cover Book Depository is doing it again! 10% Discount on... Above by Leah Bobet Daring You to Read… Blood Bound by Rachel Vincent Blood on the Bayou by Stacey Jay PAF: Interview with Jeaniene Frost + Giveaway! Daughter of the Centaurs by Kate Klimo PAF: Interview with Stacia Kane + giveaway! Sacrificial Magic by Stacia Kane PAF: Interview with Kevin Hearne + giveaway! Tricked by Kevin Hearne PAF: Story by Theresa Meyers + giveaway! Firelight by Kristen Callihan PAF: Interview with C.C. Hunter + giveaway! Daring You To Read… Guilty Pleasures Laurell K. Ha... PAF: Story by Christina Henry + giveaway! Black Howl by Christina Henry PAF: Story by Cassi Carver + giveaway! Slayer’s Kiss by Cassi Carver PAF: Interview with Holly Black + Giveaway! Working Stiff by Rachel Caine In Our Mailboxes + Baby update
cc/2020-05/en_middle_0097.json.gz/line1418336
__label__cc
0.744538
0.255462
Why inequality of opportunity matters? Everyone is born equal. Really? If that is the case, there won't be any need of one of the crucial functions of state, i.e., welfare. Despite infinite attempts by state to reduce inequality, we can witness a huge gap between the haves and have-nots. The problem lies in the fact that, our policy makers always try to treat the symptom, that is, inequality of outcomes, instead of focusing on the cause,i.e., inequality of opportunity. Opportunity can be defined as the accessibility to something. Is inequality inherently bad? Probably not so, the inequality that emerges because of the different choices and varying degree of ‘effort’ (assuming same circumstances) is fine. But what happens when a person’s potential to succeed in life is simply determined by the lottery of birth? It is the Inequality of Opportunity which emerges because of factors over which we have little or no control, i.e., ‘circumstances’. To simplify, equality of opportunity means ‘levelling the playing field’, ‘giving everybody an equal start’ and ‘making the most of inherent talents. विरासत में मिली कुर्सी पे राज करते हैं फिर भी खुद पे नाज करते हैं। Of course, our outcomes do reflect our own efforts and decisions. But other people’s efforts and decisions also play an important role, and we have little control over these. The outcome of future of a child reflects entirely the efforts and decisions of his parents, but again he has no choice in determining his parents. Which caste he is in, what are his limits, which school he will go, what food will he eat, what should be his occupation, what facilities he will get, when and whom to marry- the family has a major say. In later stage of life, other people’s actions also start to affect the choices and efforts that a person makes – their teachers and their classmates. Because he doesn’t select teachers or classmates, the choices and efforts of that person again gets constricted. An illustration of inequality of opportunity We are increasingly becoming obsessed with the outcomes or merit in a person's life, while equality of opportunity is persistently at the back seat. One such example is the advantage enjoyed by a certain section of society by getting education in English medium. Majority of students receive their study in vernacular medium. And once they are forced to adopt English as part of a compulsory paper in some of the most competitive exams (SSC, UPSC), they are thrown out of the competition without giving due attention to the opportunity they received in their education. Their communication skills in English is most likely to be poorer than the students who got quality education with special emphasis on "English". This is evident from the fact that more than 70% students selected in white collar jobs are from English medium. And it seems like, English has become a symbol of superior civilization. Another example is the compulsory paper of "computer typing" in most of the Group 'D' clerical examinations. How the people from rural background, who haven't ever seen, how the computer functions, are expected to compete with chitty chatty urban youth. I m neither against English language nor against usage of computer technology in the present world, as both are becoming the essential tools to compete in the global world. I m just in favor of parity and equality in terms of opportunity. The foundation of an individual is built in his school, the quality of education he receives there. And unfortunately, here money carries more weight over merit. Because only rich people can afford the schools of better exposure with an opportunity of all round personality development. Is there really a point of putting competitive examination like IIT, PMT after 12th class, by the time a gap based on financial differentiation is already created? Why can there be no competitive exam for entering into a school itself without fees barrier, which might have the potential to create level playing field from the beginning and goes with the principle of merit in pure? Is reservation the solution? 60 decades of history of reservation couldn't change the picture very much, shows the inherent flaw of the policy. Reservation might send someone at a place which he might not deserve on purely merit criteria as an obligation of representation. This is evident in the dropping out of nearly 90% SC/ST of the total in IIT Roorkee last year because of the excess academic stress. The problem again lies in the approach of addressing the outcome not the opportunity. As an analogy, if a person is made to run in race but he starts 5 m behind, it is likely that he will be behind 5 m throughout the journey, unless he puts extra ordinary efforts. Though inequality in all conditions boils down to the financial capacity of a person, (in Indian case caste, religion might be the other factors). It seems like money has overshadowed all the other things, like talent. The only solution I can think of right now to remove inequality of opportunity is "equal quality of education at equal cost" so that the future of nation can be safeguarded. As far as means are concerned, this humongous task cannot be left to Government only. Other people need to come to help others by creating opportunity. This will be the sustainable redistribution of skewed opportunities. Unless we are not ensuring equality of opportunity, we might be losing brilliant minds such as APJ Kalam in the distant villages devoid of opportunity. at January 17, 2016 1 comment:
cc/2020-05/en_middle_0097.json.gz/line1418339
__label__wiki
0.572753
0.572753
Join with Email or Sign In Come to a Women for Indy Event Guides for Local Groups National Committee 2018-20 Standing for the WfI National Committee FAQ Work for WFI Women for Independence Increasing Women's Representation On Public Boards Posted by Women for Independence Women for Independence July 25, 2017 1:54 PM Elizabeth Young CA CMIIA is a chartered accountant and chartered internal auditor. She works predominantly with public sector bodies advising them on governance, risk management and internal control. She is a member of ICAS Audit and Assurance Panel and the Institute of Internal Audit’s Scotland Committee. In 2016, she was named one of the ‘Top 35 CA’s Under 35’ by ICAS and in 2015, she was named one of the Top 25 Rising Star Professional Advisors by Charity Finance Magazine. The Scottish Government's new proposals to increase women's representation on public boards are currently out for consultation. The "Gender Representation on Public Boards (Scotland) Bill" takes the current, voluntary measures a stage further by requiring public boards to set a ‘gender representation objective’ to have 50% of non-executive members who are women. Non-executive directors (“NEDs”) are individuals appointed to the boards of public bodies with responsibility for ensuring the effective governance and financial management of that public body. The Bill also includes some specific requirements for new board appointments, namely that the following process should be adhered to: • Candidates should be assessed to determine whether any particular candidate is best qualified. • Where no particular candidate is considered best qualified, preference should be given to candidates who are women, amongst equally qualified candidates, where that will help the Board achieve its 'gender representation objective'. • Where a person who is not a women is appointed, this must be justified on the basis of a characteristic or situation particular to that candidate. Public bodies will also be required to encourage applications by women, take whatever steps are necessary to achieve the objective and to report on the operation of the Act (there is currently no proposal surrounding the form that reporting would take or whether penalties would be applied for non-compliance - this is subject to further consultation). The Gender Representation Bill has been introduced in the context of the SNP Government's manifesto commitment to improving gender representation in public life and on the back of significant progress in key areas. Leading by example, the First Minister appointed a gender balanced cabinet and the voluntary measures enacted for public boards saw the overall percentage of women rise to an all-time historic high of 42% in 2015. However with 52% of the population comprised of women, a significant gap remains before we can truly claim equality of opportunity and representation. Gender balance also remains a key topic for politicians within the UK Government; the introduction of the Equality Act 2010 (Specific Duties and Public Authorities) Regulations 2017 will see the introduction of new Gender Pay Gap Reporting. The Act requires employers with 250 or more employees to publish statutory calculations every year showing how large the pay gap is between their male and female employees. In the public sector, public bodies already have reporting responsibilities on equality which has complicated the legislative landscape, however the Scottish Government has committed to requiring all public authorities with more than 20 employees to publish their pay gap every two years and an equal pay statement every four years. The combination of a concerted drive towards gender balance in the leadership of public bodies and reporting on gender balance throughout their workforces should help to retain a focus in this area until significant progress is made. The additional measures included in the Bill may also help to tackle some of the more endemic problems in achieving better Board diversity. For example, assuming that women are equally as qualified as men to act as NEDs, the reason that fewer are appointed must be down to either a lower number of applications from women or an unconscious predisposition to see men as a 'better fit'. Therefore, the requirement for public bodies to actively encourage applications from women will require a change in public perception about what skills and characteristics a 'good' NED needs to have. This means a challenge for appointing bodies in stepping away from a traditional stereotype of a good NED, to critically examining the skills that are needed for an effective Board member as the different ways in which candidates may have acquired them. It also means potential applicants being encouraged to think differently about how their skills and experience may make them an effective NED. If we can crack that particular nut, it should also open the door to achieving more representative boards in other respects - such as age, race, disability, sexuality... There is a wealth of research to support the view that diverse boards make better decisions and so having diverse boards on public bodies should directly benefit us all. Women for Independence is encouraging all of its members with an interest in this area to engage with the consultation and make their views known. Do you serve on a public board? Have you ever applied to do so? Do you want to do so? Do you have an interest in ensuring the boards of public bodies represent the public they serve? If so...the consultation is available here - http://www.parliament.scot/parliamentarybusiness/CurrentCommittees/105434.aspx The consultation closes on Friday 31 August. Responses should address all or any of the following points in turn— • the impact, if any, on people applying for an appointment as a non-executive member of a public board; • the impact, if any, for those public authorities responsible for encouraging and recruiting women to public boards as non-executive members; • the Bill requires public boards to report on the operation of the Act, although Scottish Ministers can regulate how this should happen; what should any reporting requirements cover and why; • whether there should be penalties for non-compliance with the Bill and what these should be and why; So please make your views known and think of your own potential to become a NED. © 2014 CityZen & NationBuilder - Some rights reserved Copyright Women for Independence, 2015. All rights reserved. Created with NationBuilder - Theme by Tectonica The Women for Independence website uses cookies to improve your browsing experience. View our Privacy Policy
cc/2020-05/en_middle_0097.json.gz/line1418342
__label__wiki
0.578674
0.578674
Afghanistan era veterans Center gift fund Pay british beverage giant diageo British beverage giant diageo Msu veteran support center serves National Veteran Support is a Non Profit Organization with a focus on helping veterans and their surviving spouses access the Veterans Non Service-Connected Pension Benefit also known as Aid & Attendance. Box Lunches: Soldiers’ Angels provides box lunches for VA Hospital case workers. These lunches are designed to allow VA case workers the opportunity to provide a meal to homeless or low income veterans, who may not otherwise know where they will get their next meal. Box lunches are also distributed to homeless veterans at VA Stand Downs. The VA and the FDA are keeping veterans from a helpful treatment option, just because it’s marijuana The VA and the FDA Are Keeping Veterans from a Helpful Treatment Option, Just Because It’s Marijuana By Trevor Burrus This article appeared in the Washington Examiner on May 13, 2019.Beat Kitchen, Luxury Cakes, Batter and Berries among new Riverwalk vendors Here’s the Difference Between Memorial Day and Veterans Day · Don’t embarrass yourself: Know the difference between Memorial Day and Veterans Day. Don’t embarrass yourself: Know the difference between Memorial Day and Veterans Day. Breaking News. US;VA Loans in Skidmore Texas Texas Vet & VA Loan Specialist Shirley Mueller. Since 2003 Shirley has originated well over 1500 Texas Veteran and VA Loans. She has helped Veterans in almost every possible circumstance including active duty personnel deployed overseas, returning home, or with PCS orders.Read MoreOklahoma lawmakers launch state-wide veteran registry Its findings suggest that the. to Veterans Service Organizations (VSOs) to acquire and update blighted properties to provide housing for homeless veterans. Only five other states saw jumps in.Voices For Vets The "Voices of Veterans" program records the stories of Texas Veterans through their time in service and after returning home. The Oral History program seeks to record the stories of Texas V eterans and archive their stories in the texas general land Office while the Next Gen Warrior program provides inspiration and guidance for Iraq and afghanistan era veterans as they transition to.Scott Morrison announces new first-home buyer scheme Scott Morrison announces new first-home buyer scheme to help battlers secure a deposit – even if they don’t have the money. May 23, 2019. Coalition has promised first home buyers support to get a 20% house deposit . Scott Morrison announced the policy at the Liberal election campaign sunday. Instead, the idea of keeping it in the state’s possession and using it to support veterans’ programs and the Pennsylvania. Help Support Veterans veterans support center gift fund – When you give to the Veterans Support Center, you’re giving to those who have already given to our country. Our goal is to improve and enhance the success of student Veterans by creating a community, providing opportunities, and giving support for their educational dreams. Welcome to the Veterans Support Foundation, serving veterans of all services, conflicts, and eras.> Vijay Mallya settles for more time to pay up for London home – Times of India Couples encouraged to remortgage homes to fund IVF treatment We don't own an extravagant home or drive fancy cars.. In a nutshell, we were an average couple who didn't know how to save.. The small expense was really encouraging – maybe fertility treatments weren't going to. up for six rounds of IVF – and an $18,000, 9.99 percent interest loan to pay for it.Vermont VA hospital to host ‘Blessing of the Bikes’ U.S. may deploy more weapons to the Middle East · A map highlighting the island chain likely to be contested in a future war for maritime supremacy in the Western Pacific. Geography tends to work to China’s advantage, because of its location in.Kentucky WWII Veteran to Receive French Legion of Honor French consul general christophe lemoine spoke in French, pinned a Legion of Honor medal on an elderly Colorado veteran of the European Theater in World War II, and embraced the recipient. Lemoine.Hatchett to become Deal’s floor leader in House | Macon. – State Rep. Matt Hatchett, R-Dublin, has been tapped by gov. nathan deal to move the governor’s legislation through the state House of Representatives. Hatchett will be Deal’s floor leader.In another setback to Vijay Mallya, the UK High Court on Friday directed the embattled liquor tycoon to pay british beverage giant diageo over USD 135 million in relation to a collateral arrangement. Welcome to the online list of Directory of Veterans Service Organizations (PDF). This is published as an informational service by the Office of the Secretary of Veterans Affairs. Inclusion of an organization in the directory does not constitute approval or endorsement by VA or the United States. The msu veteran support center serves over 500 veterans, eligible dependents and members of the Selected Reserve who receive Department of Veterans. McIntyre brings decades of industry experience to her outreach role, connecting regularly with advisors in need of better. Veterans Benefits Administration provides financial and other forms of assistance to veterans and their dependents. This page provides links to benefit information and services. To learn more about our mission and to donate in support of our veterans, visit us at www.honorflightct.org! Fights will. To provide support and advocacy services for war time veterans, spouses and families from WWII, Korea, Vietnam, Gulf War and thru the current conflicts. We believe that all Veterans matter. Core to this mission are the following services for the forgotten veterans: Serve to educate the veteran community as to eligibility for benefits World War II veterans, families honored at the State Capitol for Armed Forces Day Advocates renew push for protecting troops from predatory lenders
cc/2020-05/en_middle_0097.json.gz/line1418352
__label__cc
0.598055
0.401945
Vegas Sports Odds VegasOddsOn.com NCAAF Big 12 Odds Vegas Odds On NCAA Big 12 Football 2015 It is no wonder the Big 12 Conference has its headquarters in Las Colinas, a suburb of Dallas, Texas, as 4 of the current 10 teams are located there. Texas universities Baylor, the University of Texas and Texas Tech University are charter members that joined when the conference came into existence in 1994, though Big 12 athletic competition did not begin until 1996. Texas Christian University joined in 2012, with Iowa State, the University of Kansas, Kansas State, Oklahoma and Oklahoma State, and West Virginia rounding out the current Big 12 Conference NCAA football participants. The conference was originally divided into North and South divisions, but that was absolved with the departure of Nebraska and Colorado in 2011. Also, they used to play a Big 12 Conference Championship game before the NCAA ruled that only conferences with 12 teams could do so. About Big 12 College Football College football is all about rivalries. Players move in and out every 2 to 4 years so the fans fall in love with the team, the team name, the mascot and the Stadium instead of individual athletes. And every year the Vegas Odds On Big 12 powerhouses like Texas, Texas Tech, Oklahoma, Oklahoma State and West Virginia always show them as top Big 12 conference teams. They are generally ranked somewhere in the top 25 of all NCAA Division I football programs in the preseason, throughout the NCAA regular season, and after postseason play has finished. And many of those top Big 12 teams play in some of the oldest and most heated college football rivalries in the nation. The Nebraska - Oklahoma contest annually was one of the most well-known and hotly contested rivalries in the history of college football, before the departure of Nebraska in 2011. Now the age-old Oklahoma - Oklahoma State game is the one that Sooners athletes mark down on their calendar. Appropriately named the Bedlam Series, these teams have been playing for the Bedlam Ball for 103 years. Vegas Odds on the Kansas - Kansas State Sunflower Showdown every year offer some great value for the smart NCAA bettor, and the Governor's Cup trophy has been awarded to the winning team in that matchup for 108 years. The oldest rivalry in the Big 12 Conference is the Baylor - TCU contest, played 107 times since 1899. Most of these rivalries predate the formation of the Big 12, but that doesn't mean that these hated rivals have buried the hatchet and have man crushes on each other. Every year the Baylor - TCU game, Kansas � Kansas State contest and the Oklahoma - Texas Red River Rivalry are some of the heaviest wagered NCAA football games all year long, reflecting the decades-old tension between the two teams involved. And as far as the 2012 season goes, many early preseason NCAA Football polls have the Oklahoma Sooners ranked as one of the Top 5 teams in the nation. And the Oklahoma State Cowboys, West Virginia Mountaineers, Texas Longhorns and the TCU Horned Frogs rank in the top 15 or 20 Division I teams as well. With no Big 12 Championship game to focus on, and several teams poised to make a run for the BCS Championship Game in 2014, Vegas Odds On Big 12 competition are already beginning to heat up. Bet On NCAA Big 12 Football 2015 There is a large number of websites out there claiming to give you the best sportsbook options. Some of them live up to that promise, many of them don't. One online sportsbook that is a sure bet is Bovada Sports. Launched in 2011 by the prestigious Bodog brand, Bovada was developed exclusively to cater to USA players, and they start out the pampering with a nice 50% match bonus up to $250 on your first deposit. We are more than pleased with their line up of sports events, betting lines, and wagering options, and we must admit they come up with some pretty sweet special and seasonal promotions to pad that bankroll just a little bit more. For a secure, exciting, and rewarding online gambling experience, you can trust Bovada. Visit Bovada Sportsbook. Use Visa to Bet on Big 12 Football! Looking for some exciting college football betting action without the typical funding hassles? Well Bovada is the new name of the game with their impressive credit card transaction approval record, USA players now have a reliable, secure, and user friendly credit card payment option! Bovada has secured an exceptional credit card processor for Visa, and I have to tell you, as a weekly depositor at Bovada, I have never experienced the first problem with using my Visa card. New players also get a nice 50% match bonus up to $250 on your first deposit, which sweetens the pot even more! Visit Bovada Sports book. Las Vegas Big 12 Football Betting Odds The following are the most current Las Vegas Odds on NCAA Big 12 football 2015 Latest News in College Football College Football Week 1 Wrap Up 9/5/12 The Top 2012 Heisman Trophy Candidates 9/2/12 MLB Wild Card Race Tightens and MI to Face BCS Champ AL 8/31/12 College Football Kicking Off 8/29/12 USC Football and the Tale of Two Managers 8/20/12 Chad Johnson and Honey Badger � Last Chance for Bad Boys of Football 8/14/12 What I Know - Olympic Games MLB Action and the Latest in Football 8/9/12 What I Know: Olympics Baseball and Football 8/3/12 Penn State Major League Baseball and Other Stuff 7/23/12 NBA MLB and Penn State 7/12/12 Vegas Odds On Football Vegas Odds On NFL Vegas Odds On Super Bowl Vegas Odds On NFL Playoffs Vegas Odds On NFL Draft NCAAF Football Odds Vegas Odds On NCAAF Vegas Odds On NCAAF National Championship NCAAF BCS Odds Vegas Odds On BCS Vegas Odds On Citrus Bowl Vegas Odds On Cotton Bowl Vegas Odds On Fiesta Bowl Vegas Odds On Orange Bowl Vegas Odds On Rose Bowl Vegas Odds On Sugar Bowl Vegas Odds On BCS Championship NCAAF Conference Odds Vegas Odds On NCAAF Conference Vegas Odds On NCAAF SEC Vegas Odds On NCAAF ACC Vegas Odds On NCAAF Pac 12 Vegas Odds On NCAAF Big Ten Vegas Odds On NCAAF Big 12 Vegas Odds On NCAAF Big East Bet Vegas Football Copyright © 2011 - 2015 VegasOddsOn.com
cc/2020-05/en_middle_0097.json.gz/line1418353
__label__wiki
0.65996
0.65996
ARKHEMINA Album Title: ARKHEMINA Records Catalog No.: DSDA-00001 Download from Official Site ARKHEMINA is a album composed by husband-and-wife duo Masamichi Seki and Minako Seki, the latter the composer of the Tales Drama CDs as well as Berwick Saga and Yazuka 4. The album draws heavily on classical influences from various eras of history in European music to create a series of pieces, each one named after a castle in Western Europe. Because each piece is representative of such a specific setting, the time period or composer represented is the result of a thematic choice. The resulting album is a beautiful array of classical-fusion pieces, blending with electronic effects or synth instruments that give the album a nouveau classique feel. “Mont Saint-Michel” represents the castle on the cover of ARKHEMINA, the famous fortified monastery on an island protected by shifting tides. The piece opens with lightly repeated piano notes in an echo-like effect and quickly increases in dramatics through liberal use of percussion and strings, along with a constant choir featuring male vocals that very faintly reflects the sounds of a monastery in the dark ages. The shift from piano to heavier percussion and vocals perhaps suggests the lowering of the tide, allowing access to the ancient monastery. A piccolo later joins the odd myriad of instruments, reflecting the occasional militant roles Saint-Michel has fulfilled over the course of the years. The choir continues ceaselessly adding its own layer to the piece, reminding the listener of the original monastic nature of the island. Finally, the piano takes over again, as the tide rises back up around the island and shuts off access to the ancient monetary. The castle of “Chateau d’Amboise” was inhabited by members of the Medici family during the Italian Renaissance Era, and is even the burial place for Leonardo da Vinci. One reference to the Renaissance time period of the castle is the frequent use of the guitar in the piece which alternates with strings, percussion, and a full choir’s worth of vocals. The choir is carefully arranged so no one voice stands out, and the instrumentation is carefully arranged so that the various lines of music are fluidly moving from forefront to background. “Chateau de Villandry,” based on a castle widely known for its grand-scale gardens, opens with an intricate piano pattern, followed by a chorus of vocals and strings. The piece becomes calmer and more relaxed with an extremely laid-back percussive beat and a solo trumpet playing an almost lounge-style melody crossed with the soundtrack of a nineties film. While the choir enters and leaves, bringing occasional moments of stronger solemnity, the piece is overall a casual one, perhaps reflecting a thoughtful stroll through the green Villandry gardens. Easily my favorite nod to the history and culture of the castles is in the tracks “Schloss Hohenschwangau” and “Schloss Neuschwanstein,” two German castles — almost Austrian in geography — with a particularly interesting connection to music history. King Ludwig II of then-Bovaria was a major patron of contemporary composer Richard Wagner, and additionally was an avid fan and friend. Such a huge fan, in fact, that he even had private showings of Wagner’s operas in his home of Hohenschwangau, a blocky, sprawling castle. Neuchwanstein, on the other hand, was later built as a sort of fantasy get-away for Ludwig (with Wagnerian elements in mind), and was later used as the iconic Sleeping Beauty castle in Disneyworld. Wagner was famous (or infamous?) for his strong belief in the use of a full orchestra, which included not only a full range of instruments but vocals and concert halls designed specifically for the acoustics of his own works. In turn, the two pieces are aptly constructed using a myriad of orchestral elements, from the archaic harpsichord to a single female using more current effects in order to emulate the echoes of a piece being sung in a stone hall. “Hohenschwangau” begins with a light series of strings with a few descending chords not entirely unlike small portions of the Wagner’s Tannhauser Overture. While Wagner is by no means my favorite classical composer, I loved the gentle nods made to both the composer and his flamboyant, artistically inclined patron. The piano that comes in after the initial strings is whimsical before the strings come back in, in the same manner as the beginning of the piece, but with more force, rising and falling dramatically with rippling piano and foundational brass. “Hohenshewangau” seems to be ending with the orchestral fanfare but suddenly breaks into a Renaissance-style motet with a beautiful mezzo-soprano and basso continuo harpsichord before the piano returns and ends the piece. “Neuschwanstein” is much more haunting and otherworldly, with harpsichord, female chorus, and pipes playing in a minor scalar pattern. Because of the strange collection of instruments mixed with electronics, “Neuschwanstein” sounds like a piece out of a fantasy movie; soon, heavier percussion jumps in and the strings begin a much more energetic pattern alongside a catchy — yet no less ethereal — melody. One thing that I particularly love about this piece is its conglomerate nature — the piece is constantly shifting styles, and each section sounds vaguely familiar, but moves on just before the listener has a chance to place the memory. ARKHEMINA is a wonderfully innovative album overall, with a refreshingly new approach to thematic arrangement and orchestration. If relatively small portions of the tracks border on kitschy every once in a while with synth pianos or added audio effects, the majority of the album is rich and beautiful. Particularly along with a guide to, or at least pictures of, each of the castles, the pieces are extremely fun to listen to and combine elements of a hugely diverse series of musical styles to create a fantastic thematic album. ARKHEMINA Emily McMillan Do you agree with the review and score? Let us know in the comments below! Posted on April 1, 2015 by Emily McMillan. Last modified on April 1, 2015. Tags: Arkhemina, Electronic, Minako Seki, Orchestral, Original Album, Vocals Emily McMillan A native and lifelong Texan, I currently work in software education while contributing news, reviews, and interviews to VGMO on the side. I love the feeling that comes with the discovery of a brand new soundtrack, and always look forward to the next rekindling of that excitement. Outside of VGMO, I enjoy playing piano, listening to classical music and film scores, and trying to go unnoticed in any stealth RPG I can find. G.O.D. -Guitarists on Demand- III → The Witch and the Hundred Knight 2 Arrange Soundtrack → Atsushi Shirakawa (aka TENMON) Interview: Voice of a Distant Star → Hiroki Kikuta releases prog rock and jazz fusion mini-albums → One Response to ARKHEMINA Chris Greening says: Great review and very informative. Love how you combined considerations of the music and visuals here.
cc/2020-05/en_middle_0097.json.gz/line1418355
__label__cc
0.74753
0.25247
Facebook Instagram Shopping-cart Schedule a Free WHO ARE THE EVOLUTIONISTS? ABOUT MELVIN HART Copaiba Oil Individual Session Immersive Retreats THE EVOLUTIONIST "Melvin is a personal trainer for your soul!" ~ Jay Melvin is a personal trainer for your soul! I started working with him via one-on-one Skype sessions after some questions arose for me around integration of my plant medicine experiences. I have found these sessions to be exceptionally powerful and helpful for my personal growth. Not only is Melvin deeply knowledgeable and experienced in navigating many levels of experience – from the physical body to spiritual or non ordinary realities – he also provides very grounded and practical tips and tools to help work with and integrate them. With precision, intuition, a sense of relaxed companionship, and humor, Melvin always offered thoughtful and bespoke support and guidance. He’s a spiritual ninja – I can’t recommend him enough for anyone interested in their own full-spectrum wellness, or simply curious about the path of self discovery. "I had a life-changing experience over the course of the 10 day dieta, and much of what I was able to receive was with the help of Melvin’s advice." ~ Rebecca I decided to work with Melvin to help prepare for my 2nd dieta in the Amazon. I’ve worked with the medicine before and felt like I knew enough to safely move through my experience, but had a particular worry that I thought he could address. When we first spoke, he covered my concern but also prepared me with a number of tools and practices. That preparation turned out to be invaluable. I had a life-changing experience over the course of the 10 day dieta, and much of what I was able to receive was with the help of Melvin’s advice. He had practical, specific recommendations that were easy to implement and served as a roadmap for how to navigate the tricky terrain of 5 ceremonies with 20 other travellers. Regardless of whether you’re new to ceremony or have had extensive experience, you will find that speaking with Melvin will help you get the most learning from your work with the medicine. "I highly recommend Mel's work to anyone who is looking to heal any and all aspects of themselves. " ~Jamie I first started working with Mel in 2014. I originally reached out to Mel for a massage because I was dealing with chronic back pain for years. I had previously gone through months of physical therapy and worked with a few other massage therapists in attempt to get rid of the pain but nothing really helped – the pain always wound up coming back. After my first session with Mel, I was in shock because I had received way more than just a regular massage. During our session, Mel was talking to me about specific past traumas and emotional wounds that needed to be addressed in order for me to permanently heal my back pain. Although I didn’t understand, at the time, exactly how to go about doing that, or what my emotions had to do with my physical pain, I did feel a deep sense of trust and safety while working with him. Over the next few months, I consistently received body work from Mel once or twice per week. During our sessions, Mel had not only given me the best massages that I had ever received, but he also listened to me and the needs of my body. Through our sessions, I began developing an understanding of the connection of my body to my mind and my emotions, and became more and more interested in ways in which I could better myself in all aspects. Overtime, Mel helped me to: recognize the patterns and habits in my life that needed to be adjusted, become more mindful of how I treat my body (through nutrition, movement, sleeping patterns, etc), and build an awareness of the choices I make and and how they affect the outcome of events in my life. Over the past three years, I have also had the privilege of having Mel facilitate multiple plant medicine ceremonies for me. While working with Mel in ceremony, I have always felt very safe and cared for. Through his use of the medicine paired with aromatherapy, light therapy, sound therapy, and touch, Mel has helped me heal tremendously in my ceremonies and has supported me through the process of reintegrating the medicine work into my everyday life. I highly recommend Mel’s work to anyone who is looking to heal any and all aspects of themselves. I trust that with his knowledge and wisdom, Mel has the ability to help others (just as he has helped me) remove obstacles and illusions in their own lives in order to become the best versions of themselves. "Mel has helped me with all kinds of healing, from functional movements and strength, to massage and energy work, to natural supplements and nutrition." ~ Donna There is so much to say about Mel, that’s it’s hard to know where to start. Initially, we met after I had knee surgery. I had been through the fully-prescribed course of physical therapy – and then some – but still had trouble moving and rehabilitating my leg. Mel approached me in my gym to ask why I was lifting such light weight because, he said, I looked stronger than that. I told him I couldn’t get the muscle back in my leg no matter I did. It felt weak, still, two years later. He asked if he could touch the muscles above my knee. Immediately, when he felt it, he said, “Right there, that’s the problem.” I was really surprised because it was exactly the spot on my leg that felt “stuck” and that was preventing me from moving normally. This by the way was after I’d gone to 5 different orthopedic surgeons, including the one who performed the surgery. Mel was the only one to figure it out, and the only one who was able to bring my leg back. Since then, Mel has helped me with all kinds of healing, from functional movements and strength, to massage and energy work, to natural supplements and nutrition. He is a gifted healer with more technical knowledge than any doctor I’ve seen. Combine that with his natural instincts and deep, heartfelt desire to help, and you have a highly exceptional, extremely rare practitioner. "From the tobacco ceremony, lessons on Abhyanga, and the body work Melvin did on me, I could literally feel my body healing, releasing the toxins and energies that had been within me for so long" ~Princess I had the fortunate opportunity to work with Melvin and his crew in Huaraz Peru. The experience was life changing and one I will never forget. Melvin’s advice on how to handle the medicine was so perfect. I felt well prepared on what to expect during ceremony. The Ayahuasca ceremony was life transforming. Everything down to the smallest detail was carefully thought of. At one point when someone was having an adverse experience to the Aya, Melvin and his team jumped right in, healed the situation, and rebalanced the energy of the room with ease and swiftness. From the tobacco ceremony, lessons on Abhyanga, and the body work Melvin did on me, I could literally feel my body healing, releasing the toxins and energies that had been within me for so long. I left the retreat happier and lighter with a new understanding on the truths of My Existence and All That Is. In addition to Ayahuasca, I had the opportunity to participate in a Huachuma ceremony, which was one of the most potent brews I have ever had. Melvin is truly masterful at his craft of brewing. I appreciate his knowledge & experience, and will definitely continue the medicine work with him. "Melvin is a first rate shaman and excellent body worker." ~ Pavielle Melvin is a first rate shaman and excellent body worker. He is a natural born healer and empath. His intuition is second to none, seek him out if you are fortunate enough to have him in your town! "I owe one of the most transformational events of my life to The Evolutionist, aka Mr. Melvin Hart." ~ Jeremy I owe one of the most transformational events of my life to The Evolutionist, aka Mr. Melvin Hart. I can scarcely put into words the incredible gift that Melvin possesses and just how fortunate I feel to have taken part in one of his guided journeys. I learned more about myself and the true nature of reality in one weekend that I had in the last 20 years since graduating college. I gained a much needed appreciation for living in the moment that will serve me for the rest of my days. Most importantly a unique bond was forged amongst all the participants thanks to the transcendent experience Melvin so carefully crafted and skillfully delivered. Likewise it was comforting and enlightening to hear each person’s unique insights on each day’s events during our “fireside” debriefs. Even though 6 months has passed since that journey, I gain more gratitude for my experience each and every day. I cannot say enough good things about the beauty and integrity of Melvin’s mission on this Earthly plane. I look forward to the next time I am fortunate enough to cross paths with you sir. "Melvin's clairvoyance pinpointed the exact areas of my body where these issues manifested as negative energy in the form of knots." ~ Fitz It is my good karma to have had the privilege of Melvin and his team facilitating my first Ayahuasca ceremony in Peru. All aspects of our retreat were meticulously customized, conceived, and executed. Although there was a cloud of uncertainty leading to the first cup, I was comforted and empowered by Melvin’s sound advice. All of our scientific and spiritual questions were elaborately answered which reveled his deep experience and knowledge in his practice of alchemy and spirituality. Dosages of each cup were determined by pre-ceremony screening and metaphysical intuition. During ceremony, Melvin and his assistants were readily available to help with purging and counseling when necessary. It was always a comforting encounter, when Melvin would personally check in during our journeys. One of my favorite meaningful experiences was sharing details of our journeys in group circle in between ceremonies. His philosophical and spiritual insights were beneficial to us all as they shed light as an enlightening tool to help with the clearing of obstacles to our own self-healing. To further vouch for Melvin as my facilitator, Pacha Mama even revealed to me explicitly that I am to trust him to continue future journeys. During both my high and low and points, his presence was always angelic After the completion of our Ayahuasca ceremonies, I booked a private energy healing session with him. Without revealing any of my personal issues, Melvin’s clairvoyance pinpointed the exact areas of my body where these issues manifested as negative energy in the form of knots. This was validated when discomfort was felt after he applied very light pressure. He then proceeded to heal these areas through meditative channeling and hand work. Without inaccuracy, he expressed the roots of my imbalances and made the proper recommendations to release the tensions which I eventually executed as part of the self-healing process. The session left me feeling encouraged, lighter, and clearer. I absolutely respect and love Melvin as a facilitator, space holder, and friend and wouldn’t recommend anyone else that is interested in their first Ayahuasca Ceremony and Energy Healing Session. You could not be in better hands. Thanks Melvin for being you! a testimonial Full System Reboot 4 Hour Immersion 11/24 Full System Reboot: Discover the 5 Most Effective Tools for a Healthier Lifestyle Sat, November 24, 2018 2:30 PM – 6:30 PM Singapore Standard Time Copyright © 2020 The Evolutionist Web design by EYEBRANDIT
cc/2020-05/en_middle_0097.json.gz/line1418360
__label__wiki
0.684312
0.684312
Home / captaineo / Lists / 10 Things You Probably Didn't Know About CAPTAIN EO 10 Things You Probably Didn't Know About CAPTAIN EO Nigel G Mitchell 1/07/2014 06:00:00 PM captaineo, Lists In 1986, Michael Jackson appeared in the 4-D Disney ride, Captain EO. Captain EO was a groundbreaking production at the time with 3-D effects, lasers and smoke in the theater, and a starfield on the walls made from fiber optic cables. The short film has become a legend in pop culture and Disney lore. Here's a few interesting facts most people don't know about the production. 1. Michael Jackson wanted either George Lucas or Steven Spielberg to produce the movie. Spielberg declined because he was working on The Color Purple, but Lucas agreed to produce. 2. Lucas recommended Francis Ford Coppola to direct, because Coppola needed work after his career suffered a setback with two box office bombs, Rumblefish and The Cotton Club. 3. The movie was named by Francis Ford Coppola. "EO" comes from the Greek goddess of the dawn, Eos. 4. At an estimated budget of over seventeen million, Captain EO cost over a million dollars a minute, making it one of the most expensive short films ever made. 5. The week of Captain EO's release, the National Enquirer published the now infamous photo of Michael Jackson sleeping in a hyperbaric chamber. Jackson leaked the photo himself to build up attention for the ride. 6. To portray the Supreme Leader, Anjelica Huston endured three hours of make-up daily, and had to be suspended from the ceiling in cables. Jackson made her stay in makeup every day, even when they weren't shooting her scenes. 7. The scene in Star Trek: First Contact where the Borg queen is lowered on wires was inspired by the Supreme Leader. 8. The character of Hooter was inspired by Return of the Jedi's Max Rebo. 9. A poor critical response and lack of repeat business shut down the ride in 1997. The ride was reopened in 2010 after Michael Jackson's death. Source: Attractions Magazine 10. MTV aired Captain EO once in 1996, the only time the short film has aired on TV. Captain EO has never been officially released in any home format. However, if you want to watch it, you can see it online at YouTube (as of 1/6/14): What do you think of Captain EO? Have you ever seen it? Please use the buttons below to tell your friends about this post. Click on the links to follow us for free by Email, RSS and follow us on Twitter @thegeektwins and like us on Facebook Follow @Thegeektwins Pat Dilloway January 7, 2014 at 6:11 PM I might have seen it when we went to Disney in 1987 but I don't really remember. Hard to believe it kept airing until 1997. Now that there's 3D TV you'd think a Blu-Ray or streaming release would make sense. DAVID WALSTON January 7, 2014 at 7:18 PM I remember the pic of him in the chamber. I thought that was just an enquirer type moment, not from this. Alex J. Cavanaugh January 7, 2014 at 7:36 PM I know that it is truly awful, as Disney World is still playing it and I've had the misfortune to see it... jeremy [retro] January 8, 2014 at 5:16 AM thank you for this, i didn't even know who Captain Eto was... Tony Laplume January 8, 2014 at 9:29 AM I'll have to come back and watch... Nigel Mitchell January 9, 2014 at 4:26 AM Yeah, it's pretty bad. I did as well, David. I was surprised when I find out MJ was behind it It would be cool, Pat. Just not sure there's a demand Xmasevebaby January 9, 2014 at 8:57 PM I saw this back in the day, and even though I was a HUGE Michael Jackson fan, I thought it was some corny, Power Rangers bullshit. As an adult, I can now see it for what it was...an amateurish vanity piece for a very talented one trick pony. Pyronaut January 10, 2014 at 1:08 AM I'm a huge Michael Jackson fan and I remember being mesmerized by the display at Disney World as a kid, but never got to see it (I think it was being renovated or something). Later as an adult I watched it at home and no matter how much I wanted to like it, I couldn't. I guess it's just not the same without the 3D and lasers and stuff. I kind of felt the same way about the majority of the Moonwalker story (minus the music videos, which are cool, and Smooth Criminal is freaking amazing). He should have just stuck with music videos and not tried to make a movie type thing. Nigel Mitchell January 11, 2014 at 10:20 PM Captain EO reminded me of Moonwalker, too rlmaass January 17, 2014 at 4:31 PM Anytime I'm at Disneyland with newbies I always make them sit through the horror of what this is. It is sooooo bad it's goo..... ok it's just really really bad. But I always like to get peoples first time reaction to it. Cheese Addict January 17, 2014 at 4:56 PM I don't know why as a kid I remember "Another Part of Me" being one of the main songs, and not just a musical bumper. So when I watched it again, I was a bit disappointed the song didn't play. What Jabba Looked Like Before RETURN OF THE JEDI Geek Bits: Hiddleston Almost Thor, 3 CAPTAIN AMERI... 10 Funniest FUTURAMA Title Captions [Television] Caption This: Lady Boba Fett [Caption] Millenium Falcon vs. Enterprise: The Facts [Infogr... All Your Favorite Sci-Fi Characters on a Playgroun... DUCK AND COVER Gets the MST3K Treatment Hilarious STAR TREK IV: THE VOYAGE HOME Blooper Re... THOR 2 Alternate Take Shows Tom Hiddleston as Loki... 8 Ways to Ride a STAR WARS Tauntaun in Real Life [... Phunny Photos: The Avengers in One GIF, CSI: Death... Howard Stark's Notes in IRON MAN 2 Had Real Scienc... Geek Bits: All DOCTOR WHO Catchphrases, ROBOCOP Co... Everything Wrong With THE AMAZING SPIDERMAN In 2 M... Smackdown: Worf vs. Chewbacca [Poll] 11 Black Superheroes That Use Electricity What Was it Like Developing the Kryptonian Languag... 25 Things You Didn't Know About the Original ROBOC... Rudest, Most Foul-Mouthed Robin Ever in New SON OF... Timeline of the Future of Earth, Humanity, and the... 10 Greatest Sci-Fi Roles of Russell Johnson, the P... How MYSTERY SCIENCE THEATER 3000 Was Born [Televis... Geek Bits: Sci-Fi Razzie Nominations, New THE AMAZ... 5 Hilarious STAR WARS Toys That Don't Exist But Sh... Caption This: Poodle Superman The History of the Joker [Video] 10 Crazy, But True, Facts About FUTURAMA You May N... Epic Facts About STAR TREK: The Original Series [I... 8 Reasons ARROW'S Diggle is NOT a Sidekick [Televi... What do the AVENGERS and STAR WARS Have in Common?... KUNG FURY is the Greatest 80s Movie Never Made [Vi... 7 Interesting Facts About THE DARK KNIGHT's Pencil... Geek Bits: New X-MEN DAYS OF FUTURE PAST Pics, Cat... How Everyone Starts a New Fighting Game [Video] Poll: Will GRAVITY Win All Four Golden Globe Award... 5 Most Beloved Background Characters in Sci-Fi See Disney Princesses as STAR WARS Jedi [Gallery] 10 Things You Probably Didn't Know About CAPTAIN E... RETURN OF THE JEDI Behind-the-Scenes Video Shows R... How Every Pixar Movie is Connected [Infographic] 10 Funniest Characters from the Insane Poster of E... 5 Nastiest Alien-Filled Meteors in Movies [List] Geek Bits: William Shatner and Carrie Fisher Fight... Guys Geeks Love: Tom Hiddleston Caption This: Batman Slapping Robin The Surreal Clockwork World of STANLEY PICKLE Top 10 Greatest Black Superheroes in History [List...
cc/2020-05/en_middle_0097.json.gz/line1418361
__label__cc
0.509035
0.490965
Resist Trump: Why Boycotts and Business Leadership Matters More than Ever The business community is joining citizens in rising up and taking on Donald Trump and the GOP. Rather than being cowed by this new government, the voices of dissent are increasing. With growing boycotts of Trump-related products, people are challenging this administration in ever increasing numbers. Hundreds of America's leading companies are actively resisting Trump. Hotels and buildings have dropped the Trump brand, and now retail outlets and others are also coming together to say "no" to the new administration and the GOP. We are seeing increasing evidence of a movement to resist Trump. The movement against Trump and Republicans has been building steadily since November 8. Shortly after he was elected business leaders challenged his stance on climate change and urged him not to kill the Paris Agreement. Now this movement appears to be going into high gear. Corporations stand up to the bully-and-chief Businesses are resisting Trump's use of the Oval Office as a bully pulpit. Many are appalled that he is using the institution of the presidency to attack corporations. This is yet another example in a long list of highly questionable actions from Trump and the GOP. Businesses cannot avoid the realization that this administration augurs a dystopia that is devoid of ethics. Trump has bullied companies like Boeing, Carrier, and Ford. In the Boeing incident, he threatened to cancel the contract for some new Air Force One jets and this caused Boeing's stock to plummet. However, more recently Trump's twitter tirades against other companies have had the reverse effect. The fact that businesses can stand up to Trump and increase their value in the process changes everything. Corporations now have an incentive to resist Trump. Further, they can use their financial might and messaging wizardry to offer a counter-narrative that gives voice to the outrage building against the billionaires that have taken over Washington. The collective power of the business community to counter Trump and the GOP's dark narrative were in evidence in the recent Super Bowl ads. During the Grammys, Nike aired an ad that took a swipe at the Trump administration and the GOP. The add focuses on equality. The ad opens with the question, "is this the land history promised?" it then goes on to say, "opportunity should not discriminate...equality has no boundaries." Nike and Addidas are part of a collective of over 100 American companies called the Affordable Products group. These companies are fighting the Trump Administration’s planned import tax. The collective will launch a national advertising campaign in order to argue that a tax would increase consumer costs. More than one hundred of America's leading companies have joined a coalition of businesses that publicly resist Trump. At least 127 technology firms have taken stands that firmly oppose Trump's Muslim bans. This ban was also being challenged in the courts by these businesses. In a legal brief, they called the ban unconstitutional and said it, "inflicts significant harm on American business, innovation, and growth." The fact that leading The fact that American businesses including Tesla, SpaceX, Apple, Facebook, Google, Microsoft, Uber, Reddit, Netflix and Dropbox are suing Trump after only three weeks in office speaks volumes about this administration. It specifically dispels the myth that this administration is good for business. It is no small irony that Elon Musk is the CEO of Tesla and SpaceX as well as a member of Trump's business advisory council. Patagonia and a number of other leading outdoor retailers are also taking on Republicans. They are organizing to actively oppose plans to sell off public lands. Large numbers of people are looking for ways to express their displeasure at Trump and boycotts against America's first family are now spreading like wildfire. Boycotts are effective. Just the threat of a boycott caused Kellogg to stop advertising on Breitbart News (formerly run by Trump's chief strategy advisor, a white supremacist named Steve Bannon). Kellogg's official explanation of the move cited their corporate values. The Democratic Coalition Against Trump has produced a free "Boycott Trump" app (available on iTunes and Google Play) that helps people to avoid the dozens of businesses connected to Trump. For a list of Trump brands to boycott click here. Retailers drop Ivanka Retailers are also thinking twice about the possible costs of being associated with the Trump family brand. Early in February Nordstrom announced that Ivanka Trump's clothing and accessories were not selling well so they decided to discontinue the line. Predictably, her father took to Twitter to lash out against the department store chain from both his personal account and his official White House account. Other retailers that are reducing the profile or dropping Ivanka's product line altogether are T. J. Maxx, Marshalls, Neiman Marcus, Belk, Jet, ShopStyle and Kmart. In a New York Times interview, Donald Trump jr. and his brother Eric called Nordstrom, "disgusting". To make matters worse Trump's tirade was reiterated by White House press secretary Sean (angry-man) Spicer and Trump's top White House adviser Kellyanne (look-at-me) Conway. This is not the first time the press secretary has played pitchman for Trump. Earlier this year he urged people to visit the Trump International Hotel in Washington. However, Conway went even further telling people in a Fox News interview to "go buy Ivanka's stuff". "It's a wonderful line. I own some of it," Conway said. "I'm going to give a free commercial here. Go buy it today, everybody. You can find it online." As a member of the White House staff this is clearly prohibited (federal employees are not allowed to use public office for the endorsement of a product). Brands can't afford to be apolitical Companies are realizing that there may be a cost to political neutrality in the era of Trump. Retailers are the latest to have joined the army of companies opposing Trump. For many, the last straw was the Executive Order (EO) that banned seven Muslim nations. Nordstrom was among a long list who disagreed with both the ethics and the logic of this move. In a notice to its employees, Nordstrom said it valued immigrants and offered support to those affected by the executive order. Benefits of social advocacy Businesses are fighting for different issues but they all may derive a reputational benefit from resisting Trump. Far from taking a risk, engaging in social action is becoming a competitive necessity. This is a powerful incentive that may further weaken the Trump administration and the GOP. Businesses are realizing that being socially responsible can be good for a brand. Resisting Trump may contribute to both their reputation and their bottom line. As explained in a Sustainable Brands article, standing against injustice is both good marketing and good business: "brands have not only an opportunity, but also a responsibility to defend inclusivity...Now more than ever, brands are in the political spotlight and have begun to understand the gravity of this, their influence, and even how to shape this climate into an opportunity. Brands now have a particularly visible chance to test — and even strengthen — their purpose, values, and courage." Maintaining control of the narrative is about being bold, that means being, "upfront about your brand's position...being courageous and outspoken about your brand’s values is key in today’s world." Brands are beginning to realize their power and the implications are "yuge": "brands are starting to tap into the enormous influence they have over popular culture and are starting to lead us toward a brighter future. Brands can use this influence to encourage diversity, bridge divides, further our common values and benefit from this elevated leadership status along the way...Brands have the power and influence to change our current divisive cultural climate into one where people connect with each other and accept one other’s differing positions in healthy discourse." This is not only good for cementing loyalty with many existing customers this is good for shareholders. Standing up to bullies like Trump may be a case in point. What was once considered to be an "activist brand" is now "a necessity". Brands sell products, but they also have "enormous influence they have over popular culture" and they can play a pivotal role in leading us towards a brighter future. What makes this so incredibly powerful is that taking a stand is not only good for connecting with consumers, it is good for shareholder value. After being attacked by Trump Nordstrom stock appears to have taken off. This suggests there may be brand value and stockholder benefits associated with opposing Trump. The growing trend of businesses opposing this government give us reason to hope that America can resist Trump and the GOP. Protests are a Necessary and Appropriate Response to the Trump Administration The Importance and the Power of Protest: Why We Must Stand Up to Trump Trump's Victory has Spawned Unprecedented Opposition Trump's Inauguration Met with Protests as Darkness Officially Descends What Romanians can Teach Us About Combating Corruption Trump's Victory Must Not Cause us to Lose Hope - Fight for the Health of our Planet Event - People’s Climate March 2017: 100 Day Mobilization
cc/2020-05/en_middle_0097.json.gz/line1418363
__label__wiki
0.854849
0.854849
The Ring Two Lifeless retread of the original. Both of them. Released in 2005, certified UK-15. Reviewed on 02 Apr 2005 by Scott Morris Okay, potted Ring Cycle rundown, with apologies to Wagner. Hideo Nakata's original 1998 Ring, which for clarity's sake we'll break with the style guide and call by it's Japanese name Ringu, was nothing short of a revelation. An atmospheric, creepy horror film that was actually scary. Long time readers of this site or anyone with two brain cells to rub together will know that this is a very rare thing indeed. A year later he directs Ringu 2, a fairly disappointing followup with a strange focus on trying to explain the inherently inexplicable, i.e. how the murderous spirit of Samara wound up inside a video tape. Cue experiments combining electricity and swimming pools full of water, with predictably tragic consequences. Concentrating on other projects, it's left to Norio Tsuruta to direct a barely necessary prequel, 2000's originally named Ringu 0. While, if memory serves, this fell more down the traditional / cheap quiet-bit-loud-orchestral-stab route, it's not too bad an outing although one that doesn't really feel like a proper Ringu film, for reasons that aren't vital to the matter at hand to quantify. Meanwhile in Korea, Dong-bin Kim directs The Ring Virus, which is essentially a scene-for-scene remake of Ringu in Korean. This clearly gives a Hollywood exec an idea. With the mythos about Asian horror movies building (see also Danny and Oxide Pang's The Eye and Bangkok Haunted following on from the excellent Bangkok Dangerous), as well as Western critical acclaim and commercial success for other examples of Asian cinema such as Sympathy For Mr. Vengeance and Infernal Affairs, why not try remaking some of these for Western audiences? Why not indeed, says Gore 'not Vidal' Verbinski as he knocks out The Ring, which contains all of the important scenes of Nakata's work, adds a few new slants and contains as many thrills and intriguing plot strands as the original. I still say the final reveal of Samara's entrance, stage right is handled better in Nakata's version, but overall the film is still the dog's knackers. Which is to say very good, although what dog's knackers have to do with that is one of the many things I'll never understand. Anyhoo, The Ring opens to positive reviews and more importantly a huge box office, so a sequel is commissioned along with about a billion remakes of other Asian horrors. Which, eventually, brings us to Ring Two, the imaginatively named sequel. From the outset it had been made clear that this was not going to bear any relation to Ringu 2, and while that's a good thing for all concerned still not enough to get us too worked up over a sequel to a remake that's already got a sequel. How many other avenues could possibly be explored? With Verbinski tied up on Pirates of the Caribbean and its forthcoming dual follow-up duties, who should helm this outing of the well-based horror franchise? The answer was surprising; Hideo Nakata. I can't off handedly recall any precedent for a director choosing to direct a sequel of a remake without directing the remake itself, which isn't in itself important but it's interesting. Tacit admission that Ringu 2 wasn't up to snuff? Just wanting some familiar territory to ground himself in on his first Western outing? I can only imagine that given his reputation as the Alpha Male horror director he could have knocked on Dreamworks' door with any project and be granted any budget he demanded (horror movies traditionally being 'cheap' anyway, admittedly for given values of cheap), so this choice is kinda intriguing, no? This intrigualisation lasts for perhaps half an hour after you've settled into the cinema with your cola and gelatine treats, as it becomes apparent that The Ring Two is rather dull. Concordantly talking about things surrounding the film is more satisfying than writing about the film itself. Rachel Keller (Naomi Watts) having survived the first movie's events moves from Seattle to the smallish town of Astoria, editing the local daily newspaper for which 'Man bites Dog' is an headline only seen in their wildest dreams. 'Man walks Dog' would seem more their speed. Anyhoo, she makes a home with photography loving son Aidan (David Dorfman) and things seem to be going swimmingly, then a corpse shows up with the characteristic face-twistin' that a close encounter with the freaky well-dwelling Samara inevitably results in. While it seems that Rachel finds and destroys this Ring video in short order (surely we're on the verge of a re-writable DVD being more appropriate?), Samara's not going to leave Aidan alone. It seems she wants to become him. Thus Rachel must work out why she keeps on coming back from this mysterious video dimension she's found herself in and how to stop her. Doesn't sound like much of a plot to fill up close to two hours, does it? While I've missed out such vital plot developments as Rachel and Aidan being attacked by a horde of rampaging, iffy CG stags (no, really), there's not really enough going on in The Ring Two to justify it's length. The first half hour drags by, which might not be so bad were it also building up the same densely layered atmosphere that served Ringu so well. For reasons I can only attribute to it not saying anything new about its lead characters, it's building up nothing apart from a numb sensation in the buttockular area. Business picks up later on, but even then there's the nagging sensation that this is just The Ring Again. The investigative bit is more abstract and less involving, the jumpy moments fewer and far less well executed (scary horses versus laughable stags, and there's a comparison I didn't think I'd ever have to make), nigh on everything is much the same, but not as good. Which is something of a tragedy, as it means we have to write this off as 'not particularly entertaining' and give it the same mark as Boogeyman and White Chicks, which seems unduly harsh. In terms of the work and love that's gone into the project, even the most cursory glance shows that this is leagues ahead of many of its brethren. Sadly it doesn't translate itself into the film, and the stretches that were so tense in The Ring become lethargic in The Ring Two. Divested of reasons to be scared, it's no surprise that the ending does not scare. Concordantly (twice in one review! Crivvens!) divested of reasons to be entertained, it's no surprise that the movie is somewhat tedious. But it's very well crafted tedium, if that counts for anything. The acting's not far off flawless for this sort of thing, especially from little Simon Baker who carries the bulk of the difficult scenes as Samara exerts her influence over him. Naomi Watts. Mmmm. Sorry, got distracted. Um, yeah, she handles everything as competently as we've come to expect from here, but reasons to care about their characters come few and far between. Nakata's camera work, when not obsessing over ridiculous stag based sequences (sorry to harp on about it, but it's an awful scene) is on occasion beautiful and rarely less than...nice, but who can get worked up over something that's just nice? It doesn't make a lick of sense of course, but that's not what you watch horror films for, is it? If we seem to judge The Ring Two harshly, it's only because it's failing by Nakata's own high standard. Perhaps if it had Brian Cox electrocuting himself in a bathtub again it'd be a better film, or at least a more interesting one. Naomi Watts (Rachel Keller) Simon Baker (Max Rourke) David Dorfman (Aidan Keller) Elizabeth Perkins (Dr. Emma Temple) Gary Cole (Martin Savide) Sissy Spacek (Evelyn) Daveigh Chase (Samara) Kelly Stables (Evil Samara)
cc/2020-05/en_middle_0097.json.gz/line1418366
__label__wiki
0.954543
0.954543
Frances Phipps1 Frances Phipps is the daughter of Constantine Phipps.1 She married Very Rev. Arthur Onslow, son of Lt.-Gen. Richard Onslow and Pooley Walton, on 4 November 1773.1 From 4 November 1773, her married name became Onslow.1 Children of Frances Phipps and Very Rev. Arthur Onslow Jane Onslow+2 d. 10 Dec 1850 unknown daughter Onslow1 Venerable Richard Francis Onslow+1 b. 16 Jan 1776, d. 23 Oct 1849 Reverend Arthur Cyril Onslow+2 b. 1788, d. 6 Feb 1869 Phipps Vansittart Onslow+2 b. 2 Sep 1790, d. 10 May 1867 Constantine Phipps1 Child of Constantine Phipps Frances Phipps+1 unknown daughter Onslow was the daughter of Very Rev. Arthur Onslow and Frances Phipps.1 She died, unmarried.1 Richard Foley Onslow1 M, #668424, b. 13 September 1802, d. 12 March 1879 Richard Foley Onslow was born on 13 September 1802.1 He was the son of Venerable Richard Francis Onslow and Harriet Mary Foley.1 He married Catherine Blacker, daughter of Latham Blacker, on 5 July 1826.1 He died on 12 March 1879 at age 76.1 He lived at Standens, Gloucestershire, England.1 Children of Richard Foley Onslow and Catherine Blacker Anne Theodosia Onslow1 d. 11 Nov 1907 Caroline Onslow1 d. 26 Apr 1918 Andrew George Onslow+1 b. 10 Oct 1830, d. 26 Aug 1894 Mary C. Onslow1 b. c 1833, d. 1892 Richard Onslow1 b. 18 Apr 1836, d. 7 May 1872 William Arthur Onslow+1 b. 15 Dec 1837, d. 28 Oct 1903 George Onslow1 b. 30 Apr 1839, d. 6 Mar 1880 Emma Frances Onslow1 b. 1844, d. 1931 Elizabeth Onslow1 F, #668425, b. circa 1810, d. 18 September 1879 Elizabeth Onslow was born circa 1810.2 She was the daughter of Venerable Richard Francis Onslow and Harriet Mary Foley.1 She died on 18 September 1879 at 10 Cambray Place, Cheltenham, Gloucestershire, England, unmarried.1,2 [S4567] Bill Norton, "re: Pitman Family," e-mail message to Darryl Roger LUNDY (101053), 6 April 2010 and 19 April 2011. Hereinafter cited as "re: Pitman Family." Frances Onslow1,2 F, #668426, b. 9 November 1811 Frances Onslow was born on 9 November 1811.2 She was the daughter of Venerable Richard Francis Onslow and Harriet Mary Foley.1 She was baptised on 13 November 1811 at Newent, Gloucestershire, England.2 She died, unmarried.1 Commander Richard Edmund Onslow1 M, #668427, b. 12 April 1933, d. 13 March 2011 Last Edited=6 Mar 2016 Commander Richard Edmund Onslow was born on 12 April 1933.1 He was the son of Admiral Sir Richard George Onslow and Kathleen Meriel Taylor.1 He married Mary-Jean Garner-Smith, daughter of Brigadier Kenneth James Garner Garner-Smith, on 12 April 1961.1 He died on 13 March 2011 at age 77.2 He was educated at Radley College, Abingdon, Oxfordshire, EnglandG.1 He gained the rank of Commander in the Royal Navy.1 He lived in 2003 at Preston Bagot House, Preston Bagot, Warwickshire, England.1 Children of Commander Richard Edmund Onslow and Mary-Jean Garner-Smith Richard James Onslow+1 b. 28 Dec 1962 Robert Denzil Onslow+1 b. 31 May 1965, d. 22 Dec 2016 [S466] Notices, The Telegraph, London, UK. Hereinafter cited as The Telegraph. Admiral Sir Richard George Onslow1 M, #668428, b. 15 April 1904, d. 16 December 1975 Admiral Sir Richard George Onslow was born on 15 April 1904.1 He was the son of Major George Arthur Onslow and Charlotte Riou Benson.1 He married Kathleen Meriel Taylor, daughter of Edmund Coston Taylor, on 30 April 1932.1 He died on 16 December 1975 at age 71.1 He was educated at Royal Naval College, Osborne, Isle of Wight, EnglandG.1 He was educated at Royal Naval College, Darmouth, Devon, England.1 He fought in the Second World War, where he was mentioned in despatches twice.1 He was awarded the Companion, Distinguished Service Order (D.S.O.) and three bars.1 He was Naval Secretary to the First Lord of the Admiralty between 1952 and 1954.1 He was appointed Companion, Order of the Bath (C.B.) in 1954.1 He was appointed Knight Commander, Order of the Bath (K.C.B.) in 1958.1 He was Commander-in-Chief of the Plymouth between 1958 and 1960.1 He gained the rank of Admiral in 1959.1 He held the office of Deputy Lieutenant (D.L.) of Shropshire in 1962.1 Children of Admiral Sir Richard George Onslow and Kathleen Meriel Taylor Commander Richard Edmund Onslow+1 b. 12 Apr 1933, d. 13 Mar 2011 Denzil John Onslow+1 b. 15 Oct 1939 Major George Arthur Onslow1 M, #668429, b. 29 March 1876, d. 12 April 1956 Major George Arthur Onslow was born on 29 March 1876.1 He was the son of Andrew George Onslow and Mary Owen.1 He married, firstly, Charlotte Riou Benson, daughter of Reverend Riou George Benson and Mary Brooke, on 10 June 1902.1 He married, secondly, Maud Elliot Harris, daughter of George Steel Travers Harris, on 15 November 1933.1 He died on 12 April 1956 at age 80.1 He fought in the Boer War between 1900 and 1901.1 He gained the rank of Major in the Shropshire Yeomanry.1 He fought in the First World War.1 Children of Major George Arthur Onslow and Charlotte Riou Benson Mary Onslow1 b. 24 Mar 1903, d. 1990 Admiral Sir Richard George Onslow+1 b. 15 Apr 1904, d. 16 Dec 1975 Major John Onslow+1 b. 6 Jan 1906, d. 25 Oct 1985 Hope Onslow+1 b. 7 Feb 1907, d. 1989 Major Charles Edward Onslow+1 b. 5 Apr 1912, d. 8 May 1969 Kathleen Theodosia Onslow+1 b. 27 Oct 1914 Thomas Philip Riou Onslow1 b. 10 Apr 1916, d. 6 Jul 1940 Reverend Denzil Octavia Onslow1 b. 3 Sep 1919 Andrew George Onslow1 M, #668430, b. 10 October 1830, d. 26 August 1894 Andrew George Onslow was born on 10 October 1830.1 He was the son of Richard Foley Onslow and Catherine Blacker.1 He married Mary Owen, daughter of Sir John Owen, 1st Bt. and Mary Frances Stephenson, on 13 June 1861.2 He died on 26 August 1894 at age 63.1 He gained the rank of Captain in the 13th Regiment.2 He gained the rank of Captain in the 97th Regiment.1 He held the office of Deputy Lieutenant (D.L.)1 He held the office of Justice of the Peace (J.P.)1 He lived at Oxenhall, Newent, Gloucestershire, England.1 Children of Andrew George Onslow and Mary Owen unknown Onslow1 Andrew Richard Onslow1 b. 9 Feb 1871, d. 1950 John Geoffrey Onslow1 b. 16 Apr 1873, d. 20 Jul 1930 William Onslow+1 b. 20 Jun 1874, d. 1 Jul 1921 Major George Arthur Onslow+1 b. 29 Mar 1876, d. 12 Apr 1956 [S8] BP1999 volume 2, page 2178. See link for full details for this source. Hereinafter cited as. [S8]
cc/2020-05/en_middle_0097.json.gz/line1418367
__label__wiki
0.831513
0.831513
DOCUMENT: Celebrity, Crime Wesley Snipes At Dixie Actor wants tax trial moved from KKK-infested Florida locale http://www.thesmokinggun.com/file/wesley-snipes-dixie NOVEMBER 6--In a bid to get his criminal tax evasion trial transferred from Florida to New York, Wesley Snipes claims that prosecutors "deliberately chose the most racially discriminatory venue available," an area that the actor claims is a "hotbed of Klan activity" and where "substantial pockets of prejudice exist." In a venue change motion filed yesterday in U.S. District Court in Ocala, Snipes claims that government lawyers are angling to get an "all-white Southern jury" to hear its case against the 45-year-old performer. According to the November 5 Snipes motion, the Ocala area features statues honoring the KKK founder, and the hate group "adopted highways to commemorate the Klan." Additionally, he adds, "the Confederate Flag flies over government property." To support the claim that he faces a possible judicial lynching, Snipes commissioned a public opinion poll comparing racial attitudes in the Ocala area and his preferred judicial jurisdiction, the Southern District of New York (which includes Manhattan, The Bronx, and a few outlying counties). The survey report, a copy of which you'll find here, includes New York-Florida comparisons on topics like interracial marriage, race-based hiring preferences, and whether the Confederate flag is a symbol of pride, not prejudice. Oh, and when asked whether burning a cross on someone's lawn should be a federal crime, the Snipes poll found that 23.8 percent of Ocala residents replied "No." That's compared to 13.2 percent of New Yorkers polled. Though a previous Snipes venue change bid was rejected, a federal judge recently allowed the refiling of motions after the actor fired his entire legal team for what he claimed was incompetence. (9 pages) Wesley Snipes, IRS ‹ previous Document Priest Arrested For Stalking Conan O'Brien next › Document Jailed Terrorist: "I Want My Walkman" DOCUMENT: Friday Photo Fun Match Game
cc/2020-05/en_middle_0097.json.gz/line1418371
__label__wiki
0.804075
0.804075
User:Narfil Palùrfalas/Fanfictions/The White Citadel part 1 < User:Narfil Palùrfalas | Fanfictions The White Citadel part 1: Intrigue 2 Preface 3 Song of the Birds 4 Herald of Ulmo 5 Messenger and the Plot 6 Sapphire Eyes [edit] Introduction This is my second book in the Noldorin Cycle. The first book, Wind of Fire, Oath of Blood, concerned the Oath of Fëanor and the Exile of the Noldor, was set from the time of the Oath to the Mereth Aderthad. Three primary characters were in this book: Alcawë and his two cousins, Turotulco and Ranyar. As well, there were other fictional characters such as Mistatelmë, nephew of Noldofinwë, and Andúmir, a Noldo of Fëanor’s train that befriended Ranyar, as well as the “historical” characters of Noldofinwë, Fëanor, Arafinwë, Fëanor’s Sons, Artanis, and numerous others. This book will expand upon certain characters, but most remarkably upon he who was called Turukáno in the last book, but in this book is called Turgon. The names of the Noldor in Aman were in Quenya. During the Flight of the Noldor from Aman, they slew many of their Telerin kindred in Alqualondë, Haven of the Swans, including Alcawë’s fictional uncle Lalawë. After the Noldor reached Beleriand, Elu Thingol of Doriath banned the Quenya tongue being spoken in his realm, because those who spoke it had slain many of those whom he had been friendly with. Because of this the Quenya tongue quickly died out among the Noldor in Beleriand as a primary tongue, and the tongue of the Sindar, called Sindarin, took root among them. Then many of the characters changed their names into Sindarin. Some of the most notables were Noldofinwë into Fingolfin, Findekáno into Fingon, Findaráto into Finrod, Nelyafinwë into Maedhros, Canafinwë into Maglor, and Turukáno into Turgon. When I speak of “fictional” in this introduction, I speak of characters invented and developed by myself rather than Tolkien. My fictional characters must change their names also. Alcawë must change his name to Aglaru, and Ranyar into Randir or his chosen epessë of Nathernil. If you are wondering what happened to some of the other characters, you must read the first book. Of the three fictional characters above, this book is primarily devoted to Ranyar, or Randir as he is now called. While Alcawë, or Aglaru, had a special relationship with Fingolfin, and accomplished great deeds both in the Helcaraxë and in the Battle of the Lammoth, Randir did not have a major role save in witnessing the treachery of Fëanor and gaining credit in the Battle under the Stars. He had a relationship with both Turgon and Maedhros, and it is the former he followed after the Noldor came to Beleriand. To where? To Gondolin and the White Citadel. And this is what this tale is about. Most of my information came either from the Silmarillion itself, or the Fall of Gondolin, found in the second book of Lost Tales. The Fall of Gondolin is extensive, and had been written perhaps the earliest of any of Tolkien’s Middle-earth works, and revised over the course of many years. It is told in full here, and the names of many great lords are listed. From this primarily I draw my account. I do not claim all of this to be canon. I have primarily defaulted to the Silmarillion where the two sources contradict each other, due to the later date of the writings within it. I am holding that except where contradicted in later works, the Fall should be considered canon. [edit] Preface Note: This preface is unsatisfactory, and not final intent. For suggestions, write on the Talk thread. Check back for updates. Ulmondil walked eagerly through the door entering the hall. Rúmil, his wise face deep in thought, and his beard resting on his chest, was sitting in the wooden throne-like chair. His face was ancient, yet young, and his eyes were extremely wise, though spry. No wrinkles were in his face, and he sat up straight. Rúmil glanced up at Ulmondil. “Good,” he said. “I believe we are all here.” “What is the story this time?” asked Ulmondil, sitting down with the other children. “Let me think,” said Rúmil, tapping his chin. “Last time what did I tell you of?” “The Return of the Noldor,” replied one of Ulmondil’s friends, an elf-boy named Anardur. “Ah, yes,” said Rúmil. “Good. I was just hoping to make sure that you remembered. Today we have a story filled with adventure, and rich in the history of Arda. You have probably heard it before, but not as fully as I shall tell to you today, for many speak of this tale in fear, and dread remembrance.” “The Kinslaying at the Mouths of Sirion?” guessed a girl. “No,” said Rúmil. “That shall be saved for another night. But this is the tale of the Fall of Gondolin. Who were the characters of the last story?” “Alcawë and Ranyar,” replied Ulmondil quickly, before any of the others could speak. Rúmil nodded slowly. “Alcawë, who was renamed Aglaru Bregolharn, is at the time of this story away in his southern fortress by the Bay of Balar,” said Rúmil. “But Ranyar, who you remember chose to follow Turgon, is at this time a prominent lord of Gondolin. This happens several hundred years after our last story, and by this time Ranyar, now named Randir, is no longer a young warrior, but a great and courageous lord who has seen many battles, and is one of the wisest in Gondolin. “This story is important for several reasons. But the primary is that it forms the groundwork for the Tale of Eärendil, which I am sure you have heard dozens of times.” He turned to the back, and said “Randir, bring it forth.” A tall elf who looked as ancient as Rúmil, though he, too had no signs of the aging of mortals. He produced a curious horn made of white silver, of beautiful workmanship beyond what is seen in mortal lands. It was engraved with many figures, but most were those of swans and wave-shapes. “This is the Horn of Tuor,” he said, handing it to Rúmil, who looked long at it and closed his eyes. Then he opened them. “Show them, Randir,” the loremaster said. Randir pulled open his shirt, the threads having already been loosened. There was a long scar across his powerful chest. Some of the children gasped. “It was honorably won, that scar, a testimony to the valor of its bearer,” said Rúmil. “And you shall hear of it and many other things. Now, it was early summer when our story opens, just eight years before the birth of Eärendil…” [edit] Song of the Birds Two elves walked side by side across the white stone courtyard, passing amidst the most beautiful of sights, sounds, and smells west of the Sea. The elf on the left was tall and handsome, with a smile that showed self-confidence and imperturbable spirit. The one on the right had a face more solemn, and at first glance seemingly wiser and more intelligent. There was a light white scar above his left eye, and his left hand rested upon his jeweled sword-hilt as naturally as that of a born horseman upon the reigns or that of a scribe upon a pen. They passed two guards wearing shining silver mail, with silver-white tunics, standing stern and solid as the white stone of the walls. They came to the edge of the courtyard and looked down across the city. Archers wearing similar garb to that of the guards lined the walls. The wide streets were paved with stone and curbed with marble, and fair houses and courts were set amid bright gardens filled with flowers. Many slender white towers of great beauty rose toward the heavens. The squares were lit with fountains and many birds sang among the trees. Behind them was the palace. It was of cut white stone smoothed so that no cracks showed, and built around a great square courtyard of stone. On the front of the palace a great white tower raised up on a stair rose like the finger of a slender goddess, immensely tall. On each side of the doors of the tower was a great tree, one bearing gold blossoms and one bearing silver. These were Glingal and Belthil, shoots from the Two Trees. And in the courtyard were seven fountains arranged in a semicircle around the tower and the trees, and they seemed made of crystal, shooting up twenty-seven fathoms and returning back to their pools like crystal rain. A great sound hovered about them like a thousand elven voices bursting into joyful song, ringing like the heavens. And in response there was a sound like the shimmering of many fair instruments in accompaniment. It was often repetitive in theme, but never quite the same as before. It was the most beautiful song those in the city had ever heard, and they would never hear anything more beautiful again, unless it were in the presence of Eru Ilúvatar himself, hearing the Second Music of the Ainur when the world is renewed. Never could any who heard the song could remember the tune later, save that it was beautiful, and when asked about it they would be at a loss for words. It was fair and strange beyond compare. Yet there were no singers, elf or Vala, for the music came from fountains themselves and the birds, which were numerous, and from the reflected light of the trees. Much of the song was felt or seen rather than heard, for if any spoke in that court they heard themselves as clearly as if the song was not there, but if they concentrated on the song, it filled their minds and their hearts, so that naught else seemed fair to them. There stood nearby an elf-lord, tall and proud. He wore blue robes embroidered with silver star. His sword was curved – a design which none of the other Ñoldor used. The elf on the left bowed at the waist, and the elf-lord imitated his action. “You are looking well today, Randir,” said the elf-lord. “As are you, Egalmoth,” said Randir, smiling. “Life is good in the White City,” said Egalmoth. “It is indeed,” Randir replied. “But now I seek the Lord Glorfindel. I have a message for him from the King.” “You needn’t look far,” said Egalmoth. “He is just across the courtyard. You can see him over there.” Then he glanced at the other elf. “What is Tarthalion doing here?” “He was off watch,” replied Randir. “He was given leave for good service. They evidently have him mixed up with someone else.” Egalmoth laughed aloud, a deep, flowing laugh from the depths of his being. “Well, I hope your message is pleasant,” he said. “It is too grand a day to have a fire in the fields of the south, or an accident in the mines. It sort of feels like that day when we first came to Tumladen, and began work on Gondolin. How our souls soured within us!” Randir closed his eyes at the memory. A silver bird just smaller than a dove landed near him, and sang. He was flooded with thought and memory. It was long ago that Randir had followed Turgon. He had said farewell to his friend Aglaru, and left the one who was as a father to him, Maedhros. But he looked ahead to bright days. The horns of Ulmo drew them at last to the valley of Tumladen, hidden deep in the Encircling Mountains. There they had built a great city of white stone, and the farmers grew in the green valley about, while folk mined and delved in the mountains. They had lived in peace and joy, creating works of art and music and power to match those in the Undying Lands. Morgoth had never found them, for Thorondor and the Eagles watched over them, and none passed near. After the building they had lived in peace, until one day… Turgon leaned down from his throne. “Tell me truly,” he said. “Speak it to me again.” “Maedhros of Himring has called all the nations of the elves to himself, to destroy Morgoth, and throw him forever into the void,” said the elf. “I came hither as soon as I might, but the scouts of Morgoth have come close in recent days, and only barely did I several times escape with my life.” “But they detected not your coming?” asked Turgon anxiously. “Nay, lord king,” said the elf. “They never saw me enter the hidden gates. If you would take my counsel, lord, I would say march to his aid!” “How long ago did he send out his summons?” asked Turgon. “He declares that he shall join battle on the morning of Midsummer’s Day,” said the elf. “That is only four days from now,” said Turgon, rising. “I shall go, but we must hurry. One day to prepare… three days to march… too soon. It would take us seven days at least to reach Angfauglith.” “And even more if we went by Himring,” added Ecthelion, who stood near. “We must not lose a day more,” said Turgon. “Rouse the people, Ecthelion. The Gondothlim are going to war.” Randir smiled as he remembered this. It seemed so long ago. They had hurriedly prepared, and ten thousand Ñoldorin elves had marched swiftly across the plains. By the time they reached Maedhros four days after Midsummer, battle – and death – was waiting for them with open arms. Randir looked down into the hills. Before them was an army entrenched in the hills. Men and dwarves and elves, among them the sons of Fëanor, and Fingon, son of Fingolfin. Fingon looked upon them. He gave a great shout. “Utúlie’n aurë! Aiya Eldalië ar Atanatári, utúlie’n aurë!” he cried, and his voice rang through the hills. “The Day has come! Behold, people of the Eldar and Fathers of Men, the Day has come!” And in answer the host cried out as if with one voice, “Auta i lómë! The Night is Passing!” Suddenly a lookout ran down, crying “Morgoth is coming! He is coming!” Fingon turned forward. Turgon and his lords were not far behind, and they placed themselves in the fortifications. They looked across the dusty plain of Angfauglith. There was a great host, innumerable, all in dun brown raiment. “Quick, friend Turgon,” he ordered. “Go south to the Pass of Sirion.” “Willingly,” said Turgon, and he departed. “Let us assail them as they come!” cried Azaghâl, King of the Dwarves of Belegost. “Nay!” cried a man, tall and broad of shoulders, with the face of a warrior. His name was Húrin. “Stay, and let the orcs break themselves upon our outworks.” For many fortifications had been thrown up upon those hills. The orcs came near. They halted before the hills. Great taunts there rose from the plain. The dwarves growled and put their hands to their axes. Some of the men seemed ready to break. But their captains held them back. Until something happened. In sight of one part of the wall a great orc marched forward, staying just out of bowshot. He was dragging something with him, and three more orcs followed, carrying black spears. Though most could not tell what it was, as they drew near Randir realized it was that of an elf. Even nearer the orc came, until it was just on the edge of bowshot. Randir did not know who the elf was, but gasped at the signs of torture. His eyes were put out. He was dressed in rags around the waist, and great scars and open wounds were upon his body. A tall elf stood not far off, within sight of the prisoner. He cried aloud. “Who is that?” Randir asked Turgon. “The man to our left is Gwindor, of Nargothrond,” said Turgon. “I cannot tell who the prisoner is. Yes, I can. It is Gelmir, Gwindor’s brother. Ecthelion, make sure the captains restrain their men!” The orc raised up a great sword. The prisoner was shoved onto the ground. The orc cried out in a loud voice that all could hear “We have many more such at home, but you must make haste if you would find them, for we shall deal with them all when we return even so.” And he raised up his sword. Down it fell, first upon the wrists, then the ankles of the elf. Randir turned away as the elf was first mutilated, then beheaded. Gwindor suddenly leaped upon his horse, and blew his horn. He reared up. “To me!” he cried. “Avenge Gelmir, my brother, my friend!” Randir raised his bow slowly, and loosed an arrow far. It struck the great orc in the neck, and the orc fell. “A magnificent shot!” cried Turgon. Then he added “But let us not worry about that now! We can no longer restrain our elves.” Gwindor suddenly rode forward, and the waiting cavalry followed. The dwarves leaped up, and soon they were running after the cavalry. Fingon sounded the trumpets, placing his helm upon his head, and all of the host of Hithlum leaped forward. Spears and arrows flew, and the heralds of Morgoth fell pierced through many times. The rest of the host of Morgoth turned and fled in terror. But the elves of Gondolin were restrained, and though fire rose in their spirits, they did not leave the outworks. Randir learned later what had happened. Gwindor and his followers went even to Angband, and beat upon the gates. Fingon could not come to their aid, and all but Gwindor were slain, and he was rendered a captive. Many of the men of Brethil were slain, and Haldir of the Haladin, ere Fingon retreated. It was then that Turgon arrived, for he had come later. Randir saw that the army was greatly decreased. Their phalanx broke through the ranks of the orcs, and they reached Fingon and Húrin fighting side by side. “Glad am I to greet you, my brother,” cried Fingon. “Glad am I to fight beside you,” responded Turgon. And they hurled themselves again at the orcs with renewed strength. Many times did Glamdring, sword of Turgon, rise and fall. In the third hour of the morning the Sons of Fëanor came. The orcs wavered, and a retreat began. The elves and men and dwarves cried aloud in victory as Maedhros drove back the orcs. But the Gates of Angband opened again. Wolves and balrogs and dragons poured out. At their head was one who was great than the rest. Gothmog, Lord of Balrogs. And there was also a great dragon, Glaurung. Suddenly the cry came to them “Ulfang has betrayed us!” Ulfang was the chief of the Easterlings. The Easterlings sudden turned and fled. But Ulfang and his sons turned and attacked the Sons of Fëanor from the rear. They came near to the Standard of Maedhros, but Maglor, second son of Fëanor, leaped forward with his bodyguard. They cut their way through the host, and came to Uldor son of Ulfang. Uldor parried Maglor’s first blow, but then Maglor ran him through the heart. Also the sons of Bór slew Ulfang’s other sons, Ulfast and Ulwarth. The lines of the Sons of Fëanor were broken, but the Naugrim (Dwarves), wearing masks of iron, stood beside them, and Maedhros was rallying a retreat. But Glaurung pushed forward, and fell upon Azaghâl. Down came his mighty foot, and Azaghâl was crushed. But then there was the glint of sun off a knife, and Glaurung screamed in pain, for Azaghâl’s knife had found his stomach. The dragon fled. The dwarves solemnly picked up their dead king, and departed, singing in their deep throaty voices. Suddenly Gothmog was come. He fell upon Fingon, whose guard lay dead, and attacked him. Fingon withstood him, and Gothmog could not overcome him, nor Fingon overcome the balrog. Suddenly Turgon shouted a warning, but before Fingon could move the whip of another balrog who had crept forth from behind curled around his leg, and he fell. Then down came the black axe of Gothmog, and Fingon’s helm was cloven as white flame sprung up. Gothmog licked the blood off his axe, and the orcs trampled the body and banner of the elven-king into the dust. Randir stood by Turgon, and also near him were Húrin and Huor. Húrin had a chance to say to Turgon “Go now, lord, while time is! For in you lives the last hope of the Eldar, and while Gondolin stands Morgoth shall still know fear in his heart.” But Turgon responded “Not long know can Gondolin be hidden; and being discovered it must fall.” Then Huor spoke. “Yet if it stands but a little while, then out of your house shall come the hope of Elves and Men. This I say to you, lord, with the eyes of death: though we part here for ever, and I shall not look on your white walls again, from you and from me a new star shall arise. Farewell!” Even as Randir sat and remembered he pondered these words. Turgon had retreated, Huor had been slain, and Húrin captured. That had been eighteen years ago. Randir was already over five hundred years old, which was considered a good age for an elf, about four hundred years beyond maturity. Though he was not ancient as many elves, he had survived longer than many others. But rarely did the elves age beyond the equivalent of thirty, save in wisdom and beauty. He was well-off. Because of his proven bravery, he was a great lord in the House of the King, and was placed as a special bodyguard to Turgon’s daughter, Idril. He was a great friend of the King’s, and of many of the lords of the various houses of Gondolin, especially Ecthelion, Egalmoth, Glorfindel, and Galdor. Besides his work as Idril’s bodyguard, he was also an excellent sculptor, and had carved many of the fair statues in Gondolin. He was pulled from his thoughts as he saw two elves talking to each other come near him. One was tall and slender, wearing a mantle so embroidered in threads of gold that it was diapered with celandine as a field in spring. Also his arms were damascened with cunning gold. A great rayed sun was upon the center of his tunic, and it shone like the sun above. His hair was like a river of gold, showing that he had Vanyarin blood in him. The second was one bare-headed, dark of hair, and black of garments. He bore a strange dark sword at his side. His face was darker also in hue than most of the elves in Gondolin, and his eyes did not shine like those of the Calaquendi, but glittered darkly like light trapped in black diamonds. He was younger than Randir, but not young. Not quite two hundred years, Randir might have guessed. He knew who they were. The one wearing gold was Glorfindel, chief of the House of the Golden Flower, and Maeglin, nephew of King Turgon and chief of the House of the Mole. As they came, more memories filled Randir’s mind. It had been quite a shock when Aredhel, the King’s sister, came back into court. She had been missing, believed killed, after a foolish trip to visit the Sons of Fëanor. She seemed somewhat cured of her pettiness. Even more amazing what who walked beside her one whom she called her son. She came before the King, and bowed. But the king lifted her up and embraced her. “Now, he said, “Tell me where you have been.” She told him how she had been lost in the woods, and had been imprisoned by a Dark Elf whom she eventually agreed to marry. She had a son, Maeglin, who had agreed to run away with her back to Gondolin after her husband, Eöl, forbade her from ever seeing the light outside the forest again. But she had longed to see her own people, and Maeglin was of like mind. So they had fled, and were now here. “Tell me,” said Turgon when she finished, bending down to look her hard in the eyes, “Did you reveal to him where Gondolin is? Is the secret still safe?” “I swear that I did not reveal where it is,” she replied firmly. “Now we are safe.” Randir saw Turgon examine Maeglin, and instantly take a liking to him. Maeglin was handsome, and looked worthy of being a Lord of the Gondothlim. “I rejoice indeed that Ar-Feiniel has returned to Gondolin,” he said using his sister’s nickname, “And now more fair again shall my city seem than in the days when I deemed her lost. And Maeglin shall have the highest honor in my realm.” Maeglin bowed and swore the sacred oath on Turgon’s Staff of Doom, that he would be true to his lord and the Ñoldor who dwelt there, and never would reveal the location of the Hidden City. But as he finished Randir noticed his eyes rest on one who stood beside him. One who was his cousin. Eöl had followed them, but was killed by Turgon’s men, though first he slew Aredhel with a poisoned javelin intended for his own son. Randir shook his head as he remembered. “Eru’s blessing, Nathernil,” said a voice. Randir shook himself out of his thoughts and saw Glorfindel looking at him. “Good morning,” said Randir. “I have a message for you from the King.” “What is it?” asked Maeglin. “It is for Glorfindel,” said Randir. “I am the King’s nephew,” said Maeglin haughtily. “I am privy to all the affairs of Gondolin.” “I shall speak with you later about this,” said Randir sharply. “But do not use your mother’s name to use authority, or I shall speak of your father’s name to nullify it.” Maeglin growled and walked away. “I don’t see why you and him don’t get along well,” remarked Glorfindel. “He is stubborn, and perhaps a little conceited, but I can see nothing else wrong. I have never seen him be anything but politeness when he is in the court, though I must admit his words stung as we argued just now. He was wanting to take some persons onto his House that I was objecting to.” “Still, I would deem it a pity that one of such great potential has such ancestry. His father was a thief and a murderer,” added Randir. “The accursed elf was thrown over the Caragdûr,” said Glorfindel, and he growled. “He is dead, and let us forget of his dark deeds,” said Randir. Glorfindel’s face came out of its frown, but still he looked troubled. “Some may never forget,” he said softly. The silver bird trilled again. Glorfindel turned to the bird, and it perched upon his shoulder. It was rumored among the people that he knew the speech of birds gold and silver, and could distinguish the words of their song. At any rate, he could tell one from the other, and had given them all names. “O Geilodon,” he said, stroking the sparkling plumage of the bird. The bird sang several notes and settled down. “I sense something,” he said presently. “Something or someone is coming.” “Does thou indeed?” asked Randir. “For I feel it also. Something is about to happen.” “I wonder,” remarked Tarthalion, “If our feelings are truthful? I have felt anticipation long.” “By the way, what is the message?” asked Glorfindel. “He says that he wants the 3rd company of the Golden Flower recalled from guarding the mines,” Randir replied. “They are no longer needed there.” “I’ll send one of my couriers right away,” said Glorfindel. He glanced off to his right. “There’s the Celebrindal. It seems like she’s bracing herself to have a few words with Maeglin.” Randir saw the dark-faced elf walk with confident strides toward the golden-haired Idril. He instantly walked toward where she stood, coming up behind her. “Ah, Lady Idril,” said Maeglin smoothly, “It is good to see that you are well and fresh.” “It feels good as well,” she replied indifferently. “But I do not know that I have been feeling badly lately, and I am better and fresher than before.” “Yes, of course not,” said Maeglin hurriedly. “I merely meant to say that you appear very beautiful standing there with the wind in your hair, and the birds singing in the trees.” “I do not see that the wind makes me seem as beautiful as the songs of the birds,” she said shortly, noticing how his dark hands were moving slowly closer. “Now, if you will excuse me.” She began to turn away. He reached out as if to grasp her arm, but he stopped suddenly as he saw Randir come up behind Idril. “I would say, Lord Maeglin, to put your hands back where they belong,” said Randir quietly. As Maeglin stepped back, he removed his hand from his sword-hilt. “You may go, Idril,” Randir said. “I shall join with you shortly at the Arch of Ingwë.” Idril nodded in understanding, and walked away silently. Randir drew Maeglin aside under the shade of the trees so none would overhear their conversation. “If you ever touch my charge, I shall not hesitate to draw my blade,” Randir said in a low voice, but it was firm, and his eyes were hard. Maeglin glared at him. “You are an insolent fellow,” he said. “I have as much right to speak with her as any other.” “Yet you make sure that your speech is with respect for the King’s daughter,” said Randir. “I know the intentions of your heart. She is your cousin, and for that reason and others the King has refused to give her to you, not least of those reasons that she does not wish to even associate with you.” “You think that you can do anything because you are the bodyguard of the princess of Gondolin,” snarled Maeglin. “I am no fool. I know how skilled you are with the sword. You know I cannot challenge you.” “There has never been a blade drawn on a fellow elf in this citadel yet,” said Randir coldly, “And never here has an elf of Gondolin been killed by his brother. I suggest you make sure that it does not happen, and stay away from my charge.” “You think I don’t know what you truly believe?” asked Maeglin with a bitter laugh. “I know your true motives for your protection. You want her for yourself!” With that last challenge he spun on his heel and marched off. Randir stared after him in anger and pity. He met Idril by the Arch of Ingwë, on the borders of the Square of the Folkwell, where there were many beautiful trees and a sparkling fountain. She rose to greet him. “Nathernil,” she said, using his epessë (a name chosen by an elf as the common name for himself), “Thank you that you came when you did. I began to fear he would go too far.” Randir laughed. “He is vain and selfish, but cowardly. He will not dare approach you while you have protection about you.” “Yet even the coward may find a motive that drives him to rash deeds,” said Idril steadily. She put her hand on his arm. “I still remember when your cousin Aglaru saved me and my father in the Helcaraxë,” she said softly. “But I also remember when you slew the demon-orc and saved me. That is probably why my father chose you as my bodyguard; that, and that you are the most skilled swordsmaster in Gondolin.” “You think too highly of me, my lady,” said Randir, shaking his head. “I cannot do many things.” “You have protected me thus far on numerous occasions,” Idril replied. “But I do fear for you. For my sake you have earned Maeglin’s hatred. He might take it into his head to kill you.” “I doubt he would go so far,” said Randir, “And he would have a hard time indeed to kill me.” “But the greatest swordsmaster in the world cannot prevent a knife in the back,” Idril responded. “You are a good friend, Randir, and I would not see you dead.” “I shall not be killed,” said Randir firmly. “I know that I shall live until I fulfill my purpose. I need fear neither arrow nor sword, for the time of my death is the business of Ilúvatar. I leave it to him to concern himself with that.” Idril nodded in silent agreement, and looked out over the city. She was, as Maeglin had said, very beautiful. Her hair was gold, something rare among the Gondothlim. She wore a simple white garment, and always went bareheaded as well as barefoot, earning her the nickname “Celebrindal”, silver-foot. “Maeglin accused me of protecting you so that I could take you myself,” remarked Randir, deciding it was best that she know. He did not know how she would react, but she simply smiled. “He said that in rash anger, but he may have convinced himself of its truth to keep a prejudice against you,” she replied. “You and I have known each other for hundreds of years. I’m sure my father would not refuse you if you asked for my hand. But of course neither of us feel that way.” “No,” said Randir. He paused. “Though I am rather surprised that you have not married yet. You would be safe from Maeglin if you did so, and most elf-maidens marry by the time they reach your age.” Idril smiled again. “I have met none with whom I would wed,” she replied. “But even then,” she added quietly, “I do not believe I would be safe from Maeglin.” “I shall keep you safe,” promised Randir. “Even you cannot do that entirely,” Idril said. Randir stood near Idril and his friend Tarthalion as they walked along the walls leisurely. “Have you crafted any sculptures recently?” asked Tarthalion presently. “No,” Randir replied. “Ever since I shaped that Ainu I have not laid my hands on a tool.” “You are the finest sculptor in Gondolin, Nathernil,” Tarthalion said. “You should sculpt more often.” “I sculpt only when I am moved to do so,” Randir responded. “I have found no new subjects that inspire me to sculpt. I have done the Lords of the Eleven Houses. I have done Turgon King, and the Eagles of Manwë.” “Yet it seems you create nothing for yourself,” said Tarthalion. “Your own room in the palace is almost unadorned. You have given all your statues to various persons and gardens. Your finest sculpture, that of Ulmo, rests in Gar Ainion.” “What do you suggest I sculpt for myself?” asked Randir impatiently. “What are you trying to say, Tarthalion?” “Nothing,” said Tarthalion, shrugging. “But sometimes I think it would be a good idea to sculpt the Lady Celebrindal.” “Her I have sculpted before,” said Randir, laughing, while his charge smiled. “Indeed, her statue sits beside that of the King in the palace.” “I meant,” said Tarthalion quietly, “When you had killed the demon-orc.” Randir started. “Tarthalion, that was no great deed. Idril herself might have killed it if I had not stepped in.” “She had only a dagger, and the demon-orc carried a great mace with a head as large as hers,” replied Tarthalion. “You have portrayed many of the greatest deeds of the elves. Your act was one of the highest-praised by Turgon, and yet you fail to sculpt it. There is an empty place in the statues of the deeds of the Ñoldor. I noticed that you have done the picture of your cousin, Aglaru, saving them from the Grinding Ice. Yours is at least as much credit as his.” “I am sure, Nathernil, that there is not an elf in the city who would think you did it out of pride,” said Idril. “There shall be another sculpture,” said Randir in a strange voice. “Small, yet the greatest to ever be made in Gondolin. And it shall have thee, Lady Idril, and two others.” His friends looked at him closely. “Are you speaking from foresight, or guessing?” asked Tarthalion. Randir only shrugged. “I do not know,” he said. Suddenly they heard a silvery horn echoing across the valley. They started and turned to look across Tumladen toward the Gates. “That is Ecthelion’s horn,” said Idril. “Someone is come,” said Randir. “Yet they sing welcome rather than warning.” “Who has come?” wondered Tarthalion. “Huor is dead, and Húrin must be very old if not dead as well. It cannot be a messenger, for they did not give the customary call for such a circumstance.” “Nay,” said Randir so quietly the others could not hear him. His ear had caught what sounded like far-off music, barely audible. “I believe it is a messenger. But not of elf, nor mortal man, nor any living being in Middle-earth.” [edit] Herald of Ulmo After some time the watchers could distinguish three figures came striding down the great white road toward the white city. Their leader Randir recognized well. It was a great and tall elf-lord, whose face was like the stone of the mountains, and whose stature was like that of the trees, but his eyes were like rayed stars, keen as those of the Eagles of Manwë that circled above. He was robed in white and blue, and his belt was silver. A great sword hung at his side, which had a hilt inlaid with the clearest and most sparkling diamonds. The second was an elf wearing a sea-green cloak that seemed old, but his face also Randir recognized. “That second elf is Voronwë, one of the mariners the King sent to search for passage to Aman,” said Randir in amazement. “He has not been seen in many years.” Then he examined the third. He appeared to be a mighty elf-warrior clad in shining silver armor. He was immensely tall; taller even than the Gondothlim. His shield bore the device of a white swan’s wing. His helm had beautiful silver wings set with gems, and his stride was mighty; each step strong and resolute. Then, as they came closer, Randir realized that the person was actually a mortal man. Then he knew the armor, though he had not seen it in hundreds of years. “That last one is a man,” he said. There was a noise of exclamation from Tarthalion. “There has not been a man here since Húrin and Huor,” he remarked. “And the armor he wears,” continued Randir, “Is that of the Herald of Ulmo!” After Turgon had left his original city of Vinyamar, he had, by the direct order of the Vala Ulmo, placed in it armor. Ulmo had told him that if ever Gondolin’s fall was imminent, that he would send to him a messenger dressed in such armor, and by that would Turgon know that he was the one sent. “It cannot be,” said Tarthalion. “It is,” said Idril. “I remember the armor well.” “He shall shortly be brought before the King,” said Randir. “Tarthalion of the House of the Swallow, go and warn King Turgon of the approach of Ulmo’s messenger.” “We shall be there shortly,” added Idril. While Tarthalion hurried off, she and her bodyguard walked down from the wall and across the city toward the palace. By the time they reached it, there stood King Turgon by the fountain. Turgon was a man of great stature. His face showed wisdom and justice, his eyes age and experience. His robes were of white, while there was a gold belt around his waist and a crown of garnets upon his head. In his hand was a staff, the Staff of Doom. “Idril,” he said as he saw them come. “Is this message from you indeed true?” “It is, father,” Idril replied. “I have seen him.” “My lord,” said Randir quietly, “It is a man.” “A man?” asked Turgon in surprise, and he frowned. “Voronwë the mariner walks beside him,” continued Randir. “And Ecthelion of the Fountain.” “Ecthelion is great in judgement,” said Turgon. “I shall believe what he says. See, they come at the head of a procession up the street.” An elf ran up. “He names himself Tuor son of Huor, sent by Ulmo himself with a message for you, Lord King.” “Is the end nigh indeed?” wondered Turgon. “Let him come!” The three persons marched up the street toward the palace, followed by many of the curious and awed Gondothlim. The man stepped ahead as they came to Turgon, and bowed. “Welcome, O Man of the Land of Shadows,” said Turgon. “Lo! thy coming was set in our books of wisdom, and it has been written that there would come to pass many great things in the homes of the Gondothlim when you fared to this place.” Then the man who called himself Tuor spoke suddenly and loudly, so that all could hear. “Behold, O father of the City of Stone, I am bidden by him who makes deep music in the Abyss, and who knows the mind of Elves and Men, to say unto thee that the days of Release draw nigh. There have come to the ears of Ulmo whispers of your dwelling and your hill of vigilance against the evil of Melkor, and he is glad: but his heart is wroth and the hearts of the Valar are angered who sit in the mountains of Valinor and look upon the world from the peak of Taniquetil, seeing the sorrow of the slavery of the Noldor and the wanderings of Men; for Melkor rings them in the Land of Shadows beyond hills of iron. Therefore have I been brought by a secret way to bid you number your hosts and prepare for battle, for the time is ripe.” His voice was deep and rolling, and filled with great majesty. Turgon looked at the man in surprise and wonder, but then he frowned. “I will not do so, even if it is the words of Ulmo and all the Valar. I will not adventure this my people against the terror of the Orcs, nor imperil my city against the fire of Morgoth.” Randir glanced at Idril, and saw that she was watching the man closely. Suddenly he felt a strange feeling in his heart, and guessed what would come to pass. Tuor looked at the High King full in the face. “Nay, if thou do not now dare greatly then the Orcs will forever dwell and possess in the end most of the mountains of Middle-earth, and will not cease to trouble both Elves and Men, even though by other means the Valar shall contrive to release the Noldor; but if thou trust now to the Valar, though terrible the encounter then shall the Orcs fall, and Melkor’s power be diminished to a little thing.” “I am King of Gondolin,” said Turgon firmly. “We have worked for hundreds of years to build a great city, impregnable, and almost as beautiful as Tirion across the Sea.” Tuor sighed. “Then I am bidden to say that men of the Gondothlim repair swiftly and secretly down the river Sirion to the sea, and there build them boats and go seek back to Valinor: lo! the paths to there are forgotten and the highways faded from the world, and the seas and mountains are about it, yet still dwell there the Elves on Tirion and the Valar sit in Valinor, though their mirth is diminished for sorrow and fear of Melkor, and they hide their land and weave about it inaccessible power that no evil come to its shores. Yet still my thy messengers win there and turn their hearts that they rise in wrath and smite Melkor, and destroy the Hells of Iron that he has wrought beneath the Mountains of Darkness.” “Every year at the lifting of winter have messengers repaired swiftly and by stealth down to the river that is called Sirion to the coasts of the Great Sea, and there built the boats to which swans and gulls have been harnessed or the strong wings of the wind,” replied Turgon, “And these have sought back beyond the moon and sun to Valinor; but the paths to there are forgotten and the highways faded from the world, and the seas and mountains are about it, and they that sit within in mirth reckon little of the dread of Melkor or the sorrow of Middle-earth, but hide their land and weave about it inaccessible power, that no tidings of evil come ever to their ears. Nay, enough of my people have for years untold gone out to the wide waters never to return, but have perished in the deep places or wander now lost in the shadows that have no paths; and at the coming of next year no more shall fare to the sea, but rather will we trust to ourselves and our city for the warding off of Melkor; the Valar have been of only scant help before.” The man’s face took on a sad look, one of failure, while his companion Voronwë wept openly. Many of the elves turned their faces away, and gradually shifted off. Tuor sat down wistfully by the fountain, seemingly listening to some far-off music. His eyes turned up, and suddenly met Randir, who instantly took this moment to probe into his mind. He saw truth in the eyes, and suddenly felt that his fate was bound to this man’s. He knew with the eyes of the foresighted that this was not the last he would see of Tuor. He also saw a strange longing, and seemed to catch glimpses of a music playing in the man’s soul that he could not quite distinguish. The Turgon stepped down and laid his hand on Tuor’s shoulder. “You are weary,” he said kindly. “I see that the favor of the Valar is on you, mortal though you be. Come, rest and bide in my fair city, even in the royal halls.” Tuor nodded slowly, then stood up and looked the king in the face. “I will, Lord King.” And suddenly his eyes strayed past Turgon, and caught those of Idril. Perhaps Randir only of all the Gondothlim, and Idril, knew then that Tuor would stay for a long time. Tuor was given fine quarters next to Randir’s, and after he was settled the King drew Randir and Ecthelion aside, while Idril stood nearby. “What do you think of our guest?” he asked. “He spoke with the voice of Ulmo, that I could tell.” “He is more like to one of the elven kindred than of men,” said Ecthelion. “Do you believe it is wise, then, to not take Ulmo’s advice?” asked Randir. Turgon was silent for a moment. “Randir, you of all people know how much work we spent on this city. Its beauty is unmatched in the Realms of the Exiles. What is more, the defenses are unequaled. I believe fully that it is unassailable. Our gates cannot be battered down. Our walls provide protection from enemy archers. There are only two ways to reach the city, and that is through the great staircases up to the Main Gate and the North Gate. It would be next to impossible to go up them under fire from our archers. There is no way to climb the hill. Its rock is like iron, and no foothold does it leave. No, my friends, I shall risk trust in my own wisdom in this matter.” “I am just remembering an uncle of yours, my lord, who suffered to go against the Valar, and caused nearly all the Elves in Aman to pay for it,” said Randir quietly. “The Valar cannot see all ends,” said the King. “They are not Ilúvatar. Fëanor disobeyed them. I am not taking their advice. There is a difference. And I do believe in the hopelessness of the attempt anyway. Many mariners have perished at sea searching for the Undying Lands. Why should I believe that the Valar will be exceptionally gracious in our case? And as to sallying out, I do not think that the Valar could strengthen us to defeat them if they themselves sit on Taniquetil and do nothing against Morgoth.” “The time for their intervention, my lord, is not ripe,” said Randir. Turgon looked at him thoughtfully. “Randir, you are a wise and foresighted man, as well as knowledgeable about the history and customs of the Eldar. I fear no harm to Idril. If you could be relieved of your duties for a time each day to train this Man in our ways. I have seen the power of his voice, and know there is the spirit of an elven king in him. But he is a man, and must be taught the histories and the arts.” “I will do my best, my lord,” said Randir, bowing. “But who should replace me as your daughter’s bodyguard while I am away?” “There is no-one who would harm her,” said Turgon with a wave of his hands. “I appointed you bodyguard in the days in Vinyamar, when there might well have been treachery and bloodshed. But now you have become more of a companion than a guard. I do not believe it would imperil her. Of course, she would have to give her consent.” “I give him my leave,” said Idril. She hesitated. “Also, father, I would that you give me leave to speak with him as well.” Turgon smiled, and his wise face that had seemed so grave took on the look of a quiet morning, when the sun is just coming up from the mountains of the east. “You have my leave,” he said. Randir knocked and walked into the chamber of the man Tuor. The man had taken off his armor, and was now dressed in clothes of bearskin that made him seem less and elven-lord and more a hunter of the forest. “I am Randir son of Erwaheno,” said Randir. “I am an elf of the House of the King, and the bodyguard of his daughter.” The man stood up and bowed. “I am Tuor son of Huor. Long have I journeyed to find this hidden city.” “I have been given the assignment to train you in the ways of the Noldor,” said Randir. He glanced over his shoulder. “I would have you meet Idril Celebrindal, the king’s daughter.” Idril entered, and Tuor stood looking at her, still as stone. Randir touched him on the arm and Tuor shook himself and bowed. Idril blushed and turned away. Randir wondered at this, but motioned that Tuor follow him. “Where are we going?” Tuor asked. “To the Grand Hall,” replied the elf-lord. “There I shall teach you the History of the Noldor.” They entered the Great Hall, a massive room of white stone shaped like a regular decagon. On each wall there was a great painting in rich colors, portraying the history of the Noldor. Or rather, the entire wall all the way around was a single ongoing painting, with breaks only where the round buttresses rested in the corners. There Randir began to teach, starting with the creation of the Ainur by Ilúvatar. He worked around to the right, and many things did the amazed Tuor see. At last Randir reached the last image: the building of Gondolin. “You must know this, for your father perished in that battle, but the Nirnaeth Arnoediad is not included,” said Randir. “The painter had only worked it out up to the building of Gondolin.” “Though there is one depiction of the Nirnaeth Arnoediad,” interjected Idril. Randir turned red while she took Tuor’s arm and led him into an adjoining room where there were many statues. But one of the central ones was a life-sized sculpture of several figures. The most prominent of these figures were two men and an elf. They stood facing one another, the hand of the foremost man gesturing in a “leave” motion toward the elf. “That is my father, Huor, and my uncle, Húrin,” said Tuor in astonishment. “And they are speaking with King Turgon. Their swords are drawn, and I recognize the insignia of the two retainers behind my father.” “Yes,” said Idril. “Randir, who we call Nathernil, sculpted this on a time. Many of his other sculptures may be found in this hall.” “How do you know it is them?” asked Randir. “You were born after your father and uncle were killed.” “They could be no others,” said Tuor. “I know from that man’s face he could be none other than my father. How real it seems!” “There are few in Gondolin so gifted as Randir in the art,” Idril remarked. Randir wondered at Idril’s speech, for she seemed less quiet than usual. “I would give much to paint and sculpt, and write music as do the Noldor,” said Tuor wistfully. “I shall teach you such,” said Randir with a smile. “You are a Lord of the Gondothlim now, Man though you be. You shall find your skill. A weapon you have.” “Yet it is not the one of my choice,” Tuor replied. “When I hunted in the wild I bore a great axe.” “That can speedily be made,” replied Randir. He drew out his own sword. “This is Cellagar, Running Blood, who was one of the Seven Swords of Gondolin. The others were Glamdring, which Turgon bears, Dagnaur, which Ecthelion bears, Orcrist, which Egalmoth bears, Galtog, which Penlod bears, Belegdram, which Salgant bears, and Umgûr, which Saelgûr bears. Your axe shall be the finest, which shall compare to the mightiest blade in Gondolin, save only Anguirel sword of Maeglin.” “It is a fine weapon,” remarked Tuor, touching the blade. Randir returned it to his sheath. Later that day Randir and Tuor went across Tumladen to the forges of the House of the Hammer of Wrath, where they met their commander and chief armorer, an elf tall but bent over, with an arm of iron. He had a long whip-scar across his face, which he had received being tortured by Morgoth’s orcs. His name was Rog, an ancient name of primitive Sindarin that he still bore proudly, despite its uncomeliness in the speech of the Noldor. “What can I do you for you, Lord Randir?” asked Rog. “I wish for a hand-axe of the finest quality,” Randir replied. “It should be made for a strong man, yet I wish that it be light and curved, ready to deal a slash as well as a blow.” “It shall be done,” said Rog, bowing. “Who is this to be for, if I may ask?” “Tuor son of Huor,” said Randir, motioning to his companion. Rog bowed again, this time to the man, and turned to the forge, where he was crafting a sword. “The people of Gondolin are getting careless,” he called to them as he pumped. “They have neglected the practice of weapons, and laid aside their weapons to rust in a corner. They no longer increase the size of the arsenal.” He drew the blade from the coals and began hammering the white-hot metal. “No, mark my words, one day all shall have need of weapons. They shall find their arrows spent, and the number of swords inadequate,” he said prophetically. He raised the sword up to make sure it was straight, then placed it in the cool water. Randir bowed to the smith and departed, Tuor at his side. “You must also wear clothes befitting a lord of the Gondothlim,” said Randir. Tuor looked at Randir with an expression of distaste. “You shall not find it hard, I think,” remarked Randir, “To change from your rough bearskins into fine cloth. What is your favored color?” Tuor looked a bit embarrassed, then said quickly “Sea-blue, if it pleases you, my lord.” “You needn’t call me such,” said Randir. “We are equals now.” His eyes caught Tuor’s and held them. “I see, you feel that you are inferior to the Lords of the Gondothlim. Do not feel so! When the elves fade from the earth, and are remembered no more, then will man still remain, and take his place appointed him since the Music of the Ainur.” Tuor looked curiously at Randir. “Are you one of the foresighted, then? A mystic of Gondolin, and with magic in your blood?” “‘Magic’ is a strange word, Tuor of the House of Hador,” Randir replied. “You may call it magic. Others call it ‘power’. But in its uncorrupted form gifts of foresight, of strength, of healing, and others are skills and abilities brought about through the Flame Imperishable. The elves are blessed only for a short time. We are not made to populate the world, but prepare it for the coming of Men, or such is my wisdom, though many of our elders believe otherwise. But we fear not death. The souls of Elves fly to Mandos, the Halls of Námo, where we shall be re-embodied, or wait until the Last Day when all will be made new, and the Ainur shall sing into existence another world. But where the souls of Men go we know not. Is it spoken of among your people?” “The way across the River of Death is shrouded in dark mist,” said Tuor. “We cannot see what lies on the other shore. Shall our kindreds be sundered, do you think?” “We the Elves believe that Death is a turning point, and the years shall be ‘larger’, so to speak,” said Randir thoughtfully, looking out across Tumladen. “I have never tasted death personally, though others have died around me. Men go not to Mandos. But I do not believe that our paths shall forever be apart. Perhaps at the remaking of the World.” “Are you certain, then, of Life beyond the River of Death for Men?” asked Tuor. “Do you know, Tuor son of Huor, anything beyond what you see, smell, taste, feel, and hear?” asked Randir. “Even the Valar cannot see the uttermost outcome of the passing called death. Ilúvatar has graced Men with death for a reason. Why would that be if it were not Life after Death?” “But do you not ever doubt that Ilúvatar exists?” asked Tuor. “After all, He gave the Valar charge over the earth. And why would He permit such terrible suffering as the peoples of Middle-earth endure?” “Ilúvatar exists,” confirmed Randir. “You must believe He does before you know He does. You must feel Him. You cannot know whether a chair is safe until you sit down in it. Permits suffering, you say? I believe that ‘permits’ is a good word. He is not the instigator of suffering. By his own laws, the laws of Free Will, there is by necessity some danger of falling from glory, and further His grace. But I believe that in the end all wrongs will be righted. Death is no punishment for those who are cleansed of evil, but a reward. Torture is temporary; it only lasts a little while, and in the end will be compensated for. The suffering will only last for a little while. You shall see Him in the end, and the stars behind his eyes will shine in yours.” “What about Morgoth?” persisted Tuor. “What will happen to him and his followers?” “The soul is imperishable,” said Randir. “Though he was in the bliss of the utmost, he fell from it for the wish of power; powers that belonged to Ilúvatar alone. It is proud indeed to believe yourself equal to or greater than your creator. He shall not turn, but will be condemned. He will be shut out from bliss by his own choosing, and where Ilúvatar is not, there Good is not. There is no peace there, for peace and happiness are of Ilúvatar. He shall dwell with only the creation of his hands – and that is pure discord. If I can speak indeed for Ilúvatar, then I would say he shall not be given yet another chance. He has proven he shall not turn.” “Then are you indeed one of the foresighted and the wise?” asked Tuor, amazed at Randir’s vast knowledge. Randir smiled. “They call me a Loremaster, and a Keeper of Wisdom,” he responded. “I am a councilor of the King. But do not think I am the greatest in Gondolin. For none is greater in wisdom than Turgon King himself, and then beside him Golmaethor.” “Yet has either of them foresight as thou?” asked Tuor. “Surely, if all of Gondolin’s lords know as much as thou, Gondolin must be the greatest city in the world.” Randir smiled again. “It is true I am gifted beyond most in Middle-earth, though the greater part of the High Elves possess a small degree of foresight. It is said that of the Masters of Foresight there are now east of the sea but four: Aglaru Bregolharn of Caras-Giliath, Círdan of Balar, Glorfindel of the Golden Flower, and Randir of Gondolin.” He did not speak boastfully, but as if it were just a fact. The elves believed that one talent was of equal worth to another, and it was neither arrogant nor thought arrogant to speak of one’s own accomplishments. “Of old there were many more, but their voices have been silenced. Doriath is destroyed. Nargothrond is sacked. The Falas is deserted. Hithlum is burned. Of the High Elven realms there remains but three: Himring, the settlements by the Bay of Balar, and Gondolin.” “Can you foresee things by your own choosing?” wondered Tuor. Randir shook his head. “I see only what is given me to see,” he replied. “But this I see shall come of you: a light rising over the waters of the west, and a star to shine in the morning. What it means I know not.” Then Tuor looked at Randir in amazement, but said no more for a long while. Several weeks passed. Tuor’s training was conducted primarily by Voronwë, the elf-mariner that had helped Tuor find Gondolin, and Randir. Also Tuor was taught weaving and spinning by none other than Idril herself. It was not looked down upon when learned by men, though oftener the women were the more skilled in the art. But Tuor soon showed remarkable talent in these and many other fields, including music, art, and architecture, all fundamentals of education in Gondolin. Randir also found great skill in him with weapons. Tuor had the strength and the eye for it, all he lacked was technique. This was taught by Randir, the finest swords-master in Gondolin, and Tuor caught on quickly. “Sometime, I fear, you shall be the swords-master of Gondolin rather than I,” said Randir laughingly as they sheathed their weapons after a heated exercise on a grassy spot in the Square of the Folkwell. “If you keep going at the rate you are improving, in hardly a month you shall be a dangerous warrior.” “I have hunted birds and beasts before, but never men,” Tuor replied. “I have not seen battle or the shedding of another man’s blood. Yet I know what it is to hate. Yes, I have hated Morgoth ever since I first heard his name. My father and uncles were killed by him, as was my grandfather, and my mother of grief. I know not the fate of my cousins, but rumors of horror came to my ears when I still wandered in the woods and fields of Middle-earth.” A faraway look came into his eyes. “By the conches of Ulmo was I called to Gondolin, Nathernil, my friend and master. But now I hear his music, and long for the sea. At times I think of slipping away, leaving Gondolin, and finding the sea. But…” he broke off. “Something holds you here,” said Randir understandingly. “And I believe I know what it is.” He looked beyond Tuor, and Tuor turned as well. There was Turgon walking toward them – and Idril at his side, her golden hair streaming out behind her, and her bare white feet stepping noiselessly along the clean white stones. Randir and Tuor stepped off the grass and strode over to where the newcomers approached them. “Lord Randir, Tuor,” said the King, bowing to each in turn. They returned the bows, and Randir saw Tuor’s gaze stray to Idril, who saw it, flushed, and turned away. Turgon either did not notice, or pretended not to do so. “How has the Lord Tuor been coming in arms, friend Randir?” asked Turgon. “He has been doing most excellently,” Randir replied. “Someday I daresay he shall pass me in skill.” But Turgon’s sharp eyes moving quickly over Tuor caught something. “Come now, Tuor,” he said. “You should know better than to hang you scabbard at such an angle!” Tuor corrected it with a smile, and Turgon, who was nearly as tall as Tuor, laid his hand on the Man’s shoulder. “You’ll do well, my son,” he said. He turned and walked away. Idril hesitated a moment longer, watching Tuor, and then followed, the Man staring after her. “He is a great lord of the elves,” commented Randir. “I have seen many, and few so wise and mighty as he.” Tuor seemed to wake from some engaging thought and voiced his assent. A few more days passed, and Tuor began to settle well into his life in Gondolin. But then something happened that would not quickly be forgotten by the Gondothlim. It was evening, and Randir was walking with Tuor and Voronwë. He had been quite distracted from his duties of guarding Idril in the education of Tuor. Voronwë, Tuor’s companion, had been a great help in relieving many of the studies, particularly those pertaining to navigation and music. Voronwë also was an interesting, if quiet, companion; the sort of person who did not hold a lot of presence, yet the sort of person it felt good to be around. “I do not remember ever seeing the stars so bright as looking up from Gondolin, even sitting by the sea,” remarked Tuor. Voronwë stirred. “Yet the shadow of Morgoth grows in the north,” said Randir, and as he said it a chill went up the backs of his companions. As if to illustrate his point, a dark cloud – coming from the north – enveloped the moon in its thick blackness. Tuor shivered. “Voronwë, have you found your lodging in the south of the city pleasant?” asked Randir. “Yes,” said Voronwë. “Most comfortable.” “We must part here,” said Tuor. “Farewell, Voronwë my brother. I shall see you tomorrow, or so I hope.” “And I you,” Voronwë began to say, when Randir’s keen elf-ears caught something, and he motioned that Voronwë be silent. They were at this time very near the palace. Two voices came drifting to their ears. They were speaking softly, but the streets were silent enough, with only the singing of the night-birds and the splashing of the fountains, that Randir and Voronwë could hear what was said, though Tuor could barely make out their voices. “I don’t believe it,” one was saying. “That bodyguard is the finest swords-master in the city. If he catches us, we will both be killed.” “Look,” said the other, whose voice was calm and confident, yet had a ring of evil in it. “This Randir is not expecting anything. If he comes back, we shall have Heledir stab him in the back.” Randir gripped Voronwë’s arm, and loosened his sword-belt. “But what if the alarm is raised early?” asked the first. “The diversion should be enough,” said the second. “Hush, now! We are nearly to the palace.” Randir turned to Voronwë and hissed in his ear. “What do you think they are going to do?” Voronwë shook his head. “Whatever it is, they want you out of the way.” “I think I know the first voice,” said Randir grimly. “I could be mistaken, but it sounded like that of Dolglin, one of Maeglin’s retainers.” “Then we must hasten,” said Voronwë. The same thought had occurred to both their minds. “What is going on? What did they say?” asked the bewildered Tuor. “It appears as if Idril is about to be abducted,” said Voronwë coolly. “Should we call in the guard?” asked Tuor. “Nay,” said Randir. “Voronwë, I want you to go to Turgon and have him ready his company, but not to attack, as to ensure that none escape. Tuor and I shall find Idril and wait for our opponents.” “Be careful,” said Voronwë simply, then he dashed off into the night. “Keep your weapon sheathed,” said Randir to Tuor. “We don’t want any moonlight shining off swords or axes in our hands.” They approached the palace, and soon spotted the two dark forms under the shade of the trees. “No guard,” murmured Randir. “I daresay Turgon will post a guard after this!” The abductors crept slowly through the palace gate, which was, for some strange reason open. Randir guessed that they had a confederate inside who had opened the gates for them. They hurried forward, watchful, and entered after the others. Randir saw them head for Idril’s room, walking quicker now. He moved stealthily closer. He suddenly saw four other dark shapes waiting around the door. At a signal from the leader of the two, three of them dashed off to somewhere else in the palace. Randir had no choice but to let them go. Now there were only three left. One waited by the door – the others burst in. Randir decided that this was the time to act. He drew his sword and charged, cutting down the startled door-guard in a single stroke. He entered the room to see two persons tying Idril’s hands behind her back. She had already been gagged, and a sack had been thrown over her head. They stood up, startled, as Tuor and Randir entered with naked blades. One of them cursed. “It is only two of them. Cut them down!” They charged forward. Tuor met one, parried a blow, then gave his opponent a stroke that split open the elf’s head. Randir, despite his skill, found a trained adversary. The elf exchanged several blows, then stepped back and blew what looked like a small flute or whistle. Tuor turned around and gave a cry of warning. Randir leaped out of range of his adversary’s sword, turned, and saw three other dark figures charging them. But before Randir could think, the elf with which he had already fought leaped out of the doorway and dashed off toward the palace gate. “The guard will catch him there,” remarked Tuor. He raised his axe and decapitated one of the new attackers. They halted, but before they could flee Randir’s sword found the heart of yet another. The last turned in terror and sprinted away. “Voronwë will have raised the palace guard,” said Randir. “Let us see to the Lady Idril.” He went back, and leaned down over where she was set. He untied the knots, threw the sack off her head, and undid the gag. She was breathing heavily, but unhurt. “Randir,” she said. “You came in time, my brother.” Randir smiled. Then she looked past him, up at the still-standing Tuor. Tuor managed a smile, and Idril returned it. “Could you identify your attackers?” asked Randir. “No,” she said, shaking her head. “But I think they were miners from their speech.” “Maeglin’s men,” thought Randir, though he did not express his feelings out loud. It turned out that the abductor that had challenged Randir had escaped the hands of the guard, though the second was caught. “His name is Cabtaur,” said the sword-wielding Turgon. “He is of the House of the Mole.” No sooner had he spoken when an arrow flew from the shadows and landed in the kidnapper’s breast. Cabtaur slumped in the arms of the guard, dead. Some ran toward the place from where the arrow had come, but found no-one. “How queer,” remarked Turgon. “Why would anyone abduct my daughter? There has not been a crime, from grand theft to pick-pocketing, in over sixty years. The perpetrators must die for this.” “It appears that most of them already have,” Randir remarked. “I am grateful, Randir,” said Turgon. “You have already done much for me, and I shall never be able to pay you back fully for you services.” “What other things has he done indeed for you?” wondered Tuor. “Rescued my daughter, been one of my foremost councilors and friends, and failed an errand when he was but a young lad and my errand-rider,” said Turgon, smiling at the memory. “I might have given him authorization to form his own house. But he would rather stay attached to the House of the King. I could have given him all the mines in the south of Tumladen, or the watch of the Seven Gates. But he would rather be a simple soldier, though with the esteemed position of Idril’s bodyguard. Yes, he has done much for me, and I daresay he shall do much more, if he does not give up his life indeed for me and my daughter.” All of Gondolin frowned when they heard of the incident, but one person frowned deepest of all, not from sorrow or fear but because of failure, though a light glinted from beneath dark brows. [edit] Messenger and the Plot The search for the last abductor was unsuccessful. Randir remembered the voice, and suspected someone indeed – Dolglin. But he could not prove it. So one day he walked directly up to Dolglin, who had been in the city at the time of the abduction. Dolglin was an elf shorter than most, with no skill in music or art, but an excellent swordsman. His father was a miner of Maeglin, and an overseer. Dolglin looked up in surprise at Randir’s approach. He had been walking leisurely along the Alley of Roses. Randir motioned him aside. “What do you want with me, Dîr en-Aran?” he asked in a sneering tone, but Randir noticed the slight twitching that wanted escape in his eyes. “Just this, Dúath en-Sabar,” replied Randir. “Do you deny that you were involved in the near abduction of Idril Celebrindal the King’s daughter?” The elf’s eyes widened, and Randir thought he glimpsed fear. But they hardened instantly. “Yes, I do deny it.” “I cannot prove your guilt, to myself or to any other,” said Randir. “But if you did have anything to do with this recent incident, be sure that you shall not be spared from my sword entering you heart.” We that he turned and strode away to where Tarthalion awaited him. “What if you are wrong?” asked Tarthalion as they walked back toward the palace. “The warning will still do him good,” said Randir. “Yes, I cannot be entirely sure that he is the one, but I believe in my heart that he is. His mind is strong; I cannot probe it. He nearly gave himself away by showing fear, and if he were considered an honorable elf I would think this proof of his guilt. But he has been involved in… incidents before, that were covered up by Maeglin. Secretly I believe that Maeglin thought up this scheme, and Dolglin was given charge of carrying it out.” “Just don’t mention this to the King,” said Tarthalion nervously. “He thinks the world of his nephew, to borrow the colloquialism.” Meanwhile, Dolglin entered a house not far from where they walked. A dark figure stood waiting for him. “You did an impeccable job last night,” said the figure sarcastically. “I do not know what I shall do with you. It is a good thing you shot that one they captured, or it would be our necks. And I stood waiting at the foot of the stair with the horses, waiting almost all night for you. I might have been caught.” “That Randir arrived,” whined Dolglin. “He was too strong for any of us. And he had that Tuor with him.” “I have noticed that Tuor is slowly taking over the affections of the King, who never had a son,” said the figure after a pause. “We may need to remove him.” “But, lord,” protested Dolglin, “Won’t there be questions asked? And why do you go to such lengths? Even if you succeeded, you would no longer be allowed to enter Gondolin and enjoy your prize.” “On the contrary,” said the figure, “I could keep her in that abandoned mine, where it is known I go often. I could return just as bewildered as any at the strange disappearance of the Lady Idril. And I am sure that after I had bided my time, I could beg leave of the King to depart from Gondolin for a short while, for some thing or another. I cannot remember the last time he let an elf out of Gondolin, save for the mariners and a few trustworthy scouts. But I shall be able to convince him. Then, I would leave with the Lady Idril, and we would go east, beyond the mountains of the dwarves, and be married. We could start our own city in the mountains, and she could never return.” “So should we try it again tonight?” asked Dolglin. “No!” said the dark figure sharply. “They will be on their alert now. We must wait a while. And Randir will be on guard. We must wait. If it takes two months or two years, or even two decades, we must wait until we can be sure of success.” Then the figure laughed a dark laugh, and the King’s nephew turned away from his retainer. Some years passed uneventfully. As Randir had predicted, Tuor soon became exceedingly skilled with his axe, and it was said that he was next only to Turgon, Randir, Maeglin, Glorfindel, and Ecthelion. He also came to write his own music, and Voronwë often remarked that they reminded him of the sea. “They do indeed,” remarked Randir one of those times, as they sat in the Square of the Folkwell. “I have seen the sea only once, and that was in the desertion of Fingolfin in Aman. Yet my heart cried out Alatairë! Alatairë!, which is the Quenya name for Belegaer, the Great Sea. My cousin Aglaru dwells now by the sea, or did last I heard from him many years ago.” “You have taught me much of music, Randir, though Voronwë has been my primary instructor,” said Tuor. “But I have never heard any of your compositions. You have sat and spoken with Maglor himself as a friend. Surely you have written something.” Randir smiled. “I have indeed written several songs. I must admit that Aglaru writes better music than I, but I shall sing my best.” He stood up and began a song in his deep voice, one that seemed both sad and longing. From Cuiviénen we walked Across the lands of Middle-earth Guided by the bright stars that shone Like flashing diamonds of great worth. O Cuiviénen! by elven eye Shall thee no more be seen, we sigh. From Aman’s white shores we did sail And did reach green Middle-earth’s strands Passing on from the fairest place The fairest of all beauteous lands. O Aman fair! We left, did roam Across the sea, from our one home. Randir halted and looked at his listeners. “That was fair indeed, Randir,” said Tuor. But before he could say any more, they heard the horns of Ecthelion sound, much like they had on the day Tuor had come. And they had the same notes – notes not heard since that day. “A stranger who is a friend,” said Voronwë quietly. “How could two find entrance to Gondolin?” wondered Randir. “I fear that mayhap the Eagles have relaxed their watch.” “Remember, I had lived in Gondolin once,” Voronwë said. “Ah, yes,” said Randir. “Well, let us see who it is. It shall probably take them a while to cross Tumladen. I wonder if the king knew about this. It is apparently not one of his scouts or his mariners, or they would use their codes.” “Hopefully it is not another mariner dragging in a mortal prize,” came a voice behind them. They turned to see Maeglin, and Randir saw the malice in his eyes. “Leave, Maeglin,” ordered Randir quietly. “I am a relative of the King’s,” Maeglin challenged. “I may go where I will in the city. And the Square of the Folkwell is a public place.” “I do not believe, Maeglin, that he intended this square for use by slanderers and cowards,” said Randir. Their eyes met and engaged in a fierce contest of wills. At last Maeglin drew his eyes away. “Well what are you doing here?” he demanded. “Where is your charge?” “The safety of the Lady Idril is no concern of yours,” said Randir icily. “And I believe, Dark Elf, that you would take every opportunity to ensure the opposite.” Maeglin laid his hand on the hilt of his sword with a exclamation of rage. Randir stood with his arms crossed, as solid as a statue. “Do not draw your sword on me, Maeglin,” said Randir, his eyes still fixed on Maeglin’s face, though the elf’s eyes avoided Randir’s. Maeglin scowled, but removed his hand from the hilt of his sword. “Do not think, Randir son of Erwaheno, that because of your fine skills with the weapon you are safe,” said Maeglin coldly. “There are other means of disposing of an enemy.” “And I am sure you would be base enough to try any of them,” said Randir. Maeglin glanced once again into Randir’s eyes, then turned and marched away. “He gave himself away there,” said Randir to his comrades, “By mentioning that he could kill me.” “That was a grand battle,” said Tuor. “You beat him there.” “It was hardly a skirmish,” Randir replied, and his shoulders relaxed. “Come now, let us see what friend knocks on our door.” They left the Square of the Folkwell, also known as the Place of the Well, and walked up to the balcony of the gatehouse. They stood with others, looking out across the green plain. The eyes of the Gondothlim were sharper than Hawk’s eyes, and they soon spotted a solitary rider, hooded and cloaked, coming up the paved white road, headed for Gondolin. The gates of Gondolin were unbarred and opened, as the horse strode with a little difficulty up the steep stair, and onto the streets of Gondolin. The guards soon gathered around, and were speaking in hushed tones with the rider. Then they motioned the rider forward. Randir stepped down from the walls and went with the crowd to follow the rider to the palace. Turgon had come out to greet the rider. “Welcome to Gondolin,” said the King. “Yet your coming is unlooked-for. Who are you, rider, and from where do you come?” The rider threw back her hood, revealing the face of a noble elf-woman with long dark hair. She was probably about five hundred years old, as fair as the women of the Gondothlim, who were exceedingly beautiful. Men would probably think she was as young as twenty-one, were it not for her regal bearing, but that was the way with elves: only other elves could tell their age, and then it was not by signs of aging so much as signs of ever-increasing maturity and wisdom. “I am a messenger from Círdan of Balar,” she replied. “I was guided by one of your own Gondothlim scouts who was resting at Caras-Giliath. He perished during our journey, but not before he had told me how to get here. Círdan sends a message, requesting you send soldiers to his aid. A large army of orcs at least seven times the size of his army is marching on the Havens of Sirion. He fears that he cannot hold them off long.” Turgon was silent for a moment. “No,” he said at last, “I cannot leave my city again, after the Nirnaeth Arnoediad. If I do so the city shall be discovered, and that could prove fatal in the end.” “Does Círdan indeed send his women for messengers on perilous and doubtful missions?” asked Egalmoth. “He must be sore pressed indeed!” The woman frowned. “Círdan could not spare a single warrior. I am related to him, and he chose me.” “You must rest,” said Turgon. “You are undoubtedly tired from your ride. We have few horses in the city, but the best of stalls. The grooms will take care of your beast. But we do not know your name, brave lady.” “I am Alfirinel, who once dwelt in Doriath,” the elf-woman replied. “But can you not send help, troops and equipment, down the Sirion?” “I cannot,” said Turgon. “It may be that the Valar will be gracious, but if the enemy is strong enough to defeat Turgon I cannot see that my army will help. And I would endanger the lives of all in my city.” The elf-woman looked dismayed. “Then I must return to him and deliver your response.” Turgon hesitated. “I am afraid that you must stay here. By our laws any who enter this city must not leave. You cannot help Círdan in any manner, and a journey so dangerous might lead to your capture. And forgive me, lady,” he said, bowing, “But I do not think that you could withstand torture for your information.” Alfirinel opened her mouth in disbelief, but before she could speak Glorfindel spoke in a gentle tone. “Surely your comrade warned you of this,” he said. “And I do not think you shall find life unpleasant here. In time the King may see it fit to release you, perhaps when the roads are safer.” “They will only be made safer by the King of Gondolin, who seems to forget that he is also High King of the Ñoldor,” said Alfirinel. Turgon frowned. “I will not risk thousands for the sake of one,” he said. “Ill came of the last time I broke this pledge. You do not have to stay in the city, if you wish. But I will warn you that escape is impossible. You are free to go where you will, but you must not leave Tumladen, or, woman though you are, your life will be forfeit.” So saying he began to turn, when Idril touched his shoulder. “Father,” she said, “It may be that this noble lady from the south would find it a lighter duty to serve me as one of my maidens.” Turgon raised an eyebrow, but turned back to where Alfirinel stood angrily. “You are without protection here,” he said. “By being under the protection of the Lady Idril, you would be able to live at the palace, and your wants be taken care of.” “I will accept your offer, my liege, though with the greatest reluctance,” said Alfirinel. Turgon walked back into the palace, but Idril stepped forward to the elf-woman. “I am the Lady Idril,” she said. The crowd had dissipated some, but Randir, Tuor, and Voronwë stood there still. “This is my bodyguard, the Lord Randir Nathernil, and the Lord Tuor, and the Lord Voronwë the mariner.” Each bowed as he was named. “You say you have come from Caras-Giliath,” remarked Randir. “I have a cousin there. You may have met him.” “I did not meet many there,” said Alfirinel. “I was just delivering the call to arms to the lord of that city.” “Who is indeed my cousin,” said Randir with a smile. “My cousin is Aglaru Bregolharn.” “He is doing well,” said Alfirinel, though her eyes widened. “He is second only to Círdan in the defense of Balar. But you are one of the Gondothlim, so surely you have not seen him in…” “About four hundred and fifty years,” said Randir. “He was not at the Nirnaeth Arnoediad. I never got to see him before the retreat.” “If you were anywhere near him in the Battle of Eglarest, you would have seen him,” said Alfirinel, excitement rising in her voice. “He and Círdan stood together in that battle. Círdan was dressed in blue that did not seem to grow either mud-caked or blood-spattered. His silver hair shone under the sun by day and the moon by night. And ever beside him was Aglaru like a white flame. He bore the Alcarmir, the gem of Fëanor, on his forehead, and none could stand before him. I did not see it, but many described the sight of those two warriors fighting side by side, though the enemy pressed thick around them, and all others fell back.” “When I left him, he was but a lad of hardly seventy years,” said Randir, falling back into remembrance. “But he had endured the Helcaraxë, and the Lord Fingolfin himself predicted great things for him. I am glad to hear he survived the destruction of the Falas, for many fell there.” “He nearly didn’t,” said Alfirinel. “He held the enemy at bay as the ships were loading, and Círdan himself could hardly persuade him to leave the doomed. They could not wait for stragglers, or else they would be overcome. Many perished that day, but Aglaru Bregolharn was not among them.” “What is he like?” asked Tuor, now very interested. Even to him rumors had drifted. He also had a special interest in Aglaru, him being the cousin of Randir. “He is tall, stern, and noble,” said Alfirinel after a moment. Randir was glad to see she was forgetting her troubles. “He is wise, and handsome, and though he has received several scars in battle they do not make him seem less so; indeed, if anything, fairer. He dresses usually in white, sometimes in a light green or blue. They say there are only three who can equal him in battle – Maedhros, Maglor, and Turgon. Círdan is accounted as the fifth, but we have no knowledge of the Lords of Gondolin, and cannot judge them in comparison to ours.” “Tell me of the Isle of Balar, and of Caras-Giliath,” urged Randir. “I have not seen either.” “I have never been to the Island,” confessed Alfirinel, “And I only passed through Caras-Giliath.” “Yet I have been to both places,” said Voronwë, stepping in. “Balar is strong, and will not fall easily. It is beautiful, large, and green. Círdan chose well for his home. Caras-Giliath is the fairest city left in Beleriand – unless it is Gondolin. And it is strong as well. I cannot quite put it into words.” “Yet darkness may soon fall upon it,” said Randir, shaking his head. “What are five cities compared to the might of Morgoth? Gondolin, Himring, Mouths of the Sirion, Balar, and Caras-Giliath – they are strong, but in the end they shall not be able to stand.” “Well, enough talk of troubled lands to the south,” said Idril, but she smiled. “Come, Alfirinel. I shall show you Gondolin. You must have been too tired to notice the sights, sounds, and smells. We are, after all, about the same age, and it is pleasant to have someone to talk to who is not a chattering young maiden of hardly forty or fifty years.” Alfirinel smiled, and followed Idril. Her horse had been taken by the groom, and she worried no more about that. Randir and Tuor watched after them. Randir did not know yet how much this event would affect his life. More years passed. Things did not change for the most part. Tuor’s training was soon completed, and was as the son of the King in the eyes of the people. One change was first noticed by Randir, and soon noticed by others. Tuor and Idril appeared to be falling in love. While Randir played his part as Idril’s bodyguard, he watched Maeglin very closely. He decided soon that Idril’s suspicions were valid, and that Maeglin might go so far as murder a lord of the Gondothlim. Seven years after Tuor’s arrival, he spoke with the Man on the subject. “Tuor, I fear for you,” he said. “We can speak frankly with one another, for we are friends and brothers. I know your attention has been captured by the Lady Idril.” Tuor blushed, but did not deny it. “Yet I have not come to speak to you about that,” he continued, “But what may result from it.” “It is foolish,” said Tuor after a moment. “I am a Man, while she is an Elf. Whoever heard of a Man wedding with an Elf?” “It is said that your relative through your mother, Beren, married Lúthien Tinúviel in the since-fallen kingdom of Doriath,” remarked Randir. “But it is not even about that I speak about. I speak of Maeglin.” “Yes,” said Tuor, and he frowned. “We have exchanged polite greetings, but he seems cold toward me indeed. And I fear what blackness lies behind his sharp eyes.” “Blackness indeed,” said Randir. “I have reason to believe that Maeglin has eyes for Idril. I see from your face you guessed as much. He has asked for her hand once since your arrival, but he had stopped after he saw his requests to the King were doing no good. She has despised him since he came to Gondolin. While it is quite obvious that you are not the cause of this disposition, Maeglin would be blinded, and not believe otherwise. He may try and get you out of the way – perhaps go so far as to kill you. This does not surprise you?” “No,” said Tuor after a pause. “I believed it might be so. If it were not the Lady Idril that you guarded I should wish that you were my guard. It would not be easy to catch you unaware.” “Yet it can be done to the greatest of warriors,” said Randir. “I fear for your life, Tuor. He has grown blacker since your arrival than I have ever yet seen him.” “Do you think he would knife me in my sleep?” asked Tuor. “Or shoot me on the walls? And what makes you so concerned now, and not six or seven years ago?” “Even if he is vile, he is still a lord of high birth,” Randir replied. “He would have to drive himself to it. His will is strong, but not strong enough that I cannot get some hint of his feelings. His look is murderous now, and enraged. Be on your guard. In the meantime, I shall try and pull something from one of Maeglin’s folk.” “May the Valar under the One be with you,” said Tuor. Randir strode across the city, hoping to see one of Maeglin’s captains. He found one pretty quickly – none other than Dolglin, who was walking with another elf named Pengacharn, a captain of the House of the Harp, a favorite of Lord Salgant. “So, the Lord Randir breaks from his duty to speak to me,” said Dolglin with a sneer. Randir felt the urge to strike the elf, but resisted it. Pengacharn turned and walked away from the conflict nervously. “My protection of the Lady Idril involves seeing to her protection,” said Randir coolly. “And my duties to the King are pressing. Especially about the Lord Tuor.” Dolglin looked startled, guilty even. But he regained his composure. “What is this duty?” he asked cautiously. “It is not for you to know what business I have with your master,” said Randir sharply. “After all, Dolglin, you are but a lowly retainer of his. You have no right to be involved in his affairs.” Dolglin flushed haughtily. “I am in the high confidence of the Lord Maeglin,” he said. “He trusts me in all he does!” “I am sure,” said Randir. “That is why you were recalled from overseeing work in the mines.” “He has matters for me here of great importance, that is why,” said Dolglin angrily, glaring at the insinuations. “Of course he called you several weeks before the task, so as to make sure of your loyalty,” said Randir. “Nay,” said Dolglin. “Tomorrow morning, in fact.” “Really, these matters must not be of great importance,” said Randir, secretly pleased at the amount of information he was receiving. “They are, Lord Randir, they are,” Dolglin sneered. “He would trust none other. And I cannot imagine a task so important that you have ever embarked on in your life.” “You do not consider protecting the King’s daughter a task of importance?” asked Randir cautiously. “Not when he forsakes his post at the time of danger,” snorted Dolglin. “And how, pray, did you come by that information?” he asked. Dolglin suddenly stopped short. Randir leaned forward. “I would warn Maeglin on how far your tongue runs, Dolglin,” said Randir mildly, “If I did not think that he would have you strung up in the city square for the various crimes you have committed. Or perhaps a disappearance at night would be more fitting?” Dolglin paled, but finding no more words to say, ran off anxiously. “He won’t be saying anything of our meeting to his master, unless he is grilled, which I doubt,” said Randir to himself. “Well, so the time is early tomorrow. Let us set the trap.” He came up to Tuor, and told him all he had learned. The Man was amazed. “What? Tomorrow morning?” he exclaimed. “It is known that you often go to the walls to see the dawn,” said Randir. “Few people are awake at that time, and the streets are not crowded. It would be easier than a break-in at night, and with less chance of detection than a murder in the street.” “So should I not go up there?” asked Tuor. Randir hesitated. “I think you should go up, but wear mail under your clothes,” Randir said. “Also, keep your axe by your side. I shall have twenty men of the House of the King at my call, armed with bows and swords. We shall surround the area, and make sure that none who advance on you shall escape. Anyone who draws a bow on you shall be shot, while we can halt the movements of any who draw close to you.” “It is a plan well thought-of,” said Tuor. “Let us do it!” As usual, Tuor went up to the east wall to watch the sun rise. Randir chose twenty lightly-armed soldiers. They formed a semicircle around where Tuor stood, staying hidden and on the ready. Tarthalion had come along, and Voronwë. During a time of that vigil the latter touched Randir’s arm. Randir nodded. He had also been watching the four figures with faces hidden in some way or another, moving causally toward Tuor from both sides. One of them suddenly strode forward toward Tuor. Randir’s men raised their bows. Suddenly there was a cry, and Randir saw in horror an elf armed with a bow and quiver plunge from the roof of a building with an arrow in his back. It was not one of his own soldiers. But Randir noticed that there was a bow in his hands, and an arrow fallen beside him. One of the assassins. Those on the wall whirled in surprise. Tuor drew out his axe. The man closest to him drew out a dagger and sent it spinning through the air, hitting Tuor solid in the chest. It bounced off the concealed mail. The would-be assassins stood in shock at this apparent miracle, and then began to flee. Tuor’s axe cut the back out of one of them, but the others managed to run down the steps from the wall. Those of Randir’s archers within range shot their bows, and two more fell. Others came hurrying from their hiding places from where they could not see what was happening. “After them,” Randir shouted. The Gondothlim poured on in pursuit. The two assassins were fleet-footed, and still Randir could not distinguish who they were. Tuor soon joined the pursuers. “Where do you think they are headed?” “Probably, in their fright, they head to their nearest refuge,” said Randir. “I’m not sure where that will be.” But instead they hurled themselves toward the Square of the Folkwell. The scene was so unusual in the peaceful city of Gondolin that those who had woken stood in amazement. Among those surprised were Idril and her maidens taking an early-morning walk in the grass. Suddenly the assassins turned, seeing that flight had become useless. Tuor’s long legs caused him to bound ahead of the others. He raised his axe. But one of his opponents drew out a knife and leaped forward. He stabbed it into Tuor’s shoulder, drawing it out to strike again. He never got the chance. As Tuor sank to the ground, Randir’s sword flashed, and the knife-hand was sliced off at the wrist. Another stroke and the assassin was headless. The last was startled, but leaped in an effort to get away. The bows of the Gondothlim sang, and three arrows passed through his back into his heart. Voronwë fell to the ground beside Tuor. Randir was down a moment later, seeing to his wound. Tuor groaned. “What has happened, Nathernil?” cried Idril, approaching and throwing herself down beside Tuor. “An attempt of murder,” said Randir grimly. “He is wounded, but not to the death. I shall bind his wound and—” “No,” said Idril firmly, “You may be a healer, my brother, but you have said yourself that I am far more advanced than you in the art.” Randir smiled. “Tuor,” he said. Tuor groaned again. “It is bad?” Randir asked. “It pains dreadfully,” said Tuor. He reached up as if to feel the wound, but his arm went limp as the shoulder-muscle was strained. “You had better not move,” advised Idril as she reached to tear off one of her sleeves. But Randir quickly threw off his tunic and began tearing it into strips, which Idril accepted as bandages. Tuor smiled his thanks, and closed his eyes. Idril had him carried to the House of Healing in Gondolin, a white building almost the size of the palace, and almost as well furnished. But Randir stayed behind with Tarthalion to examine the bodies. First he looked at those in the Square, then went back to the street and the wall. After looking at the last body he turned grimly to Tarthalion. “Two of them are of Maeglin’s house, two others I recognized as ruffians, and the other I did not know,” said Randir. “None of them were Dolglin, though.” “He may easily have been watching, or waiting to lend support,” suggested Tarthalion. “I daresay there might have been others watching to make sure it went well, who did not dare step in after they saw it was a trap.” “You could be right,” admitted Randir. “If I find any proof of Dolglin’s part in this, I shall bring him before the court of Turgon. But if I find proof that he is one of Idril’s abductors, I will kill him like the dog he is. The King may have forbidden duels because of private quarrels, but this duel would be concerning the princess herself, and the entire city of Gondolin. I am sure the King would have no objections after I had given the murderer a fair chance in battle to prove his innocence, and his blood ran in the square.” Under the care of the healers of Gondolin, Tuor recovered rapidly. Idril was ever at his bedside, while Voronwë and Randir stopped in frequently, as well as the regretful Turgon. Tuor could walk again in two weeks. One early morning Idril roused Randir before the regular time and walked out toward the southern walls. A wind had begun to blow, a warm, south wind. The flowers in the Alley of Roses were in bloom, and the birds sang seemingly sweeter than ever before. Randir was glad he was awake to feel the joy and peace vibrant in the air, and in the stirring wind. But Idril had not come to feel the wind. She walked directly up to the wall, where they found Tuor waiting. “Idril, I would talk with you about what was said in past days,” said Tuor anxiously, not seeming to notice Randir. “My head is clearer now than it has been. What we both want is impossible. The King would never hear of it.” “The King is my father, and has become like one to you,” said Idril. “He will hear us.” “But I am a man, a mortal, and you are of the elven race,” said Tuor, turning in desperation. “We should not shrink from these issues. I shall be dead by the time another fifty or sixty years rolls about, while you shall still be as young and fresh as you were four hundred years ago.” “I do not care,” said Idril. “I have made my decision, no matter what comes. I did not realize how much I loved you until you were almost killed.” “And I felt the same way,” said Tuor. He turned back to her. “Do no think I do not feel the same.” “Than there should be nothing to keep us from that which we desire,” said Idril softly. “What comes shall come. Ilúvatar has laid the before us where we shall walk.” “Yet hate is great, and Morgoth is its incarnation,” murmured Tuor, looking northward as he said so. “And we may soon be sundered until the Restoration. The King will refuse us.” “Randir,” said Idril, turning to him. Randir looked up in surprise, for he had politely been trying to go unnoticed. “Yes, my lady,” he replied. “You are a dear friend of my father,” she replied. “Tuor agreed with me last night. We wish for you to speak with the King in our behalf. And I believe you know what I mean.” “I do, my lady,” Randir said, bowing. “And it shall be done.” Tuor turned, and embraced Idril long. “Everlasting bliss shall not be ours, perhaps; yet joy overflowing shall be in our cup forever.” [edit] Sapphire Eyes Shortly after the midday meal, Randir went directly to the King, who sat in his throne, pondering something of which Randir knew naught. “Lord King,” he began. Turgon glanced up at him. “Randir, my friend,” he said. “Come, sit beside me.” He motioned to the empty smaller throne at his right reserved for a lord of honor during council times. “I have been considering adding on another storehouse for the gems produced by the miners,” said Turgon. “We have only two, and they are rather small. Now over here is a large house that is unoccupied, ever since its master was slain in the Nirnaeth Arnoediad. Since we are in need of no more houses, we can simply convert it to a jewel-house. Enough of storing them in the little communities near the mines, where few can see them.” “I have come to speak with you about a jewel you love dearly,” said Randir. Turgon glanced at him quizzically. “Idril, you mean.” “Yes, Idril,” he said. “And Tuor, the man who came from Ulmo.” “What would you tell me about them?” asked Turgon, though Randir thought he glimpsed a hint of understanding behind the wise, impassive eyes. “They love one another,” said Randir, deciding that a direct statement would be best with Turgon, whose wits were not eluded easily or for long. He expected Turgon to say something, but the King did not. “I knew it,” he said finally. “I love them both, and have watched how they gaze at each other, and spend time together. Yet why have you told me this?” “Because they have decided, with your permission, to be married,” said Randir simply. Turgon leaned back in his seat and closed his eyes. “She is an elf-lady of high birth and noble race,” he murmured. “He is a Man, of nobility among men, but still far lower. Much grief I see ahead for them. Yet I see bliss also.” Suddenly he opened his eyes and looked at Randir. “Do you remember the last words of Huor son of Galdor?” Turgon asked. “I would not forget them, my liege,” said Randir, and he repeated them. “‘If Gondolin stands but a little while, then out of your house shall come the hope of Elves and Men. This I say to you, lord, with the eyes of death: though we part here for ever, and I shall not look on your white walls again, from you and from me a new star shall arise. Farewell!’ Long have I pondered their meaning.” “I cannot be sure of their meaning,” said Turgon. “But I think it was meant that Idril and Tuor would find one another. Even the grand city of Gondolin is, perhaps, only a little thing in the whole scheme of the earth.” And Randir wondered at these words coming from the mouth of the king, who had greater right than any other to look with pride upon his city, and the kingdom he had kept. But Randir fully agreed with him. “This union may be the fulfillment of Huor’s foresight,” said Turgon. “If not, I know it is the right thing. Bitter shall be their union, but bitterer still if they were parted.” “I am glad to see, my master, that thou had made up thy mind before I spoke to thee,” said Randir. “Somehow, Randir, I am glad as well,” the King replied. He smiled softly, then rose and strode over to a window in the palace, looking out. “I have lost much, Randir, my brother. My wife… my sister… my father… both of my brothers… I do not know how much more I shall lose. But my city is strong. Gondobar shall not fall. Since the Nirnaeth Arnoediad I have not slept, but remained vigilant to the defenses of the White City. I carry a sword with me everywhere I go, and mail in my sleeping hour.” Randir noticed how tired the noble elf-lord looked. Turgon was the last of Fingolfin’s house, except for his daughter. He was acclaimed as the wisest of the elves, save Finwë his grandfather. Tall and proud, majestic, kingly, and stern as stone. But now he showed weariness, weakness even. Suddenly he turned toward Randir. “You sang for me a song before that battle. You said it was written by Maglor son of Fëanor.” “It was,” said Randir. “I ask you to sing it to me again, as a friend,” said Turgon, sitting down once more, while Randir stood uncertainly. Then he began to sing. The red blades flash, the sky darkens, swords sing in the desolate land; the ravens croak, the lord hearkens to watch the growing shadow’s hand. Then fire from Taniquetil high comes down to fill his stricken eyes; the shield is split, black death in nigh, and hearts are pierced by darkness’ lies. The horns are blowing in the deep, the elves are singing to Varda; unbroken rows of steel they keep, shield upon shield defend Arda. “To war, my lords,” the captain cries the trumpets sound, the host moves forth; while still as elf falls down and dies, they fight and war to prove their worth. The beaten helm, the downfallen sword, the arm that broke, the shield that was crushed, the bloody elf, the brave toppled lord, the black laughter, the joy now hushed. Then white silver rings the swords again, the banner raised up to touch the sky, the great war-shout of a thousand kin raises up to the immortal cry: “To death! To death! And Morgoth’s dark fire! To life beyond our deaths we now go! May our swords the hosts of darkness dire cut down, and bring the light we did know!” “To death! To death! And Morgoth’s dark fire!” repeated Turgon, seeming very far from the room. Then he seemed to wake, and turned to Randir. “The elves are passing,” he said. “The free world is falling piece by piece into the grasp of the Ghastly Hand. All lies beneath it groaning. True were the words of Maglor that you recounted to me, that one day all would be singing the chorus of that song. Death is upon the Ñoldor. It is at our doorstep. Great is the Fall of Gondolin.” Randir looked at his lord in amazement, and knelt before him. “Nay, Turgon, my father, my friend, and my lord,” he cried. “We shall stand strong against Morgoth’s tide, and we shall trust to the interceding of the Valar, and the deliverance of Eru, even if only in death. If death comes, let death be our sign; let us hope in death, life after death, and the life we give in death.” “Your words are wise, Randir,” said Turgon. “No, I am weak. I shall stand by Gondolin. Morgoth may hurl all his demons of fire, all his witchcraft, all his devices against the white walls, and yet we shall stand.” “Then what is the fall you speak of?” asked Randir. “The ultimate loss, the ultimate defeat,” said Turgon. “Though my city last a thousand millennia, it shall not halt Morgoth. We are safe here, but in our hearts is what would wear us down whether we will it or not. It is fate.” “Yet fate is bound to Eru, and what he wills is good,” said Randir. “Though the elves fade, we shall fade from a world that can last without us.” “The fading has already begun,” said Turgon solemnly. “Yet I would rejoice to find the peace that even this city brings me not.” “One day you shall find it,” said Randir. They sat in silence for what seemed like a long while, but suddenly Turgon spoke, and strength and cheerfulness was again in his voice. “They shall be wed at Gar Ainion,” he said. “A wedding like that which I will prepare will not have been seen ever in Gondolin.” “I shall convey your answer to them,” said Randir, bowing. Turgon smiled and bade him be off. The wedding was held several days later, on Midsummer’s day, when the sun was high in the sky, and the birds were singing. Gar Ainion was located at the highest point in the city. It was a beautiful building of white stone, with golden pillars, and all inside was white, gold, and blue. In the Place of Wedding, at one end there were two great trees wrought of fiery gold, one on each corner of the wall. And they stretched up to the open roof, and the sun shone through their gold-green leaves. And all was filled with light. The betrothal of elves usually lasted a year or more, but in Gondolin usually they were usually married on midsummer’s day, so the betrothal could last anywhere from a day to a year. And that day was full of joy, and light. Great was the wonder of the Gondothlim at a Man wedding and Elf-maiden, but none save Maeglin protested this, for Tuor and Idril both had won their hearts. Turgon would have let them live in the palace as they had been, but instead they chose a home on the south wall, which was fair but of less grandeur than the royal dwelling. Randir was pleased. He offered to give up his position as Idril’s bodyguard, but Tuor and Idril both urged him to stay on, not only as a bodyguard, but as a friend and counselor. Therefor Randir refused Turgon’s offers of high position, and remained in the service of the two whom he loved best. But, while all Gondolin rejoiced, he warily marked Maeglin and his actions. Maeglin refused to join the festivities, and gave no sign of pleasure. But by this time all of Gondolin had seen his jealousy, and from that point his heart was hardened, and the change was noted by all. Two years passed in joy and happiness. Maeglin was seen less and less, and the people did not suffer for it. At the end of the second year Idril gave birth to a son. Randir at the time of this happening was gone to the forges of Rog to oversee the production of a new weapon Turgon had devised for the walls. He had expected the birth, and was not surprised when he returned to Tuor’s home to find Idril sitting in the main room with an infant in her arms. Her face was radiant. “Randir,” she said. “Come. This is my son, Eärendil.” She extended him forward, and Randir took the bundle with trembling arms. Randir looked at the infant in wonder. His face was shining white like alabaster, and his eyes were wide and blue like sapphires. Randir had never seen any babe so fair and beautiful, like the son of a god. As Randir looked into Eärendil’s eyes, the infant stopped all movement and looked back into Randir’s. Then Randir began to speak. “A star is rising over the waters of the west,” he said. “Behold, the fires of the Trees caught in the gems of Fëanor have returned to the skies in the morning. So shall he be, blessed above man or elf, favored by the Valar, and by him who brought him into existence from the depths of the Land Eternal.” “Yours is the voice of one foresighted, Nathernil,” said Idril softly. “What you say is strange, yet I believe it.” Suddenly Tuor came through the door and welcomed their visitor heartily. Randir could see the joy in his face. “He is the most beautiful baby I have ever seen, and I daresay I shall never see another like him,” said Tuor. “No, you shall not,” said Randir. “There will never be another like him.” “Nathernil, my brother,” said Idril, “He seems to love you already. He is quiet, and watches you closely.” “Randir, I want you to henceforth act as a guard, and godfather, of this child,” said Tuor. “If you will accept the responsibility, I would have none other to protect him.” “I am willing,” said Randir, handing the boy back to Idril. “I swear that henceforth the young lad is in my protection, and to death will I bear this charge, if death is what comes.” “You have no need to speak of death, Nathernil,” said Tuor. “The city is fair, and we have a son to rival those of the elf-lords across the Great Sea!” Seven months passed, and the boy Eärendil grew amazingly quickly, taking rather after his father than his mother. Eärendil, even at that tender age, could walk with a little difficulty, and he seemed to love the fountains. Ecthelion took a liking to the boy which had won the heart of the Gondothlim, and often would play tunes on his flutes for him. Tuor had asked him to act as Eärendil’s tutor once he was old enough. Time enough for that, Randir frequently saw the young lad, and both thoroughly enjoyed his long visits. But Randir grew worried about Maeglin. He saw him speaking with Dolglin, as well as with Salgant’s favorite, Pengacharn. The latter was a tall elf, with a scar across his face as testimony to an accident during the building of the city. Yes, he had been there… born in Vinyamar. Randir also noticed a change come over Salgant, and Randir wondered if this were Pengacharn’s influence, or Maeglin’s – or perhaps Maeglin through Pengacharn. The elf-lord became less apt to speak. One thing extraordinary about Salgant was that he was “broad in the middle”, as the other elf-lords put it, and “fat in the stomach”, as the street-urchins put it. This was extremely rare among elf-lords, but Salgant appeared none the worse for it at the Nirnaeth Arnoediad, when he had cut down rows of orcs with Belegdram. Still, Randir wondered. He also wondered if he himself had grown too suspicious. One day, while Tuor was spending the night in the palace due to a council with the King, Randir felt the curious urge to follow an elf whose face was covered in a dark hood. It was nearing evening, and Randir had just passed the elf on the way back to Tuor’s house, were he had been given a room in return for his “services”. He hesitated, then turned and followed the figure down the streets, staying just out of sight. Suddenly the elf halted before the door of a house, and knocked twice, then once, then twice. The door opened, and the dark figure went in. Randir crept over to under the window, and listened carefully. “Are they all here?” asked someone whom Randir assumed to be the one who had just entered. “Yes,” replied a hushed voice. “All twelve of them.” “Good,” said the first with satisfaction. “That meddling guard has not returned, they say, but that is usual according to our reports on him. He likes to stay out late. When he returns, there shall be a surprise waiting for him.” “But remember our true objective,” said another voice, harsh and unmistakably evil. “The alarm must not be raised until the infant is dead. We should have no problems – Tuor is gone, and the bodyguard shall not live to pass through the door.” Randir’s heart almost stopped beating. He knew in an instant their plans. They must be Maeglin’s men, and either by Maeglin’s orders or on their own accord they were about to murder Eärendil. He considered dashing off to call in the palace guard. No, by that time they might reach the house, and Eärendil’s throat might be cut before they got there. He could remain and fight them in the streets and hold them off there until help came. No, they could easily go around him, or surround and kill him. Then he realized he must run back to the house, and stand guard in the doorway while someone went for help. Just as he leaped up from under the window, the door opened, and an elf stepped out. The person stood, startled, to see Randir there. Randir took off at a sprint, the elf yelling and gesturing wildly to the persons within. The door swung all the way open, and Randir saw out of the corner of his eye a large group of men leap out of the house and charge after him with naked blades. He could not take on twelve at once. Randir ran down the sleeping streets. The sun had gone down by now. Few were awake. Once he passed a craftsman, a shoemaker. “Run!” he shouted. “Call soldiers to Tuor’s house on the south wall. A murder is being planned.” But the shoemaker was so bewildered that he did not move. The men ran up, and the innocent craftsman was killed where he stood. Then they resumed their pursuit. Randir was now worried. If he started yelling to attract attention, it would be thought that he was a criminal of some sort escaping the watch. His progress would be impeded. He would have to run into a friend. And luck, or fate, favored him. He saw Voronwë approaching from the opposite direction. “It is me, Voronwë,” Randir shouted as he ran. “They are after the prince! Call the guard!” Voronwë said not a word but disappeared into a dark alley. The men apparently did not notice him, but kept their eyes on Randir. Suddenly Tuor’s house loomed up before him. There was only one door on the front. Randir threw himself against it. It was unlocked, waiting for him to return. He considered bolting the door, but decided that it was weak enough so as to break down in an instant under the blows of the men. A figure leaped at him from the corner of his eye, bearing a knife that reflected the stars. With a single movement he cut the assassin nearly in half with Cellagar. He called out to awake the house, then drew his sword, standing the doorway. The men nearly halted at the sight of the drawn blade, but their leader urged them forward. Two fell by Randir’s strokes. But even the doorway could not keep them from forming a semicircle around him. He found this swordplay difficult, as four could fight him at the same time. He put out of action three more. But his strong arms were already wearing from fighting four opponents at once. He began to move back through the doorway. But he took a long, deep cut across his forehead, and the blood and sweat spilled into his eyes. Then he threw himself forward quickly, landing almost in their midst and felling three more. There were only six of his opponents left, but he was tiring indeed. Suddenly he received a gash across the arm. He stumbled, dropping his sword. The leader moved in as if to finish him off. There was a laugh, and Randir glanced up to see a great figure looming above him. He recognized that face, but this information did little good at that time. He tried to rise and attack again with the shining Cellagar. But it was out of his reach. He rolled aside as the blade descended once. But the second time struck him in the chest. He felt a fierce pain in his shoulder as the point bit into him. He heard, now far-off, shouts of “The guard! The guard is upon us!” before he passed into pained sleep. The guard indeed had found him. Voronwë and Tuor led them, and they came in amazement to the door of Tuor’s house, now strewn with bodies. Six men still stood upright, but they panicked and fled. “After them,” Tuor ordered the guard, but he dismounted. Idril came running out to him holding Eärendil, her face white with shock. Her maidens followed, in like condition to their mistress. “I heard the warning of Randir, but there was no-one in the house besides me, the baby, and my maidens,” she said. “I snatched up Eärendil and took him into the back room, but they never came into the house.” “Randir? Where is Randir?” exclaimed Tuor. “He is not in the house?” Idril shook her head, and her face grew even paler. Tuor, however, despite the dark was going among the bodies. They seemed to form a ring around one corpse in the center. He peered intently at the face, squinting because of the dim light. It was Randir. Idril gasped, and Tuor drew back in horror. “He was a mighty man,” Tuor said finally. “He slew eight when they attacked him all at once, and held off many others. If he had not sacrificed his life, Eärendil might be dead.” Idril began to weep, and setting Eärendil down she bent over by Randir’s motionless form. But then she gave a low exclamation, and raised her head slightly. “He lives,” she whispered. The leader of the assassins growled darkly. They had failed again. And Maeglin would not be able to replace the men they lost. They had been separated. As far as he knew he was the only one left. Maeglin had thrown in his last resources. It would be a long time before Maeglin would have power over life and death in the city again. He glanced over his shoulder. Yes, he was confident that he had evaded the guard completely. He rapped on the door with the code, and Maeglin opened it. “Is it done?” he whispered. The assassin looked away. “Eight of my comrades were killed,” he said. “But we never entered the house. The others were hunted down by the guard. I may have been the only one to escape.” Maeglin’s face turned a ghastly pale. “Fool!” he nearly shouted, pulling the assassin inside. “The child still lives, and I have lost perhaps my entire secret force?” “I do have some good news, though,” the assassin said hurriedly. “The one they call Randir is dead, or soon will be. I gave him a mortal wound in the chest.” Then Maeglin did an unexpected thing. He smiled, a grin of evil delight. “We have not lost completely, then,” he said after a moment. “Randir has foiled my schemes. I would gladly lose eight of my loyal elves in return for Randir’s death. We shall build up our arm again, and then we shall strike. Tuor and Eärendil shall die, and Idril will be mine forever.” Randir did not realize he was awake for a moment. He felt a slight throbbing in his shoulder. He opened his eyes slowly. “My lady! He awakes!” exclaimed a woman’s voice. Randir groaned slightly, turning his head slowly to see Alfirinel and Idril near him. “Where am I?” he asked. “You are in the House of Healing,” said Idril gently. “Do you not remember what happened?” “No,” confessed Randir. “I think I remember… yes, there was a man come to Gondolin several days ago… his name was Tuor, I think. He bore a message from Ulmo.” The color drained from Idril’s face. “Nathernil,” she said softly, “That happened almost eight years ago.” Randir was shocked, and began to sit up. He felt the pain in his shoulder. “What happened to me?” he asked. “Have I been asleep these eight years?” “No,” said Idril. “Two weeks ago you saved my son, Eärendil, and nearly perished in doing so. You had a wound in the head, and in the shoulder.” “You have a son?” said Randir in bewilderment. Idril hid her face in her hands, and Randir thought he heard her weeping softly. “Eärendil,” she said. Randir repeated the name. “Yes,” he said after a moment. “I do think I remember that name. But it seems so far-off, as if I dreamed about it. So you are married?” “To Tuor, Ulmo’s messenger,” said Idril. Suddenly she left the room with an inspiration, Randir staring after her. But she returned soon, carrying a little boy with alabaster skin and sapphire eyes. Randir reached out to touch the infant, and he hesitantly took the boy in his hands. He stared into the blue eyes for a long while, while the innocent blue eyes stared back. Suddenly Eärendil’s white hand reached out and touched his forehead. Randir suddenly sighed and went limp. Idril gave an exclamation of fear, as she lifted up her son and drew back. “Nathernil!” she cried. “No,” he said, and his voice seemed more relaxed. “It is all right. I remember now. Your wedding, your son. I remember that night… part of it. What happened?” “You slew eight of them, Nathernil,” said Idril. “But you were wounded yourself. The guard came, but some escaped. We took you here, where you have been in the care of my maidens and I. But few know that you are still alive, for we feared they might try and kill you where you lay between life and death.” “Who were the attackers?” asked Randir weakly. Idril shook her head. “They were all elves of various stations and positions,” she said. “We do not know who led them.” “How long until I may rise?” asked Randir. “You have mended slowly,” said Idril. “But now you are rapidly recovering. I would say that you may be able to rise in two more weeks.” “Two weeks!” exclaimed Randir. “But who will you use as a guard? They may strike again.” “I doubt it,” said Idril. “But for the present we have moved to the palace, just for safety.” “Good,” said Randir, relaxing and closing his eyes. Suddenly they opened again, and he touched his bandaged forehead. “There was something. . .” he murmured. “I think I saw the face of their leader. But who was he? I cannot remember.” Idril bent down over him. “Try. If you did not kill him, than he escaped, for of the two we caught both denied being the leader, though they refused to implicate him.” “I cannot,” said Randir helplessly. “I cannot remember.” The two weeks passed slowly for Randir. Twelve days after he had awaken, he was able to walk about, if he took it slowly and easily. He was still bandaged in all three places: head, shoulder, and right hand/arm. Tuor insisted that Randir stay close to the palace, so that his attackers would still think him dead. Once Randir saw Maeglin, but hid before the half-Dark elf saw him. His shoulder-wound healed first. It was still a little sore, but he could move it about freely now. At the three-week mark, the bandage was taken off of his head. The wound in his arm was still very tender. He was not completely bored. Tuor and Idril often would come in to talk with him about various matters, and sometimes the latter brought little Eärendil. But twenty-five days after his waking, Randir decided to dress fully, and take a short walk about the city. He put on a heavy jerkin over his light tunic, and girded on a belt and sword. He threw a red cloak over his shoulder. All that was left of the head wound was a scar and a sore spot. The pain in the shoulder was nearly completely on. And Randir’s hand was bandaged but far better. He walked out of the House of Healing, and instead of taking his usual course to the palace, decided to stop at Tuor and Idril’s house. He was greeted by Tuor at the door, who was surprised to see him. “Come and eat with us,” he said. “We are about to have the morning meal.” “Thank you, Tuor,” said Randir, his voice husky. “So you are not afraid of the assassins finding out about you and getting revenge?” asked Tuor as he brought Randir to the table. “No,” said Randir. “I do not fear them. It would be too great a risk to kill me now. It would be different if they had murdered me while I lay unconscious. Now I can defend myself.” “Randir,” said Tuor, “I know I have said this, but I am very grateful to you for saving the life of the lad Eärendil.” They sat down at the table, Randir somewhat gingerly. “I did what you keep me on to do,” said Randir. “I have not regretted it.” “When Eärendil gets to be a young man he shall be grateful,” said Tuor. “Tuor, my brother, one day all shall be grateful to him,” Randir replied quietly. After the morning meal, prepared by Idril herself, Randir and Tuor strode about the city. Many looked in amazement at Randir, for the rumor had circulated that he died protecting Tuor’s precious child. But he was there, in flesh and bone, returned from the very brink of death. Soon they met up with Glorfindel and Ecthelion. “Ah, Nathernil,” said Glorfindel. “I see you are feeling better. Some believe you are a ghost arisen from the dead.” “And others say that you cannot be killed,” said Ecthelion with a smile. “Alas, both are not true,” said Randir, laughing. “But still…” He stopped short, and turned to gaze after an elf that had just passed him. “What is it?” asked Glorfindel anxiously. “Wait for a moment,” said Randir. He turned and followed the elf, then came up boldly and tapped him on the shoulder. The elf turned, then turned as white as chalk at the sight of Randir. “Pengacharn,” Randir said sharply, and his brows lowered. Suddenly the events of that night flashed back before his eyes. He saw the leering, murderous face of an elf… He drew his sword, while Pengacharn gasped “It can’t be! It is his spirit!” “Spirit I may be, but my sword is not that of a ghost,” said Randir grimly. “I know you.” Pengacharn might have fled, but Glorfindel and Ecthelion leaped forward and grabbed the elf by both arms. “What is it, Randir?” they asked. “I remember now the face of the leader of the assassins,” said Randir. He pointed at Pengacharn. “He lies!” Pengacharn almost screamed. Elves were gathering about them. Salgant rushed up, as did Maeglin. The latter’s eyes widened in amazement to see an armed Randir, with bandages on his left hand and arm, and a fresh scar across his head. “We shall have a trial,” said Glorfindel as calmly as he could master. “No need,” said Randir sternly. “He or I shall be dead within the hour, in single combat.” Pengacharn broke free. “I must have council with my lord and master,” he said, turning to Salgant, who looked nervously about, not wanting to get involved in so grave a matter. But Maeglin spared him the trouble, stepping forward. “Fight him,” he urged. “He is wounded, and you are a master swordsman.” Pengacharn grew even paler, but seeing Maeglin’s look told him that if Pengacharn refused to fight, Maeglin might take it into his head to have him erased. Yes, others had escaped the guard, and two of them remained fiercely loyal to Maeglin. The unhappy elf nodded, and turned back to Randir. “I accept your challenge.” Glancing at Maeglin he added “Now, in the courtyard of the palace.” Randir nodded, and marched away, the crowd of elves following, none daring prevent this duel. They reached the courtyard, and Turgon came hurrying out to see what was the matter. “It is against the law,” he said firmly. “Lord King,” Randir replied, “I am representing not myself, but the Prince Eärendil. For my wounds I would forgive him. But death shall be his reward for daring to impose upon the life of Idril’s son.” Then Turgon looked into Randir’s eyes, and saw that Randir would not be moved. “So be it,” he said. “He who slays the other is absolved of all blame for the other’s blood.” Randir threw off his cloak with a single movement, and stepped forward ready. But Idril suddenly came forward from the crowd. “This should not happen! Randir is wounded,” she exclaimed. “It shall make the battle more even,” said Salgant, who was a just man. “Everyone knows that Randir Nathernil is the best swordsman in Gondolin.” He glanced at Maeglin, as if to make sure he had said the right thing. “I shall fight for you,” said Glorfindel, and Ecthelion stepped forward as well. “No,” said Randir, his face like stone. He awaited the challenged to strike the first blow. Pengacharn suddenly thrusted forward, sending his sword for Randir’s chest. Randir suddenly twisted his arm around, striking Pengacharn’s hand with the flat of his blade, knocking the sword away. Randir might have slain him there justly, but he just nodded with his head toward Pengacharn’s sword, and the elf returned to pick it up again, looking very fearful. The swords flashed again, and this time the metal rang. Randir parried three of Pengacharn’s strokes. He dodged the stroke of the fourth, but somewhat stiff from his wounds, narrowly missed having his right arm cut off. Randir then gave Pengacharn a slash that cut a long incision in the elf’s chest, but it was not deep. The elf fell back, his hand touching the wound. He drew it back sticky with blood. Randir waited patiently for Pengacharn to resume the contest. Pengacharn now saw his advantage: his agility. Randir could not move extremely fast. Pengacharn hurled himself forward, but stopped just out of reach of Randir’s sword, and dashed to the side, slowly circling Randir, who watched him like a hawk. Suddenly Pengacharn stabbed forward toward Randir’s neck. Randir fell back, and the thrust passed just inches above his head. But he felt a sudden pain, and almost stumbled to the ground. He guessed that he had re-opened something, or had nearly done so. Pengacharn kept his advantage. While Randir dizzily tried to regain his footing, he sent in blow after blow meant to wear Randir out, and at last bring him to his knees. It looked certain, now, that Randir would soon be killed. His foot was on the edge of the fountain, which was very deep. He could not retreat any more, he could not buy any more time. But then Randir hurled himself away from Pengacharn, and managed to take a bearing before Pengacharn rushed him again. Randir backed up against Belthil, the Silver Tree, and parried Pengacharn’s blows. Suddenly Pengacharn slid his blade around and struck Randir’s right wrist. Fortunately it was not a direct blow, otherwise Randir might have lost his hand. But he dropped his sword, grasping his wrist painfully. It seemed as if Pengacharn had won his victory. He stabbed, much like the night before, and Randir dived aside. He knew he could not escape Pengacharn’s blows for long, but he hoped that some new inspiration would come to him. But fate interceded. Pengacharn’s thrust entered the silver bark of Belthil. What happened next was astounding. Like a horizontal geyser, a burst of silver liquid flowed forth, striking Pengacharn’s hand. To the amazement of the onlookers, Pengacharn howled in acute pain, releasing his sword and falling down. Where the liquid had touched his hand the skin was black, as if burned. But Randir sprang up from where he lay, and lifting up Cellagar with his left hand, stabbed Pengacharn to the heart. “Thus is the fate of the traitor,” said Randir grimly, without a hint of joy, or of sadness. He drew his Cellagar out of the dead body. Then he reached over and drew Pengacharn’s sword out of the silver tree. Then all saw that the blade had apparently melted away almost up to the point that it entered the tree. All that was left was the smoking hilt, and only about five inches of blade. Randir hurled it aside, then reaching down touched the blood of the tree. It did not harm him, but instead he smeared it along his limp right arm and wrist. The bandages fell away, and Randir’s arm was exposed. And it was healed. “So, by the will of Ilúvatar, the traitor is revealed, and his just reward awaits him in Mandos,” said Turgon solemnly. “Bury the body, but let the sword be carried to the palace, where it shall rest as a testimony to the fate of those who would betray and murder their neighbors. Well done, Randir.” “Yes,” said Tuor, and there were tears in his stern gray eyes. “You are now truly my brother, if you were not before.” And they embraced. Idril kissed him on the cheek, as if he were truly her brother, and Voronwë laid a hand on his healed shoulder. But Randir’s eyes were on the infant Eärendil, and looking into the sapphire eyes, it was as if he could already see the glorious future ahead of him. Perhaps he really did. Retrieved from "http://www.tolkiengateway.net/wiki/User:Narfil_Pal%C3%B9rfalas/Fanfictions/The_White_Citadel_part_1"
cc/2020-05/en_middle_0097.json.gz/line1418375
__label__cc
0.649283
0.350717
Tomorrow’s News Today Cars and Apps What Lies Beneath The New Partnership Between Uber And Daimler? Stephanie Hopper / Cars and Apps / Automotive Industry, Daimler, Freightliner, General Motors, Mobile Application, Riders, Self-driving Cars, Uber, Uber App / The progress of technology is an unstoppable phenomenon, and we have two basic options when it comes to evolutionary changes – we can stand aside and watch how everything unfolds right in front of our eyes, or we can take a more proactive role and even try to push the wheels of evolution forward. Of course, not all of us have the necessary means at our disposal to produce any large-scale changes in our society, but we can still support an idea or go against it if we do not like it. However, large companies are capable of affecting our future in a significant way, and Uber and Daimler are certainly among those names, which is why the partnership agreement that they recently signed has even greater value. Uber And Daimler At A Glance In case you are not familiar with these two brands, Uber is a relatively young company which has a software network that connects riders with rides in a convenient and effortless manner. Uber app is one of the most used mobile applications on the market, and ride-sharing is growing in popularity on a daily basis. Daimler, on the other hand, is one of the giants of the automotive industry, and this corporation has a long-lasting history of successful presence in the business. Is Driverless Future Already Here? One of the primary areas that Uber is exploring is self-driving cars, and their agreement with Daimler focuses on this element of evolutionary progress. What this means is that they will join forces, both creative and hardware, to explore ways in which they could produce efficient and successful autonomous vehicles. In other words, you could soon find yourself in a Mercedes-Benz that has no steering wheel or pedals, and you could be speeding down the highway 60 miles per hour, all while scrolling on your tablet catching up with the daily news. Other companies are also working on the same (or similar) system, and various steps have been made toward the ultimate goal of having “robocars” on our streets. For instance, Google and Fiat have performed extensive tests under their partnership deal, and the same applies to a software company called Lyft and General Motors. Similarly, Tesla is also included in the efforts to produce a self-driving car, and experts predict that by 2020 we could see first major breakthroughs in this field. Why Daimler and Why Now? Daimler is a company that also supports innovation in their design, but one of the primary reasons for their role in this deal is the fact that they need this technology for their trucks in the first place. Their line of US-based trucks, called Freightliner, is a popular brand in the States, and these heavy duty vehicles seem to be the first ones who will be capable of cruising across the continent without the presence of a driver. Of course, it will take a long time before this sophisticated technology is working correctly, but it seems that “the future is already upon us.” » Is The Title Race In The Premier League Already Over? Monitors that guard the eyes of all family members Business Of The Future – Voip Phone System For Business How Did Internet Change Our Reality So Far? Urban Clothes For Urban Kids How to choose the right employee benefits scheme for your company Share to your profile Uber-and-Daimler Title-Race-Over CNN.com – RSS Channel – App International Edition Trump's defense: Abuse of power is not impeachable 8 senators to watch during the impeachment trial Prince Harry breaks his silence: There was 'no other option' Horror in Waikiki: 2 police officers killed, 7 houses burn See Prince Harry's speech on decision to leave royal life Subscribe for more news!: App marketing Arsenal Automotive Industry Chelsea Consumers Daimler Football Freightliner General Motors Klopp Liverpool MMA Mobile Application Money Mourinho Premier League Riders Self-driving Cars Title Race Tottenham Hotspur Uber Uber App © Yaromat 2020
cc/2020-05/en_middle_0097.json.gz/line1418376
__label__cc
0.738396
0.261604
The Functions, Bases, Classes and Importance of Kinship | Sociology Read this article to get information on the functions, bases, classes and importance of kinship! Kinship is a cultural artifact created in every society. As an artifact it primarily shapes people. As an important social institution it performs a number of functions. Some of its functions are mentioned below: Image Courtesy : coloradoparentingmatters.org/cfert/wp-content/uploads/2011/07/kinship.jpg (1)Kinship assigns guidelines for interactions between per­sons. It defines proper, acceptable role relationship between father- daughter, brother-sister etc. (2)Kinship determines family line relationships, gotra and kula. (3)Kinship decides who can marry with whom and where marital relationship are taboo. (4)Kinship helps us to determine the rights and obligations of the members in all the sacraments and religious practices starting from birth to death. (5)Kinship system maintains solidarity of relationships. (6)In rural and tribal societies kinship or kinship relations de­termine the rights and obligations of the family and marriage, system of production and political power. (7)Kinship through its different usages regulates the behaviour of different kin. (8)Kinship helps in (through kinship terms) designating kin of various types such as classificatory and descriptive. (9)Kinship through its usages creates special groupings of kin. (10)Kinship rules govern the role relationships among kins. (11)Kinship acts as a regulator of social life. (12)Kinship influences ownership of land, concept of wealth and the system of production and its use. Bases of Kinship: Famous Sociologist H.M. Johnson identified six important bases of kinship which are described below: Kinship relation is differentiated in each society on the basis of sex. The term ‘brother’ and ‘sister’ shows the sex of blood relations. (2) Generation: Kinship tie is established between the persons in relation to generation. The term ‘father’ and ‘son’, grand-father and grandson show the relation between two generations. (3) Close relations or intimacy: It refers to relationships through marriage. It does not based on blood relations. The intimacy or relationship with son-in-law and father’s sister’s husband is based on close relations or intimacy. (4) Blood Relations: The kinship based on blood relations is divided into two such as lineal and collateral. Close blood relatives in a direct line of descent are called lineal relatives. Grandfather, father, son and grandson are the example of lineal relatives. Other descendants of one’s lineal kin such as uncle and their children refer to collateral relatives. (5) Division: This bases of kinship based on division and sub-division. Almost all kinship relations are divided into two parts. For example father’s father i.e. paternal grand father and mother’s father i.e. maternal grand father. Similarly brother’s daughter and sister’s daughter, son’s son and daughter’s son are two types of relations. (6) Binding Thread: Kinship ties are connected with a linkage. The affinal relatives or consanguineous relatives acts as binding thread. In other words the binding thread of these relations is close or intimate blood relationships. For example the relationship of father-in-law is based on the relation binding thread either of the husband or that of the wife. Classification of kins: On the basic rules of descent Importance of Kinship: Kinship has several importance in a social structure. Kinship decides who can marry with whom and where marital relationships are taboo. It determines the rights and obligations of the members in all the sacraments and religious practices from birth to death in family life. Importance of kinship is observed on the occasion of marriage and family functions. It determines family line relationships i.e. gotra and kula. Kinship: Brief Essay on Kinship (892 Words) Kinship: Main Organizing Principles of Human Society Kinship System Joint Family System: It’s Features, Functions and other Details Religion: Functions and Dysfunction of Religion (1343 Words)
cc/2020-05/en_middle_0097.json.gz/line1418378
__label__cc
0.724966
0.275034
Book presenter HaBO: Hero Walks in on Heroine Doing an Autopsy Articles / January 14, 2020 This HaBO request comes from Katie, who is searching for this historical romance: The heroine is the daughter of a physician who has since died. She is very interested in medicine. The hero is, I believe, a titled Englishman with either a son or ward. The hero and heroine marry. She continues to pursue her interest in medicine even as hero forbids her to do so. At one point, while the hero is away, the heroine stays with an old doctor she knows to learn more. Hero finds her as she and the old doctor are doing an autopsy and is livid. Late in the book, the heroine saves a boy while he is choking (?) after the hero begs her to do something. Heroine winds up leaving and leaves note for the hero that apologizes for her scandalous behavior. She has nothing to apologize for! Weddings, Kristen Ashley, & More A Princess in Theory A Princess in Theory by Alyssa Cole is $1.99! This is the first book in her Reluctant Royals series and this seems to be a series that just keeps getting better with its books. Many readers loved how Alyssa writes consent, agency, and all sorts of other awesome and empowering things. However, some warn that this book takes several chapters to get into the swing of things. From acclaimed author Alyssa Cole comes the tale of a city Cinderella and her Prince Charming in disguise . . . Between grad school and multiple jobs, Naledi Smith doesn’t have time for fairy tales…or patience for the constant e-mails claiming she’s betrothed to an African prince. Sure. Right. Delete! As a former foster kid, she’s learned that the only things she can depend on are herself and the scientific method, and a silly e-mail won’t convince her otherwise. Prince Thabiso is the sole heir to the throne of Thesolo, shouldering the hopes of his parents and his people. At the top of their list? His marriage. Ever dutiful, he tracks down his missing betrothed. When Naledi mistakes the prince for a pauper, Thabiso can’t resist the chance to experience life—and love—without the burden of his… HaBO: Rookie Cop Heroine & Crush Detective Hero This HaBO is from Brittani who is trying to find this contemporary romance with perhaps some suspense elements: This is one of the very first romance novels I remember ever reading and it was fairly contemporary. A female rookie cop reunites with an old crush she grew up knowing from their old neighborhood who’s now a detective. Their first meeting as adults is awkward for her since one of her first assignments was to help catch johns and she’s wearing clothes to fit that role. Somehow they get involved in a case together and have to solve a crime while revisiting some past secret that stopped them from getting together when they were young adults. Can we solve this HaBO? Love Her or Lose Her by Tessa Bailey B- Love Her or Lose Her by Tessa Bailey January 14, 2020 · Avon Romance Love Her or Lose Her is a contemporary romance between a married couple on the verge of divorce. Dominic and Rosie started dating in middle school and are now married adults. They have no kids or pets. Dominic finished a military deployment overseas and is working in construction. Rosie works at a department store and dreams of opening her own restaurant. Frustrated by Dominic’s failure to communicate anything to her other than lust (every Tuesday night), Rosie moves out, but Dominic will do anything to win her back, even attend marriage counseling with a hippie therapist. This book succeeds because of the warmth and empathy it extends to its characters. Armie, the therapist, is both funny and perceptive. Dominic is a type of character I don’t often read about in a romantic context, one who struggles with toxic masculinity but also has positive traits and wants to do right by his wife. He was raised by a quiet man who demonstrated that the way to show love for one’s family is to provide, so Dominic focuses on providing at the cost of communicating with Rosie…
cc/2020-05/en_middle_0097.json.gz/line1418380
__label__cc
0.714477
0.285523
Soheil Feizi, MIT Date: October 23, 2015 12:00 pm – 1:00 pm Venue: Engineering-IV Faraday Room #67-124 Categories: Other Seminar Series Learning (from) networks: fundamental limits, algorithms, and applications Network models provide a unifying framework for understanding dependencies among variables in medical, biological, and other sciences. Networks can be used to reveal underlying data structures, infer functional modules, and facilitate experiment design. In practice, however, size, uncertainty and complexity of the underlying associations render these applications challenging. In this talk, we illustrate the use of spectral, combinatorial, and statistical inference techniques in several significant network science problems. First, we consider the problem of network alignment where the goal is to find a bijective mapping between nodes of two networks to maximize their overlapping edges while minimizing mismatches. To solve this combinatorial problem, we present a new scalable spectral algorithm, and establish its efficiency theoretically and experimentally over several synthetic and real networks. Next, we introduce network maximal correlation (NMC) as an essential measure to capture nonlinear associations in networks. We characterize NMC using geometric properties of Hilbert spaces and illustrate its application in learning network topology when variables have unknown nonlinear dependencies. Finally, we discuss the problem of learning low dimensional structures (such as clusters) in large networks, where we introduce logistic Random Dot Product Graphs, a new class of networks which includes most stochastic block models as well as other low dimensional structures. Using this model, we propose a spectral network clustering algorithm that possesses robust performance under different clustering setups. In all of these problems, we examine underlying fundamental limits and present efficient algorithms for solving them. We also highlight applications of the proposed algorithms to data-driven problems such as functional and regulatory genomics of human diseases, and cancer. Bio: Soheil Feizi is a PhD candidate at Massachusetts Institute of Technology (MIT), co-supervised by Prof. Muriel Medard and Prof. Manolis Kellis. His research interests include analysis of complex networks and the development of inference and learning methods based on Optimization, Information Theory, Machine Learning, Statistics, and Probability, with applications in Computational Biology, and beyond. He completed his B.Sc. at Sharif University of Technology, awarded as the best student of his class. He received the Jacobs Presidential Fellowship and EECS Great Educators Fellowship, both from MIT. He has been a finalist in the Qualcomm Innovation contest. He received an Ernst Guillemin Award for his Master of Science Thesis in the department of Electrical Engineering and Computer Science at MIT.
cc/2020-05/en_middle_0097.json.gz/line1418383
__label__cc
0.616261
0.383739
ToxicsWatch, Journal of Earth, Science, Economy and Justice Journal of Earth, Science, Economy and Justice (JESEJ) incorporates insights from the fields of sciences which have implications for Earth and her economy. Issues » Hazardous Industries Watersheds and River Basins Corporate Crimes Military Mining Industrial Complex Urban Crisis Laws and Legislations Campaigns » Water Watch Occupational Health India Ban Asbestos Network of India Stop Hazardous Waste Trade Regulate Hazardous Technologies Ban the Bottled Water Promoting Car Free Culture Statements » Documents » Home » Climate inequlality , INDIA , Nicaragua , Paris Agreement , Poor , Rich countries » How India failed at Paris Climate Conference: As a state it has fundamental responsibility to preserve land, water, air How India failed at Paris Climate Conference: As a state it has fundamental responsibility to preserve land, water, air Written By BiharWatch on Wednesday, February 03, 2016 | 8:55 PM India failed to do even what a small country like Nicaragua did in the Paris Climate Conference by raising its flag questioning the autocratic change introduced in the final draft at the last moment (from ‘shall’ to ‘should’) while adopting the 12 page long Paris Agreement dated 12th December, 2015. The Agreement being a legal text required application of basic legal knowledge by India. In law schools across the globe students are taught that “shall” is “mandatory”. The drafters of legal documents are trained into the use of “shall” as it conveys “a duty to” be performed. It conveys obligation. Had “shall” been not important 76 pages of Words and Phrases, a multi volume work of legal definitions would not have been devoted to case laws around it. The word “should” does not express a legal obligation, the word “shall” expresses a legal requirement. Initially, Article 4.4 of the Draft Agreement read: “Developed country Parties shall continue taking the lead by undertaking economy-wide absolute emission reduction targets. Developing country Parties should continue enhancing their mitigation efforts…” This formulation aptly captured the historic responsibilities of rich countries and differentiated responsibilities of poorer countries. But disregarding the voice of a Central American country like Nicaragua which is a member of Group of 77, succumbing to the USA’s demand shall was substituted with should. India’s decision to maintain a deafening silence when the voice of a fellow member from G77 was disregarded is contrary to its stature. India failed to comprehend that as a State it has a fundamental responsibility to preserve resources like the land, water, and air, which belongs to the future generations. Its responsibility “predates statutory law”. What Indian environment minister, Prakash Javadekar did not disclose to the Parliament has already been admitted by Nozipho Joyce Mxakato-Diseko, chairperson of the Group of 134 developing countries (G77 and China Group). India is a member of this Group. Diseko has revealed that Intended Nationally Determined Contribution (INDC) for mitigating climate change is “a perversion of the principle of common but differentiated responsibilities” because it undermines the “legal obligation in accordance with historical responsibilities for finance” accepted under the bullying influence of USA and its allies. It is quite outrageous that INDCs are not legally enforceable. The paragraph 52 of the Decision of CoP 21 makes a categorical declaration that Article 8 of the Paris Agreement which deals with the issue of addressing loss and damage associated with the adverse effects of climate change “does not involve or provide a basis for any liability or compensation.” Although such announcement sets a regressive precedent in international negotiations, given the fact Paris Agreement is not legally binding by implication, this attempt to escape liability for loss and damage appears unsuccessful. The 12 page long Paris Agreement dated 12th December, 2015 adopted by the countries that are Parties to United Nations Framework Convention on Climate Change (UNFCCC) which was adopted on 9th May, 1992, is an articulation of how ‘climate-inequality’ shapes the text of an international treaty supposedly aimed at climate justice and for the protection of Mother Earth. It may be recalled that the false solution of carbon trade and off setting was introduced in the Kyoto Protocol at the behest of USA which had made it a pre-condition to sign the Protocol. Notably, after diluting the Protocol USA unsigned the Protocol. Unmindful of the fraud and corruption ridden carbon trade projects, instead of discarding this fake remedy the Paris Agreement makes way for global carbon market through Article 6 of the Agreement. It makes space for “voluntary contribution” among countries in the implementation of their emission reduction targets and “to allow for higher ambition in their mitigation and adaptation actions”. It creates a new class of carbon assets namely, “internationally transferred mitigation outcomes” (ITMOs) for trading and “support for results- based payments to implement policy approaches”. This new mechanism of UNFCCC has been incarnated as Sustainable Development Mechanism (SDM) as main mitigation tool in place of pre-existing Clean Development Mechanism (CDM) and Joint Implementation post-2020. Industrial War against Climate System What is charitably referred to as “dangerous anthropogenic interference with the climate system” in the text of the UNFCCC is in reality an act of industrial warfare against climate and its allied ecosystem whose impact has become glaring. It is quite surprising that green house gas emissions from the war industry which is reaping unprecedented profits amidst conflicts around natural resources has not been included as one of the key sources of climate crisis. It is apparent that world governments have adopted Ostrich policy with regard to climate crisis under the influence of undemocratic economic organizations. Richer countries became prosperous and dominant due to carbon emission since 1750. Between 1850 and 2011, USA, European Union, Russian Federation, Japan and others contributed over 2/3rd of total global emissions. Notably, developed countries have been outsourcing their carbon-intensive industries to developing countries like India. Admittedly, the estimated aggregate greenhouse gas emission levels in 2025 and 2030 resulting from INDCs do not fall within least –cost 2 degree C but rather lead to a projected level of 55 gigatons in 2030. The Decision underlines that in order to hold the increase in global average temperature to below 2 degree C above pre-industrial levels there is a need for reduction of emissions to 40 gigatons. It is quite bizarre that while almost all the countries have stated their commitments to reduce emissions from 1990 levels, USA has decided to count its reduction in emission using 2005 as the base year. Thus, its commitment of reduction is only 14%insteadof28%ashasbeen claimed quite deceptively. Where does India stand? It has been estimated that India’s current per capita income is close US’s per capita income in the 1890s. Like most developed countries where coal remains unavoidable, India continues to argue that it will continue to use coal as its primary source in its energy mix. Meanwhile, in a remarkable move, the share of renewables in India has increased over 6 times between 2002 and 2015. India has also announced that it will add 175 GW of renewable energy capacity (almost equal to the total installed power generation of Germany) by 2022. This will lead to avoidance of burning over 300 million tonnes of coal. Paris Agreement has a stark lesson for Indian Government and its INDC which promoted “Nuclear Power as a safe, environmentally benign and economically viable source to meet the increasing electricity needs of the country.” The word “nuclear” does not appear in the Agreement despite efforts by countries like India. It is high time India followed the path of those who have no nuclear power reactors and remain opposed to nuclear power. India cannot afford to be complacent citing emissions by top polluters given the fact emissions of top 10 % of urban Indians is about 27 times the emissions of the bottom 10 % of rural India that the carbon footprint of 1 % of the India’s wealthy class is being veiled by 823 million poor class of the country. Saving climate from poisonous market interference Paris Agreement panders to the whims and fancies of commercial czars who are obstinately commodifying and monetizing nature and interfering with climate and allied ecosystems. The natural resource dependent communities are facing unprecedented deprivation. This has created an episteme that blindly bulldozes technical and market solutions as “real” solutions. Meanwhile, World Bank Group feigned surprise on 17th December “to see the extent and detail on carbon markets” included in the Paris Agreement that paves the way for “Carbon Markets 2.0”. A new, non-market, climate finance mechanism is needed to support the formalization and expansion of mitigation and technology transfer as a genuine solution to combat the propensity of promoting free trade in carbon at the cost of climate system. Climate talks remain relevant because fate of the communities and global order is linked to the decision by the richest countries to undergo mandatory fossil fuel de-addiction. But the Agreement fails to make top polluters liable for “dangerous anthropogenic interference” and for endangering human ecosystem which is the substratum for the existence of living beings. In effect, despite the brave effort of a G77 country, Paris conference failed to save climate and intra-generational and inter-generational equity from the banks and markets that threaten our planet by integrating carbon pricing policies in all sectors of economy. It failed to make ratification of Doha amendment 2012 to Kyoto Protocol, 1997 developed under the UNFCCC’s charter covering 2012-2020 time span a priority. India should have taken ethical leadership by declaring carbon trading as a fake solution and by choosing not “to pursue the reckless and environmentally harmful path to development” that the developed countries have taken so far. It should have sought early ratification of the Doha Amendment to the Protocol which is the international law till 2020. But this law has not entered into force as yet. This exposes the hollowness of the claims about leading “nearly 200 nations to the most ambitious agreement in history to fight climate change” made by President Barack Obama in his last State of the Union address in front of the US Congress. The failure to apply “public trust doctrine” for safeguarding climate system is quite evident. Ahead of the next conference which is planned in November 2016 in Marrakech, Morocco, India should take recourse to “long memories” to mobilize G-77 countries to put limits on ungovernable national and transnational business enterprises by adopting principles that account for the imminent danger to the very substratum of human existence. By Dr Gopal Krishna* *Public policy analyst; Director, ToxicsWatch Alliance (TWA). Source: PUCL Bulletin The author has been tracking the climate issue for more than a decade Labels: Climate inequlality, INDIA, Nicaragua, Paris Agreement, Poor, Rich countries 1.5 degree C target (1) 45th US President Donald Trump (1) A K Sikri Protik Prakash Banerjee (1) Aadhaar Act (8) Aadhaar Amendment Bill. Identity (1) Aadhaar Number (5) Aadhaar Ordinance (1) abolition of nuclear weapons (1) Adani (1) AEBAS (1) Alang beach (2) All India Kachra Intzamia Muhim Manch (AIKIMM) (2) Amritsar residents protests against waste dumpsite in Bhagtanwala (1) and Stockholm Conventions (1) anti-people (1) ASBESTOS FREE INDIA (6) Ban Asbestos (5) Ban Asbestos India (1) Basel Convention (4) Bengal (1) Bhatti mines (1) Bhopal 30 Years After (1) Bio-Medical Waste Management Rules (1) biog data (1) Biomedical waste incinerator (1) Biometric (2) biometric timekeeping system (1) Black law (3) Carbon Trade (1) carbon trade project (1) Central Govt (1) Central Pollution Control Board (CPCB) (1) CGWA Guidelines (1) chemical free farming (1) CHENG (ex-Albarela) (1) CIDR (5) citizens (1) CIVIL DEATH (1) climate apartheid (1) climate crisis (3) Climate inequlality (1) climate justice (2) climate talks (2) climate treaty draft text (1) Competition Commission of India (1) Construction and Demolition Waste Management Rules (1) Consumer Protection Bill (2) COP 21 (2) Corporate Crime (48) Dangers (1) De-growth (1) Delay in Judgement (1) Delhi Govt (1) dental amalgam mercury India (1) Dioxins (1) dioxins factory (2) diversion of rivers (1) diverting rivers for interlinking (1) Doha Amendment (2) Draft Agreement for 2015 Climate Agreement (2) Draft Environmental Laws (Amendment) Bill (1) Draft Paris Agreement (1) Draft Plastic Waste Management Rules (1) ecologically destructive (1) end-of-life ship Horizon Trader (1) end-of-life ship M.V.BLOSSOM (1) End-of-life ships (2) Energy Justice (1) Environment and Occupational Health (90) Environment Friendly Measures Announced in Railway Budget (1) Environment Health (1) Environmental Clearance (3) environmental lawlessness (3) Expert Appraisal Committees (1) fake solution (1) Financial Institutions (5) Fundamental Rights (1) Ganga Basin (1) Ganga Waterway project (1) Gender Crisis (1) GM crops (1) Gopal Krishna (1) ground water abstraction (1) Hazardous Industries (117) hazardous substance (4) Hazardous waste (10) Hazardous Waste dumping (5) Hazardous waste rules (1) Hong Kong Convention (1) hospital waste (1) Human Rights Defenders (1) INDC (1) India & Denmark (1) India-EU Summit (1) India-US Joint Statement (1) insecticide tragedy (1) Jindal' (1) Jindal's municipal waste incinerator (3) Jindal's Waste Incineration based power plant (1) Justice Ahsanuddin Amanullah (1) Justice Sikri (1) Justices D Y Chandrachud (1) killer fiber (1) Kuldip Nayar (1) Kyoto Protocol (2) Labour Laws (1) Land grab in Okhla (1) Laws and Legislations (20) Liability for nuclear disaster (1) Maersk (1) Make Indians safe from asbestos related disease (1) Marrakesh Climate Conference (1) Military Mining Industrial Complex (23) ministry of shipping (1) Mithi Virdi nuclear power plant proposal (1) Monocrotophos (2) Mundra (1) Nano food (1) Narendra Modi (1) natural farming (1) New Rules (1) nuclear commerce (1) Okhla (4) Okhla municipal waste incinerator plant (1) Paraquat Dichloride (1) Paris Climate Change agreement (1) Patna High Court (1) post growth degrowth (1) Proposal of interlinking of Ken-Betwa rivers (1) proposed amendment (1) proposed waste based thermal power plant (1) publichealth (1) Ram Sewak Sharma (1) Recycling of Ships Bill (1) religious pollution (1) Revamp CPCB (1) review CPCB's constitution (1) Rich countries (1) Rotterdam Convention (2) Sant Aatmabodhanand (1) Science and Technology Joint Commission (1) self-certification (1) ship breaking (1) shipbreaking code (1) Solid Waste Management Rules (1) Solid Waste Management Rules 2015 (1) Sterilsation deaths (1) Stockholm Convention (1) subsidy (1) Supreme Court of Canada (1) Sushma Swaraj (1) Three Supreme Court verdicts (1) toxic ash fall (1) Toxic Norwegian ship (1) ToxicsWatch Alliance (1) TRAI (1) Tribunal (1) UID (7) UID/Aadhaar (20) UIDAI (1) UN treaty for TNCs’ regulations (1) UNFCCC (5) Urban and Rural Sanitation (1) Urban Crisis (22) Vedas (1) Verdicton Aadhaar project & Aadhaar Act unconstitutional (1) VIOLENCE AGAINST STERLITE PROTESTORS IN THOOTHUKUDI (1) VM Tarkunde (1) waste based thermal power plant (1) Waste burning (1) Waste imperialism (1) waste incineration (1) waste incinerator technology (2) WASTE TO ENERGY (1) Watershed and River Basins (39) Wetland (Conservation and Management) Rules (1) Yamuna (1) DiaNuke.org World Nuclear Industry Status Report 2019 [Full Text] - While the number of operating reactors has increased over the past year by four to 417 as of mid-2019, it remains below the number of 418 from 30 years a... Copyright © 2013. ToxicsWatch, Journal of Earth, Science, Economy and Justice - All Rights Reserved
cc/2020-05/en_middle_0097.json.gz/line1418384
__label__wiki
0.607945
0.607945
Search in: Site Wide 2L Founded in 2001, the music captured by 2L (Lindberg Lyd) and their famed producer and recording engineer Morten Lindberg features Norwegian composers and performers and an international repertoire reflected in the Nordic atmosphere. The 2L catalog includes more than 100 albums in musical genres including Classical, Jazz, Vocal, Soundtrack, Instrumental and World Music. Since 2006, DSD and DXD albums from 2L have received a total of 34 Grammy Award nominations, 26 of these in the categories of Best Engineered Album, Best Surround Sound Album, Best Immersive Audio Album and Producer of the Year. The surround sound recordings of 2L not only transform the entire listening experience, but also – more radically – these innovative recordings overturn some very basic concepts regarding how music is played and even composed. 2L emphasizes not just Stereo DSD and DXD releases but also Surround Sound DSD and DXD editions of all their albums. Several of these DSD and DXD surround sound recordings have received Grammy Award Nominations as Best Surround Sound production of the year. And you can download them directly from Native DSD. 2L records in spacious acoustic venues: large concert halls, churches and cathedrals. This is where we can make the most intimate recordings. The qualities we seek in large rooms are not necessarily just a big reverb, but often an openness due to the absence of close reflecting walls. Making an ambient and beautiful recording is the way of least resistance. Searching the fine edge between direct contact and openness - that’s the real challenge! A really good recording should be able to bodily move the listener. This core quality of audio production is made by choosing the right venue for the repertoire, and by balancing the image in the placement of microphones and musicians relative to each other in that venue. There is no method available today to reproduce the exact perception of attending a live performance. That leaves us with the art of illusion when it comes to recording music. As recording engineers and producers we need to do exactly the same as any good musician: interpret the music and the composer’s intentions and adapt to the media where we perform. Recorded music is no longer a matter of a fixed one- or two-dimensional setting, but rather a three-dimensional enveloping situation. Surround sound audio is a sculpture that you can literally move around and relate to spatially; surrounded by music you can move about in the aural space and choose angles, vantage points and positions. Native DSD is proud to bring this fine catalog of almost 100 Classical, Jazz, Vocal, Soundtrack, Instrumental and World Music recordings to our listeners in Stereo and Multichannel DSD and DXD. This includes offering the Stereo DSD 256 (an exclusive outside of Japan) and Multichannel DSD and DXD editions of these albums (a Native DSD exclusive). Polarity - An Acoustic Jazz Project Quiet Winter Night Bach - Inside Polyphony - Sennheiser Special Edition Mozart Violin Concertos - KV 216, 218, 219 Mozart - Divertimento KV 563 Bach - Inside Polyphony The Nordic Sound Skazki: Piano Works by Nikolai Medtner The Beauty That Still Remains Paus, Ratkje Arnesen, Boksasp, Broske, Gleilo, Gruber, Havroy, Meidell, Reger, Soraas, Trad. Tomba sonora Kristin Bolstad Ja, vi elsker Anonymous, Christian Blom, Christoph Ernst Friedrich Weyse, Edvard Grieg, For Norge Kjampers Fodeland, Johan Halvorsen, Johan Svendsen, Johannes Hanssen, Lars-Erik Larsson, Ludvig Mathias Lindeman, Melchior Vulpius, Oscar Borg, Rikard Nordraak String Quartets vol. IV - Schubert, Ratkje, Britten, Haydn Britten, Haydn, Ratkje, Schubert Browse all music from 2L Baroque Solo Solo with Orchestra
cc/2020-05/en_middle_0097.json.gz/line1418396
__label__cc
0.687842
0.312158
Abandonment. Causes and Consequences Alternative methods to animal experiments Animals in circuses Breeding and hunting animals to show off their fur or skin Captivity shows and therapies Cruel festivals with animals Experimenting with animals Hunting, capturing and trafficking Intensive animal breeding Torture shows Transport over long distance or in bad conditions Zoos are like prisons Elephants, lions, tigers, rhinoceros, zebras, chimpanzees, crocodiles, pythons, ostriches, dromedaries, bears, etc. A long list of animals subjected and converted into puppets for human entertainment. ANTI-NATURAL ACTIONS Balancing on balls, riding a bicycle, driving motorcycles, jumping through rings of fire, dancing, jumping, smoking, standing on two legs, getting up, are some of the anti-natural numbers that animals in circuses must interpret, after a long training and domination process to do away with their free will. It is a physical and psychological aggression, via difficult techniques, where they force them to act in a way contrary to how they would in the wild. Different and constant rehearsals are aimed at the complete control of the animal, frightening and causing them anguish until succeeding in doing away with their natural instinct and free will. Constant travelling from one country to another, sudden changes in temperature and climate are other factors that affect animals very negatively. Transport conditions in cage/trailers, with few and insufficient square metres, makes minimum comfort impossible, besides being the permanent and obligatory home for species such as big cats and bears. CONSEQUENCES OF BEING EXPLOITED A number of accidents have occurred, in circuses, as a result of ill-treatment and the bad living conditions of the animals. Stressed by the type of lives that they live, totally contrary to their natural habitat, sometimes they loose control due to, the presence of the public, the volume of the music during the shows, the reflection of the spotlights and forced enclosure. CIRCUSES YES, BUT WITHOUT ANIMALS The circus is a show that has limitless own human resources without having to subject animals to ridicule, ill-treatment and humiliation. This has been understood by a number of circuses, which have achieved huge success and acceptance by the public, through the art and magic of their clowns, acrobatic and juggling acts. A number of countries and cities all over the world have forbidden or limited the presence of animals in circuses. In part, the continuance of this ill-treatment and domination of animals depends on the public that attends the shows. Ask us for more information. Contribute by making people aware and spreading the word. Do It for them: Mandatory CCTV in slaugherhouses
cc/2020-05/en_middle_0097.json.gz/line1418416
__label__cc
0.539335
0.460665
DigitasLBi’s New Global Prez Wants To Bring The Focus Back To Data by Alison Weissbrot // Thursday, February 16th, 2017 – 1:04 pm DigitasLBi had started to grow beyond its core purpose: to be the data and insights shop within the Publicis.Sapient family. When global CEO Luke Taylor stepped down two weeks ago, Nigel Vaz, CEO of Publicis.Sapient in AMEA and APAC, also became global President of DigitasLBi. As president, Vaz will have oversight of DigitasLBi’s brand strategy and positioning, but not a P&L. Rather, the agency will operate on regional P&Ls. As president, Vaz will streamline the agency's focus on its core capability. “Digitas has always been around leveraging data to help transform marketing to be smarter for our clients,” Vaz told AdExchanger. “That’s got to be where we operate.” In his dual role as regional CEO of Publicis.Sapient and global president of DigitasLBi, Vaz must further integrate Publicis’ digital assets to deliver across a holistic consumer journey. But Publicis has been experiencing growing pains. On a Q4 earnings call last week, the group wrote down Publicis.Sapient by $1.5 billion. Vaz spoke with AdExchanger, but declined comment on the write-down. AdExchanger: How did Digitas get off course from its core expertise in helping clients derive insights from data? NIGEL VAZ: Most organizations can do many things. Strategy and focus is not about not doing the things you can do, but doing the things you should do or were born to do. What kinds of things will DigitasLBi focus on going forward? When you have so many different inputs in terms of media, interaction on owned properties like websites and mobile apps and interactions with partners in your ecosystem, how do you orchestrate a frictionless interaction with a customer? Through data and more targeted communications, which has an operational benefit in the context of media spend, but also creates a richer interaction. Why did Luke Taylor step down? Did it have to do with ongoing organizational changes at Publicis Groupe? Luke has been with the business for a long time. He was one of the founders of an agency that became part of LBi almost 22 years ago. He’s a phenomenal guy and somebody we wish well, but he hasn’t had a break in 22 years. It might be as much his own personal ambitions going forward as anything to do with Publicis. What do you make of other leadership exits at Publicis Groupe? Publicis is going through a tremendous period of transformation trying to move the business from simply being about communications to helping companies transform their businesses. To that extent, we're going through our own transformation. In transforming yourself, people are going to change roles and move around, but from my perspective, that’s the norm. How does DigitasLBi fit within the Publicis.Sapient family? SapientRazorfish, Sapient Consulting and DigitasLBi exist on a continuum. SapientRazorfish is all about building products and services to define the brand as the experience. Sapient Consulting has deep expertise in consulting, technology and industry expertise. I think of this a major and minor concept. SapientRazorfish majors in how we transform businesses leveraging experiences and building digital products and services. They minor in digital communications and marketing. Digitas majors around deriving insights from data and orchestrating that data along the customer journey. I don’t think we or anybody is executing those two propositions perfectly anywhere. With you leading both teams, will Digitas have more access to expertise across Publicis.Sapient? How will that further break down silos across the group? The intent is not to consolidate brands or people. It’s to connect capabilities that sit on a continuum of transforming marketing around data, building digital products and services and leveraging consulting and technology expertise. We are connecting those capabilities in service of our clients more not just within Publicis.Sapient, but also within Publicis Groupe. A big part of this is creating the freedom for our people to do what makes sense for clients. The transformation that Maurice has led over the past few years, including the acquisition of Sapient, has created a culture that puts clients as the primary focus instead of internal P&Ls and organizational structures that get in the way. We’re trying to enable that stuff to happen innately. [People] don’t care that someone sitting next to them is from a different hub or brand. For too long in the industry we haven’t done enough to create an environment where people are able to operate in this way. This interview has been edited and condensed.
cc/2020-05/en_middle_0097.json.gz/line1418418
__label__wiki
0.674438
0.674438
Ekin Cheng confirms wedding news Rumoured to be tying the knot with Hong Kong actress Yoyo Mung, Hong Kong actor Ekin Cheng revealed that he will be getting married "before end of the world." On Sunday night, Ekin and Charlene Choi met with the media to promote their new movie, My Sassy Hubby. It is the pair's first collaboration since My Wife is 18 in 2002 but they showed good rapport. Co-stars Elva Ni and Wylie Chiu were present at the event as well. Recently, the actor was rumoured to be tying the knot with his girlfriend of seven years, Yoyo Mung. Yoyo had apparently picked a black wedding gown. The actor's wedding rumours took the limelight away from the movie promotions and Ekin denied the speculations, claiming that "it will take the surprise away if we keep harping on it [the wedding]." The 45-year-old also denied the rumours were spread on purpose to hype up his August concert at the Hong Kong Coliseum. The actor shared that he "thought of marriage before but will not bring it up often." He then coyly revealed that he will get married "before end of the world." Responding to his ex-girlfriend Gigi Leung's well-wishes for his wedding, Ekin expressed that "it won't be too late for her to send her congratulations when I really get married." The actor then let on that he is doing his best to prepare for the upcoming concert and emphasized that he will not get married secretly. 寺島拓篤 - Architect | Powered by Last.fm actor: ekin cheng Gulinazha in Wonderland photoshoot New actress Gulinazha, one of the female leads for Xuanyuan Sword: Scar of Heaven (Hu Ge, Liu Shishi, Tang Yan, Jiang Junfu, Ma Tianyu, etc.) and Beijing Film Academy freshman, does an "Alice in Wonderland" themed photoshoot with model Xiao Kaiti. source: cfensi actress, china, photoshoot chikimonki JL Performs Title Song @ Debut Showcase New group JL held their (re)debut showcase in Beijing yesterday. There's no ful length video out yet but here's a clip of them performing their title song LIVE (unlike some other group...) Source: Jason's Weibo & Yinyuetai "The Girl Up the Bread Tree" Starring Tang Yan & Sonia Sui Releases 10 Min Trailer This will be Tang Yan's 4th drama scheduled to release during the 2nd half of 2012. Source: Tang Yan Weibo & Sina Video actress: tang yan, tv/drama
cc/2020-05/en_middle_0097.json.gz/line1418420
__label__wiki
0.801596
0.801596
Tripti Home Tripti Joshi (Editor) I Live my life to the Fullest!!! coz you know you only get one !!! Albert Macklin Updated on May 30, 2018 Occupation Actor Name Albert Macklin Role Film actor Born November 18, 1958 (age 57) (1958-11-18) Los Angeles Awards Obie Award for Performance Movies Date with an Angel, Streamers, Grace of My Heart, Advice from a Caterpillar, Marci X Similar People Tom McLoughlin, Robert Altman, Adam Nee, Richard Benjamin, Don Scardino Albert Macklin (born 1958) is an American film and stage actor. David & Layla (2005) Cradle Will Rock (1999) Daylight (1996) Date with an Angel (1987) Law & Order: Criminal Intent episode "Gemini" (2003) Ed episode "The Music Box" (2001) Frasier episode "Perspectives on Christmas" (1997) The Equalizer episode "Pretenders" (1986) Family Ties episode "Checkmate" (1986) Remington Steele episode "Steele in the Family" (1985) Dog Opera Finding Donis Anne June Moon Albert Macklin Wikipedia Don Scardino Richard Benjamin
cc/2020-05/en_middle_0097.json.gz/line1418423
__label__cc
0.742446
0.257554
Amelia Workman The Shipment Tag Archives: Bart Freundlich About, Film, Theater My contract with American Son is ending just as pilot season is beginning to take off. It’s been a thrilling ride on my first Broadway show (to say the least). While I never went on for Kerry, I learned an immense amount from her and this experience. I’m so grateful for all the Black Girl Magic (see above!) and to be able to take everything I’ve learned into the next chapter of my journey. What’s more, Netflix has decided to adapt American Son! It feels good to have played a small role in such a culture shifting story and am excited that more people will get to experience its heart and weight. In other good news, After The Wedding is set to premiere in the Opening Night Film slot at Sundance this week! I had a wonderful time working on the film and can’t wait to see how it’s received. I’m also more than eager to find out if my scene with the stunning and gracious Michelle Williams made the final edit! Tagged #blackgirlmagic, After The Wedding, American Son, Bart Freundlich, Broadway, broadway debut, drama, Eugene Lee, film festival, identity, Jeremy Jordan, Julianne Moore, Kenny Leon, Kerry Washington, Michelle Obama, Michelle Williams, movie, Netflix, opening night, Steven Pasquale, Sundance Film, Readings I’m spending the first part of June filming Bart Freundlich‘s After The Wedding with Michelle Williams and Julianne Moore. The set has been extremely friendly, professional and comfortable. I feel so lucky to be having so much fun while working alongside such a talented team. And I’m shooting during my birthday so it’s a perfect time to hit a milestone. The path forward feels clearer than ever! During the latter part of June I’m spending some time at the Dorset Theatre Festival working on Kate Cortesi’s Is Edward Snowden Single? with Pirronne Yousefzadeh. I’ve been developing this two-hander with Kate for a while and so I’m excited to take some time away to really dig into the fabric of this smart and devastating play. In July I’m headed to the Cape Cod Theatre Project to work with Laura Jacqmin on End Of Message. I’m so excited to work with her again! For me, a lot of her work is about the complexity of being a woman in the workplace and/or in a relationship. She’s also just really great at character and dialogue, so every time I work on one of her plays I get to work with incredible actors who are totally game to chew up her language and ideas. After that I’ll go to New York Stage And Film to work on a new musical created by Molly Beach Murphy, Jeanna Phillips and Annie Tippe titled Cowboy Bob. I don’t know any of the creative team for this fun new piece, but we’ve got lots of familiars in common so I’m excited to take this journey with them. More soon! Tagged Bart Freundlich, Cape Cod Theatre Projct, development, Dorset Theatre Festival, drama, film, Julianne Moore, Michelle Williams, movie, musical, new musical, new plays, NYSAF, reading, Vassar Davien Littlefield (Management) 3400 Wayne Avenue, C-33 Bronx, New York, 10467 Wolf Talent Group (Legit) 165 W 46th Street, #910 Paradigm Talent Agency (Commercial and Voiceover)
cc/2020-05/en_middle_0097.json.gz/line1418427
__label__cc
0.68481
0.31519
by Jack London "What do it matter where or 'ow we die, So long as we've our 'ealth to watch it all?" --Sestina of the Tramp-Royal Perhaps the greatest charm of tramp-life is the absence of monotony. In Hobo Land the face of life is protean--an ever changing phantasmagoria, where the impossible happens and the unexpected jumps out of the bushes at every turn of the road. The hobo never knows what is going to happen the next moment; hence, he lives only in the present moment. He has learned the futility of telic endeavor, and knows the delight of drifting along with the whimsicalities of Chance. Often I think over my tramp days, and ever I marvel at the swift succession of pictures that flash up in my memory. It matters not where I begin to think; any day of all the days is a day apart, with a record of swift-moving pictures all its own. For instance, I remember a sunny summer morning in Harrisburg, Pennsylvania, and immediately comes to my mind the auspicious beginning of the day--a "set-down" with two maiden ladies, and not in their kitchen, but in their dining room, with them beside me at the table. We ate eggs, out of egg-cups! It was the first time I had ever seen egg-cups, or heard of egg-cups! I was a bit awkward at first, I'll confess; but I was hungry and unabashed. I mastered the egg-cup, and I mastered the eggs in a way that made those two maiden ladies sit up. Why, they ate like a couple of canaries, dabbling with the one egg each they took, and nibbling at tiny wafers of toast. Life was low in their bodies; their blood ran thin; and they had slept warm all night. I had been out all night, consuming much fuel of my body to keep warm, beating my way down from a place called Emporium, in the northern part of the state. Wafers of toast! Out of sight! But each wafer was no more than a mouthful to me--nay, no more than a bite. It is tedious to have to reach for another piece of toast each bite when one is potential with many bites. When I was a very little lad, I had a very little dog called Punch. I saw to his feeding myself. Some one in the household had shot a lot of ducks, and we had a fine meat dinner. When I had finished, I prepared Punch's dinner--a large plateful of bones and tidbits. I went outside to give it to him. Now it happened that a visitor had ridden over from a neighboring ranch, and with him had come a Newfoundland dog as big as a calf. I set the plate on the ground. Punch wagged his tail and began. He had before him a blissful half-hour at least. There was a sudden rush. Punch was brushed aside like a straw in the path of a cyclone, and that Newfoundland swooped down upon the plate. In spite of his huge maw he must have been trained to quick lunches, for, in the fleeting instant before he received the kick in the ribs I aimed at him, he completely engulfed the contents of the plate. He swept it clean. One last lingering lick of his tongue removed even the grease stains. As that big Newfoundland behaved at the plate of my dog Punch, so behaved I at the table of those two maiden ladies of Harrisburg. I swept it bare. I didn't break anything, but I cleaned out the eggs and the toast and the coffee. The servant brought more, but I kept her busy, and ever she brought more and more. The coffee was delicious, but it needn't have been served in such tiny cups. What time had I to eat when it took all my time to prepare the many cups of coffee for drinking? At any rate, it gave my tongue time to wag. Those two maiden ladies, with their pink-and-white complexions and gray curls, had never looked upon the bright face of adventure. As the "Tramp-Royal" would have it, they had worked all their lives "on one same shift." Into the sweet scents and narrow confines of their uneventful existence I brought the large airs of the world, freighted with the lusty smells of sweat and strife, and with the tangs and odors of strange lands and soils. And right well I scratched their soft palms with the callous on my own palms--the half-inch horn that comes of pull-and-haul of rope and long and arduous hours of caressing shovel-handles. This I did, not merely in the braggadocio of youth, but to prove, by toil performed, the claim I had upon their charity. Ah, I can see them now, those dear, sweet ladies, just as I sat at their breakfast table twelve years ago, discoursing upon the way of my feet in the world, brushing aside their kindly counsel as a real devilish fellow should, and thrilling them, not alone with my own adventures, but with the adventures of all the other fellows with whom I had rubbed shoulders and exchanged confidences. I appropriated them all, the adventures of the other fellows, I mean; and if those maiden ladies had been less trustful and guileless, they could have tangled me up beautifully in my chronology. Well, well, and what of it? It was fair exchange. For their many cups of coffee, and eggs, and bites of toast, I gave full value. Right royally I gave them entertainment. My coming to sit at their table was their adventure, and adventure is beyond price anyway. Coming along the street, after parting from the maiden ladies, I gathered in a newspaper from the doorway of some late-riser, and in a grassy park lay down to get in touch with the last twenty-four hours of the world. There, in the park, I met a fellow-hobo who told me his life-story and who wrestled with me to join the United States Army. He had given in to the recruiting officer and was just about to join, and he couldn't see why I shouldn't join with him. He had been a member of Coxey's Army in the march to Washington several months before, and that seemed to have given him a taste for army life. I, too, was a veteran, for had I not been a private in Company L of the Second Division of Kelly's Industrial Army?--said Company L being commonly known as the "Nevada push." But my army experience had had the opposite effect on me; so I left that hobo to go his way to the dogs of war, while I "threw my feet" for dinner. This duty performed, I started to walk across the bridge over the Susquehanna to the west shore. I forget the name of the railroad that ran down that side, but while lying in the grass in the morning the idea had come to me to go to Baltimore; so to Baltimore I was going on that railroad, whatever its name was. It was a warm afternoon, and part way across the bridge I came to a lot of fellows who were in swimming off one of the piers. Off went my clothes and in went I. The water was fine; but when I came out and dressed, I found I had been robbed. Some one had gone through my clothes. Now I leave it to you if being robbed isn't in itself adventure enough for one day. I have known men who have been robbed and who have talked all the rest of their lives about it. True, the thief that went through my clothes didn't get much--some thirty or forty cents in nickels and pennies, and my tobacco and cigarette papers; but it was all I had, which is more than most men can be robbed of, for they have something left at home, while I had no home. It was a pretty tough gang in swimming there. I sized up, and knew better than to squeal. So I begged "the makings," and I could have sworn it was one of my own papers I rolled the tobacco in. Then on across the bridge I hiked to the west shore. Here ran the railroad I was after. No station was in sight. How to catch a freight without walking to a station was the problem. I noticed that the track came up a steep grade, culminating at the point where I had tapped it, and I knew that a heavy freight couldn't pull up there any too lively. But how lively? On the opposite side of the track rose a high bank. On the edge, at the top, I saw a man's head sticking up from the grass. Perhaps he knew how fast the freights took the grade, and when the next one went south. I called out my questions to him, and he motioned to me to come up. I obeyed, and when I reached the top, I found four other men lying in the grass with him. I took in the scene and knew them for what they were--American gypsies. In the open space that extended back among the trees from the edge of the bank were several nondescript wagons. Ragged, half-naked children swarmed over the camp, though I noticed that they took care not to come near and bother the men-folk. Several lean, unbeautiful, and toil-degraded women were pottering about with camp-chores, and one I noticed who sat by herself on the seat of one of the wagons, her head drooped forward, her knees drawn up to her chin and clasped limply by her arms. She did not look happy. She looked as if she did not care for anything--in this I was wrong, for later I was to learn that there was something for which she did care. The full measure of human suffering was in her face, and, in addition, there was the tragic expression of incapacity for further suffering. Nothing could hurt any more, was what her face seemed to portray; but in this, too, I was wrong. I lay in the grass on the edge of the steep and talked with the men-folk. We were kin--brothers. I was the American hobo, and they were the American gypsy. I knew enough of their argot for conversation, and they knew enough of mine. There were two more in their gang, who were across the river "mushing" in Harrisburg. A "musher" is an itinerant fakir. This word is not to be confounded with the Klondike "musher," though the origin of both terms may be the same; namely, the corruption of the French marche ons, to march, to walk, to "mush." The particular graft of the two mushers who had crossed the river was umbrella-mending; but what real graft lay behind their umbrella-mending, I was not told, nor would it have been polite to ask. It was a glorious day. Not a breath of wind was stirring, and we basked in the shimmering warmth of the sun. From everywhere arose the drowsy hum of insects, and the balmy air was filled with scents of the sweet earth and the green growing things. We were too lazy to do more than mumble on in intermittent conversation. And then, all abruptly, the peace and quietude was jarred awry by man. Two bare-legged boys of eight or nine in some minor way broke some rule of the camp--what it was I did not know; and a man who lay beside me suddenly sat up and called to them. He was chief of the tribe, a man with narrow forehead and narrow-slitted eyes, whose thin lips and twisted sardonic features explained why the two boys jumped and tensed like startled deer at the sound of his voice. The alertness of fear was in their faces, and they turned, in a panic, to run. He called to them to come back, and one boy lagged behind reluctantly, his meagre little frame portraying in pantomime the struggle within him between fear and reason. He wanted to come back. His intelligence and past experience told him that to come back was a lesser evil than to run on; but lesser evil that it was, it was great enough to put wings to his fear and urge his feet to flight. Still he lagged and struggled until he reached the shelter of the trees, where he halted. The chief of the tribe did not pursue. He sauntered over to a wagon and picked up a heavy whip. Then he came back to the centre of the open space and stood still. He did not speak. He made no gestures. He was the Law, pitiless and omnipotent. He merely stood there and waited. And I knew, and all knew, and the two boys in the shelter of the trees knew, for what he waited. The boy who had lagged slowly came back. His face was stamped with quivering resolution. He did not falter. He had made up his mind to take his punishment. And mark you, the punishment was not for the original offence, but for the offence of running away. And in this, that tribal chieftain but behaved as behaves the exalted society in which he lived. We punish our criminals, and when they escape and run away, we bring them back and add to their punishment. Straight up to the chief the boy came, halting at the proper distance for the swing of the lash. The whip hissed through the air, and I caught myself with a start of surprise at the weight of the blow. The thin little leg was so very thin and little. The flesh showed white where the lash had curled and bitten, and then, where the white had shown, sprang up the savage welt, with here and there along its length little scarlet oozings where the skin had broken. Again the whip swung, and the boy's whole body winced in anticipation of the blow, though he did not move from the spot. His will held good. A second welt sprang up, and a third. It was not until the fourth landed that the boy screamed. Also, he could no longer stand still, and from then on, blow after blow, he danced up and down in his anguish, screaming; but he did not attempt to run away. If his involuntary dancing took him beyond the reach of the whip, he danced back into range again. And when it was all over--a dozen blows--he went away, whimpering and squealing, among the wagons. The chief stood still and waited. The second boy came out from the trees. But he did not come straight. He came like a cringing dog, obsessed by little panics that made him turn and dart away for half a dozen steps. But always he turned and came back, circling nearer and nearer to the man, whimpering, making inarticulate animal-noises in his throat. I saw that he never looked at the man. His eyes always were fixed upon the whip, and in his eyes was a terror that made me sick--the frantic terror of an inconceivably maltreated child. I have seen strong men dropping right and left out of battle and squirming in their death-throes, I have seen them by scores blown into the air by bursting shells and their bodies torn asunder; believe me, the witnessing was as merrymaking and laughter and song to me in comparison with the way the sight of that poor child affected me. The whipping began. The whipping of the first boy was as play compared with this one. In no time the blood was running down his thin little legs. He danced and squirmed and doubled up till it seemed almost that he was some grotesque marionette operated by strings. I say "seemed," for his screaming gave the lie to the seeming and stamped it with reality. His shrieks were shrill and piercing; within them no hoarse notes, but only the thin sexlessness of the voice of a child. The time came when the boy could stand it no more. Reason fled, and he tried to run away. But now the man followed up, curbing his flight, herding him with blows back always into the open space. Then came interruption. I heard a wild smothered cry. The woman who sat in the wagon seat had got out and was running to interfere. She sprang between the man and boy. "You want some, eh?" said he with the whip. "All right, then." He swung the whip upon her. Her skirts were long, so he did not try for her legs. He drove the lash for her face, which she shielded as best she could with her hands and forearms, drooping her head forward between her lean shoulders, and on the lean shoulders and arms receiving the blows. Heroic mother! She knew just what she was doing. The boy, still shrieking, was making his get-away to the wagons. And all the while the four men lay beside me and watched and made no move. Nor did I move, and without shame I say it; though my reason was compelled to struggle hard against my natural impulse to rise up and interfere. I knew life. Of what use to the woman, or to me, would be my being beaten to death by five men there on the bank of the Susquehanna? I once saw a man hanged, and though my whole soul cried protest, my mouth cried not. Had it cried, I should most likely have had my skull crushed by the butt of a revolver, for it was the law that the man should hang. And here, in this gypsy group, it was the law that the woman should be whipped. Even so, the reason in both cases that I did not interfere was not that it was the law, but that the law was stronger than I. Had it not been for those four men beside me in the grass, right gladly would I have waded into the man with the whip. And, barring the accident of the landing on me with a knife or a club in the hands of some of the various women of the camp, I am confident that I should have beaten him into a mess. But the four men were beside me in the grass. They made their law stronger than I. Oh, believe me, I did my own suffering. I had seen women beaten before, often, but never had I seen such a beating as this. Her dress across the shoulders was cut into shreds. One blow that had passed her guard, had raised a bloody welt from cheek to chin. Not one blow, nor two, not one dozen, nor two dozen, but endlessly, infinitely, that whip-lash smote and curled about her. The sweat poured from me, and I breathed hard, clutching at the grass with my hands until I strained it out by the roots. And all the time my reason kept whispering, "Fool! Fool!" That welt on the face nearly did for me. I started to rise to my feet; but the hand of the man next to me went out to my shoulder and pressed me down. "Easy, pardner, easy," he warned me in a low voice. I looked at him. His eyes met mine unwaveringly. He was a large man, broad-shouldered and heavy-muscled; and his face was lazy, phlegmatic, slothful, withal kindly, yet without passion, and quite soulless--a dim soul, unmalicious, unmoral, bovine, and stubborn. Just an animal he was, with no more than a faint flickering of intelligence, a good-natured brute with the strength and mental caliber of a gorilla. His hand pressed heavily upon me, and I knew the weight of the muscles behind. I looked at the other brutes, two of them unperturbed and incurious, and one of them that gloated over the spectacle; and my reason came back to me, my muscles relaxed, and I sank down in the grass. My mind went back to the two maiden ladies with whom I had had breakfast that morning. Less than two miles, as the crow flies, separated them from this scene. Here, in the windless day, under a beneficent sun, was a sister of theirs being beaten by a brother of mine. Here was a page of life they could never see--and better so, though for lack of seeing they would never be able to understand their sisterhood, nor themselves, nor know the clay of which they were made. For it is not given to woman to live in sweet-scented, narrow rooms and at the same time be a little sister to all the world. The whipping was finished, and the woman, no longer screaming, went back to her seat in the wagon. Nor did the other women come to her--just then. They were afraid. But they came afterward, when a decent interval had elapsed. The man put the whip away and rejoined us, flinging himself down on the other side of me. He was breathing hard from his exertions. He wiped the sweat from his eyes on his coat-sleeve, and looked challengingly at me. I returned his look carelessly; what he had done was no concern of mine. I did not go away abruptly. I lay there half an hour longer, which, under the circumstances, was tact and etiquette. I rolled cigarettes from tobacco I borrowed from them, and when I slipped down the bank to the railroad, I was equipped with the necessary information for catching the next freight bound south. Well, and what of it? It was a page out of life, that's all; and there are many pages worse, far worse, that I have seen. I have sometimes held forth (facetiously, so my listeners believed) that the chief distinguishing trait between man and the other animals is that man is the only animal that maltreats the females of his kind. It is something of which no wolf nor cowardly coyote is ever guilty. It is something that even the dog, degenerated by domestication, will not do. The dog still retains the wild instinct in this matter, while man has lost most of his wild instincts--at least, most of the good ones. Worse pages of life than what I have described? Read the reports on child labor in the United States,--east, west, north, and south, it doesn't matter where,--and know that all of us, profit-mongers that we are, are typesetters and printers of worse pages of life than that mere page of wife-beating on the Susquehanna. I went down the grade a hundred yards to where the footing beside the track was good. Here I could catch my freight as it pulled slowly up the hill, and here I found half a dozen hoboes waiting for the same purpose. Several were playing seven-up with an old pack of cards. I took a hand. A coon began to shuffle the deck. He was fat, and young, and moon-faced. He beamed with good-nature. It fairly oozed from him. As he dealt the first card to me, he paused and said:-- "Say, Bo, ain't I done seen you befo'?" "You sure have," I answered. "An' you didn't have those same duds on, either." He was puzzled. "D'ye remember Buffalo?" I queried. Then he knew me, and with laughter and ejaculation hailed me as a comrade; for at Buffalo his clothes had been striped while he did his bit of time in the Erie County Penitentiary. For that matter, my clothes had been likewise striped, for I had been doing my bit of time, too. The game proceeded, and I learned the stake for which we played. Down the bank toward the river descended a steep and narrow path that led to a spring some twenty-five feet beneath. We played on the edge of the bank. The man who was "stuck" had to take a small condensed-milk can, and with it carry water to the winners. The first game was played and the coon was stuck. He took the small milk-tin and climbed down the bank, while we sat above and guyed him. We drank like fish. Four round trips he had to make for me alone, and the others were equally lavish with their thirst. The path was very steep, and sometimes the coon slipped when part way up, spilled the water, and had to go back for more. But he didn't get angry. He laughed as heartily as any of us; that was why he slipped so often. Also, he assured us of the prodigious quantities of water he would drink when some one else got stuck. When our thirst was quenched, another game was started. Again the coon was stuck, and again we drank our fill. A third game and a fourth ended the same way, and each time that moon-faced darky nearly died with delight at appreciation of the fate that Chance was dealing out to him. And we nearly died with him, what of our delight. We laughed like careless children, or gods, there on the edge of the bank. I know that I laughed till it seemed the top of my head would come off, and I drank from the milk-tin till I was nigh waterlogged. Serious discussion arose as to whether we could successfully board the freight when it pulled up the grade, what of the weight of water secreted on our persons. This particular phase of the situation just about finished the coon. He had to break off from water-carrying for at least five minutes while he lay down and rolled with laughter. The lengthening shadows stretched farther and farther across the river, and the soft, cool twilight came on, and ever we drank water, and ever our ebony cup-bearer brought more and more. Forgotten was the beaten woman of the hour before. That was a page read and turned over; I was busy now with this new page, and when the engine whistled on the grade, this page would be finished and another begun; and so the book of life goes on, page after page and pages without end--when one is young. And then we played a game in which the coon failed to be stuck. The victim was a lean and dyspeptic-looking hobo, the one who had laughed least of all of us. We said we didn't want any water--which was the truth. Not the wealth of Ormuz and of Ind, nor the pressure of a pneumatic ram, could have forced another drop into my saturated carcass. The coon looked disappointed, then rose to the occasion and guessed he'd have some. He meant it, too. He had some, and then some, and then some. Ever the melancholy hobo climbed down and up the steep bank, and ever the coon called for more. He drank more water than all the rest of us put together. The twilight deepened into night, the stars came out, and he still drank on. I do believe that if the whistle of the freight hadn't sounded, he'd be there yet, swilling water and revenge while the melancholy hobo toiled down and up. But the whistle sounded. The page was done. We sprang to our feet and strung out alongside the track. There she came, coughing and spluttering up the grade, the headlight turning night into day and silhouetting us in sharp relief. The engine passed us, and we were all running with the train, some boarding on the side-ladders, others "springing" the side-doors of empty box-cars and climbing in. I caught a flat-car loaded with mixed lumber and crawled away into a comfortable nook. I lay on my back with a newspaper under my head for a pillow. Above me the stars were winking and wheeling in squadrons back and forth as the train rounded the curves, and watching them I fell asleep. The day was done--one day of all my days. To-morrow would be another day, and I was young. Add Pictures to your own personal library. Return to the Jack London Home Page, or . . . Read the next short story; "Pinched"
cc/2020-05/en_middle_0097.json.gz/line1418428
__label__cc
0.564737
0.435263
Salve Regina - A Prayer of Sisterhood Daily Life of Sisters Customs Types of Prayer Mary Blog Published: December 9, 2015 By Sister Julie I did not grow up with the Salve Regina as a part of my faith life -- we prayed it on occasion and I got the Latin down, but that was about it. I'm a Gen Xer and so Latin was not typically part of my Catholic experience. The Latin prayers and songs were used on occasion, but not enough that it was part of the fabric of my own life of faith. Then the nuns happened. I rediscovered the Salve Regina not as a prayer from Latin days past, but a vibrant prayer which "locates" me in sisterhood. Here's what went down. In undergrad and grad school, I met not just individual Catholic sisters and nuns but communities of sisters. I experienced sisters interacting with one another, practicing customs unique to their own communities and to religious life as a whole. And I heard the Salve Regina -- a lot. Now of course, the Salve (as we call it in the 'hood) is a Catholic prayer -- not unique to religious life. Yet it has never failed that when I'm with a religious community or any gathering with sisters and nuns, the Salve pops up -- almost like a common prayer we all hold together. Early on in my nun days, my familiarity and attachment to the prayer came because we sing the Salve Regina at the Remembering prayer service, funeral mass, or burial of a sister who has died. Sometimes accompanied, most times a cappella, a sister intones the first syllable and suddenly a full 52-part choir of nuns bursts into song. Some of us don't even know how to sing or hold a tune, yet we join our voices together and pray our hearts out for our sister "dwelling now in light, yet ever near." I then found that many sisters and nuns from other congregations have a similar custom. Last month I was at a gathering at which there were many different sisters and nuns present from many different communities. Among us was one sister who had to leave suddenly due to a death in the family. As we gathered for our next meeting, one sister pulled together a few more sisters so that at prayer that morning, we could pray for the family. Our prayer of course included the Salve. As one sister began, from each table you could hear the religious sisters and brothers join their voices together and soon everyone at the meeting was enveloped in prayer on behalf of the grieving family. Just this week, on the great feast of the Immaculate Conception (a feast day for MANY women's religious communities), we celebrated Sister Barbara's first profession of vows and belted out the Salve Regina. You could feel the fullness of sisterhood as the words echoed throughout chapel reminding us once again that this one particular sister's "yes" was united with everyone's "yes" to God and God's mission in the world! I would love to hear about what the Salve Regina means for you, and, for those who belong to a religious community, what the community's customs are. Is there another prayer that for you "locates you" in sisterhood or in communion with others? Salve Regina history and translation at University of Dayton Salve Regina video - A virtual choir made up of Carmelite Nuns, Friars and Seculars from around the world
cc/2020-05/en_middle_0097.json.gz/line1418436
__label__wiki
0.509578
0.509578
Emergency Service 7 days a week, 5am-12 am: 303-667-2736 Get Free Security Tips | Shop Now | Make Payment Posts by Rita Lawrence Home Security with IoT, Will it Work? By Rita Lawrence | May 4, 2017 Home Security with IoT, Will it Work? By Shailee Sheth Internet of Things is becoming a trend in many of the big cities and creating lots of revolutionary effects! The internet is providing us an opportunity to be updated tremendously with the idea that all the home devices, as well as groceries, can be… 4 Ways to Boost Your Home Security on a Budget By Rita Lawrence | April 27, 2017 ReBlog Written By Kenny Kline 4 Ways to Boost Your Home Security on a Budget Here’s your terrifying stat for the day: FBI data suggests a burglary occurs every 15 seconds in the U.S. This doesn’t mean you need to lie awake at night with a baseball bat clutched to your chest. But it does mean… 5 Security Gift Ideas for The Person Who Has Everything By Rita Lawrence | November 21, 2016 We all know those people who make us dread Christmas shopping, right? You know, the ones who seem to have everything? Well, we can be pretty confident when we say that All Secure Lock & Security has a list of gift ideas that not only includes items in any price range, but also that… Security Specialist/Locksmith to help keep West Denver safe! By Rita Lawrence | August 19, 2016 Are you a stellar locksmith with at least one year of experience and basic knowledge and skills in commercial, residential and automotive locksmithing? Even better, are you a standout with knowledge in access control, cameras, alarms, safes or networking? Or do you want a career in the locksmith and security industry? We can train the… Being ‘All Secure’ Means Having Peace of Mind By Rita Lawrence | July 15, 2016 We don’t just sell locks. We sell security and peace of mind. Over the last 13 years of being in the lock and security business, I’ve heard over and over again that locks only keep the honest people out and there is always another way in. It’s very true that a burglar could just break… See Who’s at Your Door, No Matter Where You Are According to the FBI, the U.S. had more than 1.7 million burglaries accounting for over $3.9 billion worth of stolen items — or $2,251 per offense — in 2014. And burglars are always getting creative with new tactics for entry. There are numerous news stories about burglars targeting homes by knocking or ringing the doorbell,… Use Your Smartphone to Keep Your Home Secure And Your Family Safe By Rita Lawrence | May 20, 2016 Where is your phone right now? In your pocket? Beside your computer? Chances are, it’s close enough for you to grab from where you are, and that you feel like it has your whole life on it. Your contacts? Your GPS? Your calendar? Your to-do list? Your photos? It’s all there. Did you know that… Why Your Duplicate Key From a Hardware Store Doesn’t Work By Rita Lawrence | March 2, 2016 We see it all the time: a discouraged person coming into our shop asking, “Why doesn’t my duplicate key from the hardware store work?” While this is a frustrating thing for those people, it’s fortunate for them that they are far from alone — and we can help. So why don’t duplicate keys from big… What You Need to Know About Your Car Key By Rita Lawrence | January 25, 2016 Do you know where your spare car key is? No? Then before you get locked out or lose the primary key, click here to order a spare and bring it in to our shop to have it cut and programmed so that it works with your car. What’s that? You think we’re confused by saying… What is the one “must-have” product in your home for security? Many people ask us what the one thing we recommend most for home security is, and it’s an easy answer: a safe. But not just any safe, a secure safe. You might think that’s an obvious and unnecessary stipulation and that safes are, by definition, secure. But unfortunately, that’s far from the truth. A… Family Roots Lock-In Security Business in Arvada Shop Opened Six Years Ago! All Secure Lock & Security
cc/2020-05/en_middle_0097.json.gz/line1418442
__label__wiki
0.518159
0.518159
Chikungunya Disease: Infection-Associated Markers from the Acute to the Chronic Phase of Arbovirus-Induced Arthralgia Laurence Dupuis Maguiraga, Marion Noret, Sonia Brun, Roger Le Grand, et al https://dx.plos.org/10.1371/journal.pntd.0001446 http://journals.plos.org/plosntds/article?id=10.1371%2Fjournal.pntd.0001446 http://www.mendeley.com/research/chikungunya-disease-infectionassociated-markers-acute-chronic-phase-arbovirusinduced-arthralgia {"title"=>"Chikungunya disease: Infection-associated markers from the acute to the chronic phase of arbovirus-induced arthralgia", "type"=>"journal", "authors"=>[{"first_name"=>"Laurence", "last_name"=>"Dupuis-Maguiraga", "scopus_author_id"=>"49861214200"}, {"first_name"=>"Marion", "last_name"=>"Noret", "scopus_author_id"=>"49861840500"}, {"first_name"=>"Sonia", "last_name"=>"Brun", "scopus_author_id"=>"51664446600"}, {"first_name"=>"Roger", "last_name"=>"Le Grand", "scopus_author_id"=>"7004608511"}, {"first_name"=>"Gabriel", "last_name"=>"Gras", "scopus_author_id"=>"7005074062"}, {"first_name"=>"Pierre", "last_name"=>"Roques", "scopus_author_id"=>"7006834700"}], "year"=>2012, "source"=>"PLoS Neglected Tropical Diseases", "identifiers"=>{"scopus"=>"2-s2.0-84859169887", "sgr"=>"84859169887", "issn"=>"19352727", "doi"=>"10.1371/journal.pntd.0001446", "pmid"=>"22479654", "isbn"=>"1935-2727 1935-2735", "pui"=>"364547180"}, "id"=>"b13026c1-cb0d-3a5e-8ce5-34894ceacde8", "abstract"=>"At the end of 2005, an outbreak of fever associated with joint pain occurred in La Réunion. The causal agent, chikungunya virus (CHIKV), has been known for 50 years and could thus be readily identified. This arbovirus is present worldwide, particularly in India, but also in Europe, with new variants returning to Africa. In humans, it causes a disease characterized by a typical acute infection, sometimes followed by persistent arthralgia and myalgia lasting months or years. Investigations in the La Réunion cohort and studies in a macaque model of chikungunya implicated monocytes-macrophages in viral persistence. In this Review, we consider the relationship between CHIKV and the immune response and discuss predictive factors for chronic arthralgia and myalgia by providing an overview of current knowledge on chikungunya pathogenesis. Comparisons of data from animal models of the acute and chronic phases of infection, and data from clinical series, provide information about the mechanisms of CHIKV infection-associated inflammation, viral persistence in monocytes-macrophages, and their link to chronic signs.", "link"=>"http://www.mendeley.com/research/chikungunya-disease-infectionassociated-markers-acute-chronic-phase-arbovirusinduced-arthralgia", "reader_count"=>181, "reader_count_by_academic_status"=>{"Unspecified"=>7, "Professor > Associate Professor"=>10, "Researcher"=>32, "Student > Doctoral Student"=>10, "Student > Ph. D. Student"=>31, "Student > Postgraduate"=>16, "Other"=>8, "Student > Master"=>33, "Student > Bachelor"=>27, "Lecturer"=>1, "Lecturer > Senior Lecturer"=>1, "Professor"=>5}, "reader_count_by_user_role"=>{"Unspecified"=>7, "Professor > Associate Professor"=>10, "Researcher"=>32, "Student > Doctoral Student"=>10, "Student > Ph. D. Student"=>31, "Student > Postgraduate"=>16, "Other"=>8, "Student > Master"=>33, "Student > Bachelor"=>27, "Lecturer"=>1, "Lecturer > Senior Lecturer"=>1, "Professor"=>5}, "reader_count_by_subject_area"=>{"Unspecified"=>11, "Environmental Science"=>2, "Biochemistry, Genetics and Molecular Biology"=>11, "Nursing and Health Professions"=>3, "Mathematics"=>1, "Medicine and Dentistry"=>63, "Agricultural and Biological Sciences"=>64, "Veterinary Science and Veterinary Medicine"=>1, "Chemistry"=>3, "Psychology"=>1, "Social Sciences"=>3, "Immunology and Microbiology"=>18}, "reader_count_by_subdiscipline"=>{"Medicine and Dentistry"=>{"Medicine and Dentistry"=>63}, "Chemistry"=>{"Chemistry"=>3}, "Social Sciences"=>{"Social Sciences"=>3}, "Psychology"=>{"Psychology"=>1}, "Immunology and Microbiology"=>{"Immunology and Microbiology"=>18}, "Agricultural and Biological Sciences"=>{"Agricultural and Biological Sciences"=>64}, "Nursing and Health Professions"=>{"Nursing and Health Professions"=>3}, "Biochemistry, Genetics and Molecular Biology"=>{"Biochemistry, Genetics and Molecular Biology"=>11}, "Mathematics"=>{"Mathematics"=>1}, "Unspecified"=>{"Unspecified"=>11}, "Environmental Science"=>{"Environmental Science"=>2}, "Veterinary Science and Veterinary Medicine"=>{"Veterinary Science and Veterinary Medicine"=>1}}, "reader_count_by_country"=>{"United States"=>2, "Brazil"=>5, "South Africa"=>1, "United Kingdom"=>1, "French Polynesia"=>1, "India"=>1}, "group_count"=>16} http://doi.org/10.1089/jir.2019.0058 http://doi.org/10.1089/vbz.2014.1680 http://doi.org/10.1016/j.ijid.2019.07.024 http://doi.org/10.1016/j.apjtm.2016.07.020 http://doi.org/10.1002/art.38221 http://doi.org/10.3390/v11030289 http://doi.org/10.1371/journal.pntd.0004625 http://doi.org/10.1111/1756-185X.13273 http://doi.org/10.1093/cid/cix283 http://doi.org/10.1002/jmv.23875 http://doi.org/10.4269/ajtmh.13-0544 http://doi.org/10.1099/vir.0.000119 http://doi.org/10.1016/j.jcv.2012.10.019 http://doi.org/10.1016/j.drudis.2013.05.002 http://doi.org/10.1016/j.rmu.2015.06.001 http://doi.org/10.1016/j.yapd.2017.04.002 http://doi.org/10.1016/j.bjm.2016.10.008 http://doi.org/10.3390/md12010115 http://doi.org/10.2217/fvl.15.107 http://doi.org/10.1016/j.rcreue.2016.07.003 http://doi.org/10.1172/JCI84417 http://doi.org/10.1093/ofid/ofy315 http://doi.org/10.1016/j.dci.2014.03.025 http://doi.org/10.1016/j.reumae.2015.12.001 http://doi.org/10.15406/jhvrv.2014.01.00018 http://doi.org/10.1016/j.rcreu.2016.03.003 http://doi.org/10.1016/j.humimm.2017.02.006 http://doi.org/10.1093/trstmh/tru030 http://doi.org/10.1016/j.ekir.2017.06.003 http://doi.org/10.1016/j.biopha.2016.12.069 http://doi.org/10.1111/zph.12641 http://doi.org/10.1016/j.amjmed.2019.10.005 http://doi.org/10.3390/v7072792 http://doi.org/10.1016/S1995-7645(14)60164-4 http://doi.org/10.1128/JCM.02744-14 http://doi.org/10.1016/j.antiviral.2013.06.009 http://doi.org/10.1093/infdis/jiw284 http://doi.org/10.3390/pathogens4030662 http://doi.org/10.1586/14787210.2015.995634 http://doi.org/10.1016/j.rbre.2017.05.006 http://doi.org/10.1099/jgv.0.001039 http://doi.org/10.1097/BOR.0000000000000635 http://doi.org/10.1111/tmi.13154 http://doi.org/10.3389/fcimb.2018.00345 http://doi.org/10.1128/AAC.01220-19 http://doi.org/10.7705/biomedica.v36i0.2990 http://doi.org/10.1016/j.reuma.2015.12.002 http://doi.org/10.14442/jgfm.16.3_204 http://doi.org/10.1002/acr.23519 http://doi.org/10.1016/j.virusres.2013.08.011 http://doi.org/10.1111/odi.12777 http://doi.org/10.2174/1874312901610010129 http://doi.org/10.1016/j.jfma.2014.12.002 http://doi.org/10.1016/j.neuarg.2018.03.001 http://doi.org/10.1016/j.rbr.2017.05.004 http://doi.org/10.1093/femspd/ftv119 http://doi.org/10.1016/j.jaci.2015.01.039 http://doi.org/10.1111/tid.12978 http://doi.org/10.1590/0037-8682-0246-2014 Europe PMC Citations 3304 Feb 02:18 UTC {"@_fa"=>"true", "link"=>[{"@_fa"=>"true", "@ref"=>"self", "@href"=>"https://api.elsevier.com/content/abstract/scopus_id/84859169887"}, {"@_fa"=>"true", "@ref"=>"author-affiliation", "@href"=>"https://api.elsevier.com/content/abstract/scopus_id/84859169887?field=author,affiliation"}, {"@_fa"=>"true", "@ref"=>"scopus", "@href"=>"https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84859169887&origin=inward"}, {"@_fa"=>"true", "@ref"=>"scopus-citedby", "@href"=>"https://www.scopus.com/inward/citedby.uri?partnerID=HzOxMe3b&scp=84859169887&origin=inward"}], "prism:url"=>"https://api.elsevier.com/content/abstract/scopus_id/84859169887", "dc:identifier"=>"SCOPUS_ID:84859169887", "eid"=>"2-s2.0-84859169887", "dc:title"=>"Chikungunya disease: Infection-associated markers from the acute to the chronic phase of arbovirus-induced arthralgia", "dc:creator"=>"Dupuis-Maguiraga L.", "prism:publicationName"=>"PLoS Neglected Tropical Diseases", "prism:issn"=>"19352727", "prism:eIssn"=>"19352735", "prism:volume"=>"6", "prism:issueIdentifier"=>"3", "prism:pageRange"=>nil, "prism:coverDate"=>"2012-03-01", "prism:coverDisplayDate"=>"March 2012", "prism:doi"=>"10.1371/journal.pntd.0001446", "citedby-count"=>"120", "affiliation"=>[{"@_fa"=>"true", "affilname"=>"Université Paris-Sud", "affiliation-city"=>"Orsay", "affiliation-country"=>"France"}, {"@_fa"=>"true", "affilname"=>"CEA Fontenay aux Roses", "affiliation-city"=>"Fontenay-aux-Roses", "affiliation-country"=>"France"}], "pubmed-id"=>"22479654", "prism:aggregationType"=>"Journal", "subtype"=>"ar", "subtypeDescription"=>"Article", "article-number"=>"e1446", "source-id"=>"11900154404", "openaccess"=>"1", "openaccessFlag"=>true} Facebook 827 Jul 19:07 UTC {"url"=>"http%3A%2F%2Fjournals.plos.org%2Fplosntds%2Farticle%3Fid%3D10.1371%252Fjournal.pntd.0001446", "share_count"=>1, "like_count"=>0, "comment_count"=>7, "click_count"=>0, "total_count"=>8} Reddit07 Apr 02:38 UTC Twitter 1119 Jan 17:12 UTC {"id"=>"528867765453848576", "text"=>"@carlosneumoruiz Chikungunya\n\nhttp://t.co/xRI7OtKacl", "created_at"=>"2014-11-02T11:14:35Z", "user"=>"ginecomaterno", "user_name"=>"ricardo gomez MD", "user_profile_image"=>"http://pbs.twimg.com/profile_images/526854975952269314/b6He4Oay_normal.jpeg"} {"id"=>"528873803775229952", "text"=>"Un buen Reviews de contenido científico #Chikungunya, Excelente, gracias. vía @ginecomaterno. http://t.co/TGwFs8z4nz”", "created_at"=>"2014-11-02T11:38:35Z", "user"=>"carlosneumoruiz", "user_name"=>"Dr. Carlos Ruiz G", "user_profile_image"=>"http://pbs.twimg.com/profile_images/482237492142538753/Jehn8HR__normal.jpeg"} {"id"=>"528873811798933505", "text"=>"RT @ginecomaterno: @carlosneumoruiz Chikungunya\n\nhttp://t.co/xRI7OtKacl", "created_at"=>"2014-11-02T11:38:37Z", "user"=>"carlosneumoruiz", "user_name"=>"Dr. Carlos Ruiz G", "user_profile_image"=>"http://pbs.twimg.com/profile_images/482237492142538753/Jehn8HR__normal.jpeg"} {"id"=>"528876292582932480", "text"=>"RT @carlosneumoruiz: Un buen Reviews de contenido científico #Chikungunya, Excelente, gracias. vía @ginecomaterno. http://t.co/TGwFs8z4nz”", "created_at"=>"2014-11-02T11:48:28Z", "user"=>"perfumedemujer_", "user_name"=>"Dayana", "user_profile_image"=>"http://pbs.twimg.com/profile_images/3536847912/76bee6b0bae5d82904a74890f7cc223f_normal.jpeg"} {"id"=>"528997658439221250", "text"=>"@raforih http://t.co/xRI7OtKacl\n\nEstupenda revision aunque imagino que tiene cosas mejores, la intencion cuenta.. Saludos Profesor!", "created_at"=>"2014-11-02T19:50:44Z", "user"=>"ginecomaterno", "user_name"=>"ricardo gomez MD", "user_profile_image"=>"http://pbs.twimg.com/profile_images/526854975952269314/b6He4Oay_normal.jpeg"} {"id"=>"639588382688067584", "text"=>"#Rotreuma La artritis crónica por Chikungunya puede ser por persistencia de este virus en los macrófagos tisulares http://t.co/NPhjrx0I2t", "created_at"=>"2015-09-03T23:58:48Z", "user"=>"erikapadilla80", "user_name"=>"Erika Padilla MD.", "user_profile_image"=>"http://pbs.twimg.com/profile_images/638895038945185792/sbSH2WYk_normal.jpg"} {"id"=>"640510977126068224", "text"=>"RT @erikapadilla80: #Rotreuma La artritis crónica por Chikungunya puede ser por persistencia de este virus en los macrófagos tisulares htt…", "created_at"=>"2015-09-06T13:04:51Z", "user"=>"nmoralesv", "user_name"=>"Yazeft Morales. CO", "user_profile_image"=>"http://pbs.twimg.com/profile_images/639806600031637504/HpkS9PRb_normal.jpg"} {"id"=>"641569645183549440", "text"=>"RT @erikapadilla80: #Rotreuma La artritis crónica por Chikungunya puede ser por persistencia de este virus en los macrófagos tisulares htt…", "created_at"=>"2015-09-09T11:11:37Z", "user"=>"carvicab", "user_name"=>"Carlo V Caballero MD", "user_profile_image"=>"http://pbs.twimg.com/profile_images/633057648464789504/GWFBeriJ_normal.jpg"} {"id"=>"641574431777800193", "text"=>"RT @erikapadilla80: #Rotreuma La artritis crónica por Chikungunya puede ser por persistencia de este virus en los macrófagos tisulares htt…", "created_at"=>"2015-09-09T11:30:39Z", "user"=>"tata_mutis", "user_name"=>"✨Tata Mutis✨", "user_profile_image"=>"http://pbs.twimg.com/profile_images/639282962819891200/rX5EtFj4_normal.jpg"} {"id"=>"641578188745916416", "text"=>"RT @erikapadilla80: #Rotreuma La artritis crónica por Chikungunya puede ser por persistencia de este virus en los macrófagos tisulares htt…", "created_at"=>"2015-09-09T11:45:34Z", "user"=>"LeidyPiedra1", "user_name"=>"Leidy Piedra", "user_profile_image"=>"http://pbs.twimg.com/profile_images/631234360251916288/FyzSiMA-_normal.jpg"} {"id"=>"641581434008924160", "text"=>"RT @erikapadilla80: #Rotreuma La artritis crónica por Chikungunya puede ser por persistencia de este virus en los macrófagos tisulares htt…", "created_at"=>"2015-09-09T11:58:28Z", "user"=>"iliana1194_g", "user_name"=>"Iliana Mercado G", "user_profile_image"=>"http://pbs.twimg.com/profile_images/590347926402105345/vTauobsR_normal.jpg"} {"title"=>"Macrophage", "url"=>"http://en.wikipedia.org/wiki/Macrophage", "timestamp"=>"2019-03-14T14:47:32Z"} {"title"=>"Makrofág", "url"=>"http://hu.wikipedia.org/wiki/Makrofág", "timestamp"=>"2019-02-21T11:54:42Z"} {"month"=>"4", "year"=>"2012", "pdf_views"=>"166", "xml_views"=>"14", "html_views"=>"1448"} {"files"=>["https://ndownloader.figshare.com/files/663046"], "description"=>"<p>Macrophage infiltration, under the control of MCP-1/CCL-2, is a critical feature of damaged tissues. The inflammatory effectors IL-6, IL-8, MCP-1/CCL-2, MMP2, and INF-α are specifically expressed in the tissues of patients with chronic chikungunya, who have high IFN-α and IL-12 mRNA levels in their circulating leukocytes. This classical inflammatory process may be regulated by HGF and eotaxin, which have different expression profiles during the recovery phase in patients with chikungunya, depending on whether or not these patients go on to develop chronic disease. HGF also promotes muscle regeneration. Once they have infiltrated the joint or muscle, the macrophages are activated and regulate the local Th1/Th2 balance as a function of their own activation status (classical/M1 or alternative/M2). GM-CSF and HGF, which have M1 and M2 effector activities, respectively, may modulate this balance as they are differentially expressed in acute and chronic chikungunya. CHIKV persists in infected macrophages only in patients with a chronic rheumatic syndrome. The reciprocal influences connecting viral persistence and local inflammation are not known. Solid arrows: activation. Solid stopped lines: regulation. Dotted arrows: expression.</p>", "links"=>[], "tags"=>["macrophage", "signs", "chikungunya"], "article_id"=>333536, "categories"=>["Virology", "Biotechnology", "Immunology"], "users"=>["Laurence Dupuis-Maguiraga", "Marion Noret", "Sonia Brun", "Roger Le Grand", "Gabriel Gras", "Pierre Roques"], "doi"=>"https://dx.doi.org/10.1371/journal.pntd.0001446.g003", "stats"=>{"downloads"=>1, "page_views"=>5, "likes"=>0}, "figshare_url"=>"https://figshare.com/articles/_The_macrophage_is_central_to_chronic_signs_of_chikungunya_disease_/333536", "title"=>"The macrophage is central to chronic signs of chikungunya disease.", "pos_in_sequence"=>0, "defined_type"=>1, "published_date"=>"2013-02-20 07:20:20"} {"files"=>["https://ndownloader.figshare.com/files/662940"], "description"=>"<p>(1) Months after the acute infection, monocytes, T cells, and natural killer (NK) cells are still attracted to the inflamed joint, where they become activated. (2) The infection of macrophages in joints is associated with local inflammation and the production of cytokines, chemokines, and pro-inflammatory effectors, such as MCP-1/CCL-2, IL-8, IL-6, IFN-α, and MMP2. (3) The phagocytosis of apoptotic bodies from infected cells probably contributes to viral persistence. Nevertheless, the beneficial or deleterious effect of local inflammation on viral persistence remains unclear. (4) When it occurs, arthritis is accompanied by high rates of fibroblast apoptosis and cartilage destruction. Chronic inflammation probably plays a major role in this damage and associated pain. (5) The potential relationship between local inflammation of the joint and a state of systemic activation, as demonstrated by the presence of inflammation markers in plasma and blood cells, remains unclear.</p>", "links"=>[], "tags"=>["chikv", "persistence", "inflammation", "patients"], "article_id"=>333424, "categories"=>["Virology", "Biotechnology", "Immunology"], "users"=>["Laurence Dupuis-Maguiraga", "Marion Noret", "Sonia Brun", "Roger Le Grand", "Gabriel Gras", "Pierre Roques"], "doi"=>"https://dx.doi.org/10.1371/journal.pntd.0001446.g002", "stats"=>{"downloads"=>1, "page_views"=>5, "likes"=>0}, "figshare_url"=>"https://figshare.com/articles/_Mechanisms_of_CHIKV_persistence_and_tissue_inflammation_in_patients_with_chronic_disease_/333424", "title"=>"Mechanisms of CHIKV persistence and tissue inflammation in patients with chronic disease.", "pos_in_sequence"=>0, "defined_type"=>1, "published_date"=>"2013-02-20 07:19:44"} {"files"=>["https://ndownloader.figshare.com/files/663115"], "description"=>"a<p>Atypical forms were noticed but their prevalence was not evaluated.</p>b<p>Retro-orbital pain.</p>", "links"=>[], "tags"=>["chikungunya", "symptoms", "atypical", "forms"], "article_id"=>333597, "categories"=>["Virology", "Biotechnology", "Immunology"], "users"=>["Laurence Dupuis-Maguiraga", "Marion Noret", "Sonia Brun", "Roger Le Grand", "Gabriel Gras", "Pierre Roques"], "doi"=>"https://dx.doi.org/10.1371/journal.pntd.0001446.t001", "stats"=>{"downloads"=>0, "page_views"=>3, "likes"=>0}, "figshare_url"=>"https://figshare.com/articles/_Acute_chikungunya_symptoms_in_typical_and_atypical_forms_in_adults_children_and_newborns_/333597", "title"=>"Acute chikungunya symptoms in typical and atypical forms in adults, children, and newborns.", "pos_in_sequence"=>0, "defined_type"=>3, "published_date"=>"2013-02-20 07:20:42"} {"files"=>["https://ndownloader.figshare.com/files/663150"], "description"=>"a<p>Mann and Whitney test performed by us.</p><p>Inclusion: first presentation of the patient during acute disease.</p><p>Numbers (and sex ratios) of patients with chronic disease were 5 (4) in Singapore, 32 (0.15) in La Réunion, 94 (0.82) in Dakshina Kannada, and 35 (sex ratio not available) in Emilia Romagna.</p><p>cp, viral RNA copies; CRP, C reactive protein; NA, not applicable; NS, not significant; pfu, plaque-forming units.</p>", "links"=>[], "tags"=>["parameters", "chronicity", "chikungunya"], "article_id"=>333643, "categories"=>["Virology", "Biotechnology", "Immunology"], "users"=>["Laurence Dupuis-Maguiraga", "Marion Noret", "Sonia Brun", "Roger Le Grand", "Gabriel Gras", "Pierre Roques"], "doi"=>"https://dx.doi.org/10.1371/journal.pntd.0001446.t003", "stats"=>{"downloads"=>4, "page_views"=>14, "likes"=>0}, "figshare_url"=>"https://figshare.com/articles/_Biological_parameters_associated_with_disease_chronicity_in_chikungunya_patients_/333643", "title"=>"Biological parameters associated with disease chronicity in chikungunya patients.", "pos_in_sequence"=>0, "defined_type"=>3, "published_date"=>"2013-02-20 07:20:53"} {"files"=>["https://ndownloader.figshare.com/files/662857"], "description"=>"<p>Following inoculation with CHIKV through a mosquito bite, the virus directly enters the subcutaneous capillaries, with some viruses infecting susceptible cells in the skin, such as macrophages or fibroblasts and endothelial cells. Local viral replication seems to be minor and limited in time, with the locally produced virus probably being transported to secondary lymphoid organs close to the site of inoculation. The blood carries most viruses, as free virions or in the form of infected monocytes, to the target organs, the liver, muscle, joints, and remote lymphoid organs. In these tissues, infection is associated with a marked infiltration of mononuclear cells, including macrophages, particularly when viral replication occurs. The pathological events associated with tissue infection are mostly subclinical in the liver (hepatocyte apoptosis) and lymphoid organs (adenopathy), whereas mononuclear cell infiltration and viral replication in the muscles and joints are associated with very strong pain, with some of the patients presenting arthritis. * Guillain-Barré syndrome and encephalitis are very rare events. † True arthritis remains a rare event (from 2% to 10%); see <a href=\"http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001446#pntd-0001446-t002\" target=\"_blank\">Table 2</a>.</p>", "links"=>[], "tags"=>["dissemination"], "article_id"=>333340, "categories"=>["Virology", "Biotechnology", "Immunology"], "users"=>["Laurence Dupuis-Maguiraga", "Marion Noret", "Sonia Brun", "Roger Le Grand", "Gabriel Gras", "Pierre Roques"], "doi"=>"https://dx.doi.org/10.1371/journal.pntd.0001446.g001", "stats"=>{"downloads"=>1, "page_views"=>5, "likes"=>0}, "figshare_url"=>"https://figshare.com/articles/_Virus_dissemination_and_target_organs_/333340", "title"=>"Virus dissemination and target organs.", "pos_in_sequence"=>0, "defined_type"=>1, "published_date"=>"2013-02-20 07:19:16"} {"files"=>["https://ndownloader.figshare.com/files/663195"], "description"=>"*<p><i>p</i><0.01 Khi-2 between infected time 0 and chronic at 12 months (calculated by us).</p>a<p>Low ALT/ASAT level related to persistence (<i>p</i><0.01) like platelet count.</p>b<p>Lower level of creatinine <i>p</i> = 0.036.</p>c<p>No difference chronic versus recovered.</p>d<p>American College of Rheumatology criteria for rheumatoid arthritis in <a href=\"http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001446#pntd.0001446-Chopra2\" target=\"_blank\">[28]</a>; note that tenosynovitis is prominent (as seen by Hoarau et al. <a href=\"http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001446#pntd.0001446-Hoarau1\" target=\"_blank\">[41]</a>).</p><p>IA, inflammatory arthritis; IE, inflammatory, erosive; MRI, magnetic resonance imaging; ND, not detected or prevalence not evaluated; NR, not reported; NSA, non-specific arthritis.</p>", "links"=>[], "tags"=>["chikungunya"], "article_id"=>333683, "categories"=>["Virology", "Biotechnology", "Immunology"], "users"=>["Laurence Dupuis-Maguiraga", "Marion Noret", "Sonia Brun", "Roger Le Grand", "Gabriel Gras", "Pierre Roques"], "doi"=>"https://dx.doi.org/10.1371/journal.pntd.0001446.t002", "stats"=>{"downloads"=>0, "page_views"=>8, "likes"=>0}, "figshare_url"=>"https://figshare.com/articles/_Chronic_chikungunya_symptoms_/333683", "title"=>"Chronic chikungunya symptoms.", "pos_in_sequence"=>0, "defined_type"=>3, "published_date"=>"2013-02-20 07:21:04"} {"month"=>"4", "scanned-page-browse"=>"0", "cited-by"=>"0", "abstract"=>"1", "full-text"=>"45", "year"=>"2012", "pdf"=>"41", "unique-ip"=>"46", "figure"=>"20", "scanned-summary"=>"0", "supp-data"=>"0"} {"scanned-page-browse"=>"0", "month"=>"5", "cited-by"=>"0", "abstract"=>"4", "full-text"=>"66", "unique-ip"=>"62", "pdf"=>"43", "year"=>"2012", "figure"=>"15", "scanned-summary"=>"0", "supp-data"=>"0"} {"unique-ip"=>"159", "full-text"=>"22", "pdf"=>"192", "abstract"=>"0", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"4", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2014", "month"=>"2"} {"unique-ip"=>"142", "full-text"=>"117", "pdf"=>"36", "abstract"=>"0", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"84", "supp-data"=>"0", "cited-by"=>"1", "year"=>"2014", "month"=>"11"} {"unique-ip"=>"97", "full-text"=>"104", "pdf"=>"56", "abstract"=>"0", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"49", "supp-data"=>"0", "cited-by"=>"1", "year"=>"2015", "month"=>"8"} {"unique-ip"=>"35", "full-text"=>"32", "pdf"=>"8", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"10", "supp-data"=>"0", "cited-by"=>"0", "year"=>"2019", "month"=>"5"} {"unique-ip"=>"51", "full-text"=>"56", "pdf"=>"10", "scanned-summary"=>"0", "scanned-page-browse"=>"0", "figure"=>"15", "supp-data"=>"0", "cited-by"=>"1", "year"=>"2019", "month"=>"10"} {"start_date"=>"2012-01-01T00:00:00Z", "end_date"=>"2012-12-31T00:00:00Z", "subject_areas"=>[{"subject_area"=>"/Biology and life sciences", "average_usage"=>[322, 550, 671, 773, 864, 955, 1048, 1135, 1223, 1308, 1387, 1465, 1534, 1602, 1673, 1744, 1813, 1885, 1955, 2026, 2093, 2160, 2228, 2290, 2349]}, {"subject_area"=>"/Biology and life sciences/Immunology", "average_usage"=>[312, 555, 680, 785, 880, 965, 1057, 1142, 1230, 1312, 1394, 1471, 1547, 1613, 1681, 1743, 1805, 1871, 1941, 2010, 2071, 2128, 2202, 2266, 2323]}, {"subject_area"=>"/Biology and life sciences/Microbiology", "average_usage"=>[339, 580, 709, 814, 907, 1003, 1095, 1190, 1286, 1375, 1466, 1546, 1622, 1694, 1765, 1830, 1902, 1978, 2054, 2122, 2194, 2269, 2330, 2388, 2460]}, {"subject_area"=>"/Medicine and health sciences/Anatomy and physiology", "average_usage"=>[308, 539, 659, 759, 852, 941, 1028, 1113, 1197, 1275, 1353, 1423]}, {"subject_area"=>"/Medicine and health sciences/Infectious diseases", "average_usage"=>[328, 580, 713, 821, 914, 1012, 1107, 1202, 1293, 1381, 1477, 1551, 1633, 1694, 1769, 1847, 1917, 1986, 2056, 2121, 2194, 2267, 2329, 2410, 2461]}, {"subject_area"=>"/Medicine and health sciences/Inflammatory diseases", "average_usage"=>[318, 542, 669, 783, 867, 960, 1072, 1152, 1214, 1309, 1391, 1468, 1574, 1680, 1744, 1799, 1856, 1936, 1989, 2070, 2126, 2176, 2245, 2321, 2391]}, {"subject_area"=>"/Medicine and health sciences/Pain management", "average_usage"=>[342, 608, 752, 851, 938, 1033, 1133, 1206, 1319, 1403, 1474, 1555, 1614, 1687, 1752, 1825, 1900, 1939, 1992, 2044, 2104, 2139, 2200, 2265, 2331]}, {"subject_area"=>"/Medicine and health sciences/Pathology and laboratory medicine", "average_usage"=>[321, 553, 683, 785, 880, 973, 1072, 1162, 1249, 1336, 1425, 1504, 1574, 1642, 1711, 1785, 1852, 1923, 1987, 2050, 2129, 2192, 2259, 2325, 2393]}, {"subject_area"=>"/Medicine and health sciences/Physiology", "average_usage"=>[308, 535, 653, 754, 847, 930, 1020, 1103, 1188, 1268, 1351, 1420, 1487, 1550, 1614, 1679, 1757, 1830, 1898, 1961, 2024, 2086, 2150, 2216, 2266]}]}
cc/2020-05/en_middle_0097.json.gz/line1418451
__label__wiki
0.80701
0.80701
Hakim Ziyech According to reports, Bayern Munich have pulled out of the race to sign both Nicolas Pepe and Hakim Ziyech in the European summer. The German giants have been linked with the African duo over the last month, but latest reports suggest that Bayern have shifted their focus elsewhere. Ziyech has enjoyed another superb season for Ajax Amsterdam and heading into Tuesday evening's Uefa Champions League semifinal clash, the Morocco international has scored 20 goals and assisted 20 in 44 appearances across all competitions this season. Ivory Coast winger, Pepe, has been one of the breakthrough stars of the season and has directly contributed to 33 goals in 36 appearances for Ligue 1 club Lille this season so far. The latest media reports, though, have distanced the 23-year-old with a move to Munich with the Bavarians said to be turning their focus to signing Benfica wide-man Jota. Both Ziyech and Pepe have been linked with a move to several English Premier League clubs. Partey linked with United switch AFC Rohr: Nigeria should not underestimate Burundi & Madagascar AFC Hlatshwayo: South Africa's AFCON group very interesting
cc/2020-05/en_middle_0097.json.gz/line1418457
__label__cc
0.506567
0.493433
Effect of tides on solute flushing from a strait: Imaging flow and transport in the east river with SF6 Theodore Caplow, Peter Schlosser, David T. Ho, Rica C. Enriquez In June 2003, two injections of ∼3.9 mol of sulfur hexafluoride (SF6) were made 8 days apart in the East River, a 25 km tidal strait, to observe solute mixing and dissipation. The first injection occurred at slack before flood, and the second at slack before ebb (flood = northward flow). Tidally synchronized surveys of the SF6 tracer patch, supplemented by vertical profiles, were conducted by boat for 6 and 4 days following the flood and ebb injections, respectively. Residence times for the tracer-tagged water mass in the East River were estimated to be 3.3 ± 0.7 days and 1.7 ± 0.5 days for the flood and ebb injections, respectively, after correcting SF6 inventories for losses of SF6 from the water column by air-water gas exchange. The data indicate that the majority of East River solutes are transported to New York Harbor and that tidal mixing dominates subtidal circulation with respect to solute transport. Surveys of the adjacent lower Hudson River revealed a northward-moving, intermediate layer of East River water. Our results suggest that tidal phasing of contaminant discharges in the East River could reduce environmental impacts, by increasing flushing rates and directing a greater fraction of material away from Long Island Sound. https://doi.org/10.1021/es035248d solute Solute transport water mass river water Caplow, T., Schlosser, P., Ho, D. T., & Enriquez, R. C. (2004). Effect of tides on solute flushing from a strait: Imaging flow and transport in the east river with SF6. Environmental Science and Technology, 38(17), 4562-4571. https://doi.org/10.1021/es035248d Effect of tides on solute flushing from a strait : Imaging flow and transport in the east river with SF6. / Caplow, Theodore; Schlosser, Peter; Ho, David T.; Enriquez, Rica C. In: Environmental Science and Technology, Vol. 38, No. 17, 01.09.2004, p. 4562-4571. Caplow, T, Schlosser, P, Ho, DT & Enriquez, RC 2004, 'Effect of tides on solute flushing from a strait: Imaging flow and transport in the east river with SF6', Environmental Science and Technology, vol. 38, no. 17, pp. 4562-4571. https://doi.org/10.1021/es035248d Caplow T, Schlosser P, Ho DT, Enriquez RC. Effect of tides on solute flushing from a strait: Imaging flow and transport in the east river with SF6. Environmental Science and Technology. 2004 Sep 1;38(17):4562-4571. https://doi.org/10.1021/es035248d Caplow, Theodore ; Schlosser, Peter ; Ho, David T. ; Enriquez, Rica C. / Effect of tides on solute flushing from a strait : Imaging flow and transport in the east river with SF6. In: Environmental Science and Technology. 2004 ; Vol. 38, No. 17. pp. 4562-4571. @article{a4a7b13ce16040a29a6babc94b385e6a, title = "Effect of tides on solute flushing from a strait: Imaging flow and transport in the east river with SF6", abstract = "In June 2003, two injections of ∼3.9 mol of sulfur hexafluoride (SF6) were made 8 days apart in the East River, a 25 km tidal strait, to observe solute mixing and dissipation. The first injection occurred at slack before flood, and the second at slack before ebb (flood = northward flow). Tidally synchronized surveys of the SF6 tracer patch, supplemented by vertical profiles, were conducted by boat for 6 and 4 days following the flood and ebb injections, respectively. Residence times for the tracer-tagged water mass in the East River were estimated to be 3.3 ± 0.7 days and 1.7 ± 0.5 days for the flood and ebb injections, respectively, after correcting SF6 inventories for losses of SF6 from the water column by air-water gas exchange. The data indicate that the majority of East River solutes are transported to New York Harbor and that tidal mixing dominates subtidal circulation with respect to solute transport. Surveys of the adjacent lower Hudson River revealed a northward-moving, intermediate layer of East River water. Our results suggest that tidal phasing of contaminant discharges in the East River could reduce environmental impacts, by increasing flushing rates and directing a greater fraction of material away from Long Island Sound.", author = "Theodore Caplow and Peter Schlosser and Ho, {David T.} and Enriquez, {Rica C.}", doi = "10.1021/es035248d", journal = "Environmental Science & Technology", T1 - Effect of tides on solute flushing from a strait T2 - Imaging flow and transport in the east river with SF6 AU - Caplow, Theodore AU - Schlosser, Peter AU - Ho, David T. AU - Enriquez, Rica C. N2 - In June 2003, two injections of ∼3.9 mol of sulfur hexafluoride (SF6) were made 8 days apart in the East River, a 25 km tidal strait, to observe solute mixing and dissipation. The first injection occurred at slack before flood, and the second at slack before ebb (flood = northward flow). Tidally synchronized surveys of the SF6 tracer patch, supplemented by vertical profiles, were conducted by boat for 6 and 4 days following the flood and ebb injections, respectively. Residence times for the tracer-tagged water mass in the East River were estimated to be 3.3 ± 0.7 days and 1.7 ± 0.5 days for the flood and ebb injections, respectively, after correcting SF6 inventories for losses of SF6 from the water column by air-water gas exchange. The data indicate that the majority of East River solutes are transported to New York Harbor and that tidal mixing dominates subtidal circulation with respect to solute transport. Surveys of the adjacent lower Hudson River revealed a northward-moving, intermediate layer of East River water. Our results suggest that tidal phasing of contaminant discharges in the East River could reduce environmental impacts, by increasing flushing rates and directing a greater fraction of material away from Long Island Sound. AB - In June 2003, two injections of ∼3.9 mol of sulfur hexafluoride (SF6) were made 8 days apart in the East River, a 25 km tidal strait, to observe solute mixing and dissipation. The first injection occurred at slack before flood, and the second at slack before ebb (flood = northward flow). Tidally synchronized surveys of the SF6 tracer patch, supplemented by vertical profiles, were conducted by boat for 6 and 4 days following the flood and ebb injections, respectively. Residence times for the tracer-tagged water mass in the East River were estimated to be 3.3 ± 0.7 days and 1.7 ± 0.5 days for the flood and ebb injections, respectively, after correcting SF6 inventories for losses of SF6 from the water column by air-water gas exchange. The data indicate that the majority of East River solutes are transported to New York Harbor and that tidal mixing dominates subtidal circulation with respect to solute transport. Surveys of the adjacent lower Hudson River revealed a northward-moving, intermediate layer of East River water. Our results suggest that tidal phasing of contaminant discharges in the East River could reduce environmental impacts, by increasing flushing rates and directing a greater fraction of material away from Long Island Sound. U2 - 10.1021/es035248d DO - 10.1021/es035248d JO - Environmental Science & Technology JF - Environmental Science & Technology 10.1021/es035248d
cc/2020-05/en_middle_0097.json.gz/line1418475
__label__wiki
0.912102
0.912102
Glasgow, 1 results 1 Arts, Culture and Sports related named after/dedicated to Mandela, 32 results 32 Arts and Culture named after/dedicated to Mandela, 30 results 30 Music dedicated to Mandela, 10 results 10 Sculptures dedicated to Mandela, 7 results 7 Sports dedicated to Mandela, 4 results 4 Artwork dedicated to Mandela, 3 results 3 Literature, 2 results 2 United Kingdom Arts, Culture and Sports related named after/dedicated to Mandela Flat in the British television sticom "Only Fools and Horses" was called Nelson Mandela House The characters Del Boy and family live in a flat called Nelson Mandela House. This popular British television sitcom was broadcasted by the BBC between 1981 - 1991 with sporadic specials until 2003 Poem offered to Nelson Mandela on the occasion of his visit to Glasgow Poetry collection "Tata Enkosi for opening the doors to Freedom and Democracy" by Nandi Jola took place in London to pay tribute to Nelson Mandela Statuette of Mandela in Springbok jersey, presented by the management and staff of the Park Thistle Hotel during a visit to Cardiff, Wales Certification that the sculpture "Nelson Rohlihlahla Mandela" is a limited edition of only 25 made by Lawrence C Talbot by Staffordshire School of Fine Arts Six foot bronze bust of Nelson Mandela, by Iain Walters erected alongside the Royal Festival Hall, South Bank, London Commissioned by the Greater London Council and unveiled by Oliver Tambo. Plinth reads: "Struggle is my life" Wax statue of Mandela in Madame Tussauds Waxworks in London Wooden sculpture of Nelson Mandela by Sol Garson, which stood in Manchester Town Hall since 1986 has been given to Mandela on 5 April 2005 Presented by Manchester's Lord Mayor Tom O'Callaghan to Denis Goldberg who accepted on Mandela's behalf Statue by Iain Walters unveiled on Parliament Square in London The 2. 7 m sculpture was the idea of Donald Woods and is placed alongside others of Winston Churchill and Abraham Lincoln. Mr Mandela was present at the unveiling. Bust of Nelson Mandela was unveiled in the Glasgow City Chambers to mark the 21st Anniversary of Mandela's visit to Glasgow to accept the Freedom of the City 'Mandela Speaking' for Baritone Solo and Mixed Chorus (SATB) with Orchestra or Piano, first performed in London Music composed by Alan Bush Song 'Rolihlahla' by Mayibuye, the Cultural Unit of the African National Congress of South Africa, recorded on their album 'Spear of the Nation' in 1978 The group does not exist anymore Music recording ‘Free Nelson Mandela’ by the British group The Special AKA Calendar notes: Madiba records sell well. Record calling for the release of Nelson Mandela has made a big impression on pop charts after only one week "Free Nelson Mandela" by the Special AKA - a multi-racial group - is No 4 on Capitol Radio charts & no 68 on the national charts Simple Minds recorded Song "Mandela Day", released on their album "Street Fighting Years" and written for their series of concerts throughout the US and Europe in 1988 Nelson Mandela's 70th Birthday Tribute Concert, Wembley Stadium, London As part of Nelson Mandela’s 90th birthday celebrations, 46664 organised the sixth international 46664 concert to celebrate the 90th birthday of one great man at one amazing concert in Hyde Park, London Song 'Mandela' by Gail Thompson and the Jazz Arica All Nations Big Band Old Mexican love song with original lyrics was composed and sung by a sixty nine year old Peter Hindmarch from UK to celebrate Mr Mandela's life. The song is on You Tube under the title 'Mandela Peter Martino' Karl Jenkins' CD 'The Peacemakers' is inspired by and dedicated to Mahatma Gandhi, the Dalai Lama, Nelson Mandela, Mother Theresa, Martin Luther King and others King Charles composed the song 'Lov Madiba' featuring vocalist Katie Melua and Shingai Shonowai The proceeds of the sale will benefit the Nelson Mandela Children's Fund Nelson Mandela mural at the corner of Falls and Ross Roads in Belfast, Ireland Mandela Mural by pupils of the Hillcrest and Potternewton Primary Schools Nelson Mandela Plaque to commemorate the 30th anniversary of the award of the Freedom of the City by Glasgow was unveiled by Denis Goldberg City of Glasgow named a room after Mandela in the City of Glasgow Museum and Art Gallery People’s Gallery in London named one of their rooms the 'Nelson Mandela Room' Erik Esenvalds "The Time has Come" performed by the Fairhaven Singers The text is an excerpt from Nelson Mandela's inaugurational address Crystal soccer ball presented by the Aston Villa Football Club Framed Liverpool T-shirt with players' signatures Presented to President N Mandela by Brian R Mahon and Kaizer Motaung Commonwealth Champion of Health medal from the Commonwealth Games, received by South African athletes at the Commonwealth Games in Canada Queen's Baton Relay from Queen Elizabeth II to symbolise the return of South Africa into the Commonwealth of Nations and in particular the country’s participation in the Commonwealth Games in Canada after absence of 36 years The Relay is similar to the Olympic Torch and holds a secret message from Queen Elizabeth II and serves as a unifying symbol to the people of the Commonwealth Shield presented by the Lords and Commons Cricket Club Group 11th South African Charity Golf Day was dedicated in celebration of Mr Mandela's 90th Birthday
cc/2020-05/en_middle_0097.json.gz/line1418480
__label__cc
0.63725
0.36275
Bear Mountain Ice Rink Outdoor Rink D I R E C T I O N S FROM MANHATTAN Take I-95 west across the Upper Level of the George Washington Bridge. Take the Palisades Interstate Parkway north (first exit after the GW Bridge). Stay on the Palisades Interstate Parkway 42 miles to Route 9W. Ignore Exit 19, Bear Mountain Pk, but proceed to end of the Parkway to the Bear Mountain Bridge circle. Take Route 9W south .4 miles to stop light. Bear right at the stop light. The Bear Mountain Inn and parking area are on the right. The Administration Building, Merry-Go-Round and Skating Rink are on the south end of the parking field. VIA I-287 AND POINTS WEST: Travel north to the NYS Thruway. Take the NYS Thruway north to the Harriman exit. After toll, bear immediately to the right and go up ramp to Rt. 32. Make a left onto Rt. 32 and follow signs to Rt. 6 east. Take Rt. 6 east to the traffic circle. Go around the traffic circle and exit onto ramp saying Palisades Interstate Parkway North. Travel north on the PIParkway to the end. There will be a traffic circle. Do not go around the circle but bear right onto Rt. 9W south. There will be a welcome to Bear Mountain State Park sign and also Hessian Lake will be on the right. Travel Rt. 9W for 1/4 mile to a traffic light. At the light, bear up the hill on the right. At the top of the hill will be the Bear Mountain Inn. Go around the circle of the Inn and pull into the parking lot. VIA THE PALISADES INTERSTATE PARKWAY Travel north for 42 miles to the Bear Mountain Circle. The first exit off of the circle is Rt. 9W south. There will be signs indicating you are at Bear Mountain State Park. Take 9W south to the stoplight (approx. ¼ mile) and bear right. Go to the top of the hill and turn right. You will be at the Bear Mountain Inn Circle. Proceed around the circle and into the parking lot. FROM THE NORTH VIA I-87, THE NEW YORK STATE THRUWAY Take the NYS Thruway east/south to the Harriman exit. Following the toll booth, bear to the right to get off the first exit ramp. At the top of the ramp, make a left at the light onto Rt. 32. Follow signs for Rt. 6 east Continue on Rt. 6 east 10 miles to the Palisades Interstate Parkway north and proceed to the end of the Parkway, bear right onto Rt. 9W south (do not go around the circle). There will be signs indicating Bear Mountain State Park. Hessian Lake is on the right. Take 9W south to the stop light (approx. 1/4 mile) and bear right. Go to the top of the hill and turn right. The Bear Mountain Inn and parking area are on the right. The Administration Building, Merry-Go-Round and Skating Rink are on the south end of the parking field. FROM THE EAST FROM THE NEWBURGH-BEACON BRIDGE: On I-84 west, cross the Hudson River on the Newburgh-Beacon Bridge. Take the 2nd exit ramp for Rt. 9W south. Continue on Rt. 9W south for approximately 40-45 minutes until you come to the Bear Mountain Circle. Go half way around the circle, exit and continue on Rt. 9W south. There will be a sign saying Bear Mountain State Park. Hessian Lake will be on your right. Continue for approximately 1/2 mile to the stop light. At the light, bear right and go up the hill. At the top of the hill, bear right again and go around the Bear Mountain Inn Circle and enter the parking lot. VIA BEAR MOUNTAIN BRIDGE: From Route 9, get onto Rt. 9D. Continue on Rt. 9D south to the Bear Mountain Bridge. Cross the bridge and proceed around the circle to Rt. 9W south. There will be a sign saying Bear Mountain State Park. Hessian Lake will be on the right. VIA I-287: Take the Tappan Zee Bridge west to Exit 13N, Palisades Interstate Parkway. Stay on the Palisades Interstate Parkway 23 miles north. Ignore Exit 19, Bear Mountain Pk, but proceed to end of the Parkway to the Bear Mountain Bridge circle. Take Route 9W south .4 miles to stop light. Bear right at the stop light. The Bear Mountain Inn and parking area are on the right. The Administration Building, Merry-Go-Round and Skating Rink are on the south end of the parking field. VIA ROUTE 17, THE QUICKWAY: Take Route 17 east to the last exit before I-87, the NYS Thruway. Take Route 32 south to the first stop light and follow signs to Rt. 6 east. Take Rt. 6 east to the traffic circle. Go around the traffic circle and exit onto ramp saying Palisades Interstate Parkway North. Travel north on the PIParkway to the end. There will be a traffic circle. Do not go around the circle but bear right onto Rt. 9W south. There will be a welcome to Bear Mountain State Park sign and also Hessian Lake will be on the right. Travel Rt. 9W for 1/4 mile to a traffic light. At the light, bear up the hill on the right. At the top of the hill will be the Bear Mountain Inn. Go around the circle of the Inn and pull into the parking lot. Session Hours and Fees Skate Rentals Public Session Rules
cc/2020-05/en_middle_0097.json.gz/line1418491
__label__wiki
0.831814
0.831814
Duke Forecastle, Part 1 One hundred and eighty turns ago, the HMS Superbia set sail for the western colonies, with a crew of sixty seafaring units on deck and a complement of more than 400 soldiers and seafarers below. In command was the legendary Royal Lord Admiral Hubris Unsinkable. This was the mighty flagship‘s maiden voyage, and both the three-masted ship of the line and the Chief Warlord himself were the pride of Seaworld, their illustrious side. Superbia made Uwotmate in an astonishing eleven turns, exchanging crew and supplies and joining with the frigates Extraneous and Bagatelle. Admiral Unsinkable dined with the Viceroy, talking of trouble with Anchorbar to the far west, and affirming the Crown‘s commitment to defending her colonies. The Anchormen were Seaworld‘s only maritime rival, and of late they had become increasingly aggressive. The Admiral told the Viceroy he intended to sail out in this brawny vessel and smack them in the nose a bit. Other than routine position and mapping reports, that meeting was the last anyone heard from the Admiral or his ships again. On the turn of Superbia‘s commissioning, Duke Joseph Forecastle had traveled to the capital to witness the ceremony (and even play a small part in it). He‘d also made his requisite appearance at court (which was little noted) and then at the ball (where he dragged a reluctant Lady Windlass around the floor before retreating to the smoking room), and at the War Council (where the Admiralty again explained to him why Seaworld could not afford to upgrade his garrison). Duke Forecastle then rode back to the city that bore his name, the city he had popped in, to patrol the mountains and keep the side safe on its only approach by land. Seaworld comprised only five coastal cities, plus the inland fortress of Forecastle. The side was an indomitable maritime power, known and feared as far as three thousand ocean hexes away. Her colonies numbered nine, with a total of twenty-nine colonial cities supplying her great treasury. The management of this sprawling empire demanded a vast navy of fine ships and a vast bureaucracy in the capital, and Seaworld could afford both. But it could somehow not afford to upgrade the city which protected its eastern flank. Nor could the Admiralty spare any more troops here. As Seaworld‘s only warlord without the “seafarer” special ability, Forecastle knew that he was something of a joke to them. That was all right; he was doing important work out here in the east, whether or not Her Majesty‘s Admirals appreciated it. He remained vigilant. He patrolled. He‘d be ready, come what may. Ninety turns ago, an identical ship to the Superbia–the HMS Hubris Unsinkable–was formally commissioned. She sailed westward on a mission of vengeance, with a fleet of fifteen ships bearing twenty-eight masts. In command was Royal Lord Admiral Buck Brummel, a protege of the late Admiral Unsinkable, who endeavored to speak and dress exactly like his late mentor: royal blue finery, golden epaulets, and a grand black bicorn hat with gold trim. He looked magnificent. Once more, the fleet made for Uwotmate, subsequently making port at Corblimey to rendezvous with another three warships, bearing two masts apiece. They sailed for where the city of Anchorbar was supposed to be located. This time, reports were made with more detail and care. It is known that Brummel met and sank two pirate and three Anchormen vessels as he stabbed westward. No new land was charted on the voyage. It is also known that the Vengeance Fleet then met the main force of Anchormen at sea, the enemy force numbering twenty-one ships, thirty-two masts. After two inconclusive engagements left Seaworld‘s ships mangled, Brummel turned the fleet around and made for the distant port of Buggrov, eleven turns‘ sail away in their current state of repairs. They made it only three. The fleet was wiped out to a man, without a word sent home about the cause. More than two thousand units and twenty-seven warlords perished in all. Lord Forecastle had attended the commissioning of the Unsinkable, of course. And he dutifully returned to the city of Seaworld for the ceremony to commission her successor: the HMS Hubris Unsinkable II. This time, there was little ceremony and no balls. Queen Eliteabit herself attended the War Council. Looking at the map and hearing the Admirals speak, the situation was even worse than Forecastle had understood it to be. Two colonies had been lost to Anchorbar while the new flagship was being popped. Ships were needed more than warlords now, so the steady stream of new Captains and Admirals had slowed in favor of popping vessels. Seaworld‘s strategic position had shifted from conquest to defense. For the first time in Forecastle‘s life, his side was losing. He sat quietly, telling himself he wouldn‘t even ask for more troops this time around. He would give his perfunctory report and tell them all was still quiet in the east, and ride home again. Her Majesty had greater worries, and he was grateful not to be a part of them. But when he was finally called upon to report, there were no private smiles. No-one ignored him. As he rose, Eliteabit spoke his name. Her tone was sombre. “Your Majesty?” asked Forecastle, bowing to her. “Your report is not required. And you shall not be returning to your city,” said the Queen. “My...” his heart suddenly pounded in his chest. He knew he was viewed as useless, but was she about to disband him? He couldn‘t find words. “I‘m sorry, Majesty?” “Your services in Forecastle are no longer necessary,” she said gravely. “You sail at dawn upon the Unsinkable II, as her first mate.”
cc/2020-05/en_middle_0097.json.gz/line1418496
__label__cc
0.636322
0.363678
A 60-Year-Old Grandmother Was Sleeping On The Street, So A Stranger Built Her This And this is just the beginning. K.S. Anthony Elvis Summers of South Los Angeles did something really special for his friend Irene "Smokie" McGhee. The 37-year-old man knew Ms. McGhee from around his South L.A. neighborhood, where she would occasionally come by and ask for recyclables, CBS Los Angeles reports. Irene McGhee has been homeless for over a decade after losing her husband. Summers knew he wanted to do something to help her. "She's a human being, 60 years old, a mother, grandmother, sleeping in the dirt," he was quoted by CBS as saying. "It's just not right." So with $500 from his own pocket and some donated siding, he built her a house. See the touching video capturing the project below. The best thing, however, isn't just that Irene McGhee now has a tiny house of her own: It's that Elvis Summers is now trying to build more of these houses and is working in conjunction with city officials to find space where they could have a permanent home. For more information on the Tiny House, Huge Purpose project, please visit their GoFundMe and Facebook pages. If you liked this, please share it with your friends. Tags: los angeles, video, homelessness, elvis summers, irene smokie mcghee, tiny house Related: losangeles.cbslocal.com Grow K.S. Anthony No One On 'Britain's Got Talent' Expected To See THIS From These Old Men "Britain's Got Talent" lives up to the promise of its name again. Isaac Saul This Talented Juggler Showed Off In The Israeli Desert What a beautiful talent. Jordan Zaslow When You Don't Know What To Say To Someone In Pain, These Words Will Work Just Fine Words don't always come easy.
cc/2020-05/en_middle_0097.json.gz/line1418504
__label__wiki
0.760488
0.760488
Unvarnished truth: period instrument Mussorgsky from the OAE By Mark Pullinger, 16 January 2015 The Campaign for Real Mussorgsky has been fighting the good fight for decades. Claudio Abbado was a paid-up member, recording the original version of Night on a Bare Mountain back in 1980. Valery Gergiev has performed both the 1869 and 1872 versions of Boris Godunov in the composer’s own orchestrations rather than Rimsky-Korsakov’s glossy revision. Here, Vladimir Jurowski and the Orchestra of the Age of Enlightenment went one step further… performing original versions of these scores on period instruments. It was like stepping inside the Kremlin and – not inappropriately for Mussorgsky – downing a shot of vodka. In a remarkable ‘taking coals to Newcastle’ feat, the OAE – or at least 30 members thereof – have just performed Boris Godunov in two concert performances with the forces of the Mikhailovsky Theatre in St Petersburg. Returning to the UK, they brought back their Boris – the distinguished Russian baritone Sergei Leiferkus – to perform the title role in three celebrated scenes from the opera. Leiferkus has usually been associated with the role of Rangoni, the slippery Jesuit priest added to the opera in its 1872 revision. The role of the Tsar himself is usually taken by a bass or bass-baritone, yet lingering doubts that Leiferkus’ baritone may be too lightweight for the role were swiftly dismissed. Although his voice betrays a few signs of wear and tear, his vocal delivery is still remarkable, with plenty of ‘bite’ making every word of the text count in a mesmeric performance. Thus we were witness to Boris’ feelings of foreboding at his coronation, his mental unravelling in the ‘Clock Scene’ as his past crimes come to haunt him, and finally, his death. Hearing the opening to the Coronation Scene played on period instruments made one marvel at Mussorgsky’s originality. The double basses had a wonderful grainy quality and were sawed with vigour. Bells are depicted in the score through gong, plucked basses and chirruping woodwinds, long before the ‘beamed in’ cathedral bells were relayed through the speakers. This scene suffered from the lack of a chorus to sing praises to the new Tsar. Thankfully, the lamenting off-stage chorus at Boris’ death were heard, thanks to some technical wizardry which delivered the Mikhailovsky Chorus’ recorded contribution to the hall. That Boris Godunov became known at all after Mussorgsky’s death was almost entirely due to his colleague and erstwhile roommate Nikolai Rimsky-Korsakov, who revised the score, clothing it in his own plush orchestration. Similarly, Night on a Bare Mountain is familiar to audiences in Rimsky’s edition… or in Leopold Stokowski’s souped-up version of Rimsky in the Disney classic Fantasia. The original version of this witches’ sabbath is more rugged, peeling away the layers of Rimsky’s glossy varnish to uncover something far more earthy. For example, the smaller than usual bass drum rattled ominously in the extended solo Mussorgsky gives it after the initial whiplash opening. The OAE woodwinds brought a wonderful pungency to this score, the piccolo shrieking wildly. Spurred on by Jurowski, this was a terrific performance. The performance of Tchaikovsky’s charming First Symphony, subtitled “Winter Daydreams”, couldn’t quite match the Mussorgsky in terms of surprise or revelatory colouring. Tchaikovsky was a smoother orchestrator and there were times where the lean string sound, with minimal vibrato, was a shade too thin; this was especially noticeable in Jurowski’s slow reading of the second movement “Land of desolation. Land of mists”, which needed more cantabile to keep the pulse beating. Jurowski’s conducting seemed more focused on shaping phrases, gently pulling and teasing them with his left hand, than in maintaining forward momentum. However, the benefit of the smaller string section was in throwing the work of the woodwinds firmly into the spotlight. Lisa Beznosiuk’s opening flute motto was full of icy mournfulness, but it was good (for once) to be able to hear it doubled on the bassoon. Gossamer textures aided the Scherzo before the ebullient finale gave brass and timpani free rein after the lugubrious opening. In his ongoing cycle with the London Philharmonic, Jurowski has proved himself an exciting Tchaikovsky conductor. That didn’t always translate to the OAE with as much conviction... but perhaps I was still intoxicated by the Mussorgsky. Pass the Smirnoff. “his vocal delivery is still remarkable, with plenty of ‘bite’ making every word of the text count” Reviewed at Royal Festival Hall, London on 15 January 2015 Mussorgsky, Night on Bare Mountain Mussorgsky, Boris Godunov: Coronation Scene Mussorgsky, Boris Godunov: Clock scene Mussorgsky, Boris Godunov: Funeral bell and death of Boris Tchaikovsky, Symphony no. 1 in G minor "Winter Daydreams", Op.13 Vladimir Jurowski, Conductor Sergei Leiferkus, Baritone 2015-Jan-15, Royal Festival Hall: Flying the Flag: Images of Russiahttps://bachtrack.com/listing-boris-godunov-leiferkus-oae-jurowski2015-01-152015-01-15Southbank Centre: Royal Festival HallLondonGreater LondonUnited KingdomSE1 8XXBelvedere Road51.505687-0.11683700000003228https://bachtrack.com/files/39528-southbank-centre-2016-17-season-image-240-x-240.jpg An early Christmas present from Stephen Layton & Co. Benjamin Poore, 28th December A lithe and engaging performance of Handel's festive regular from Polyphony and the Orchestra of the Age of Enlightenment. Political power games in Kosky's Agrippina at Covent Garden Mark Pullinger, 24th September An over-directed, but vivid staging demonstrating political rise and fall in Ancient Rome transported to the present day. The power of music: Iestyn Davies in Gluck’s Orfeo ed Euridice Edward Sava-Segal, 9th September Centuries can envelop a musical masterpiece in a cocoon of misconceptions and false interpretations as much they leave their mark in the form of dirt and grime on a painting’s surface. Prom 40: Royal assortment from the OAE David Truslove, 19th August Fine performances of music associated with Queen Victoria, with a royal novelty thrown in to complete a programme marked by commitment and vigour. Orchestra of the Age of EnlightenmentVladimir JurowskiSergei LeiferkusSymphony no. 1 in G minor "Winter Daydreams", Op.13Night on Bare MountainBoris Godunov: Coronation SceneBoris Godunov: Funeral bell and death of BorisModest Petrovich MussorgskyPyotr Ilyich Tchaikovsky From the principal's desk: Antony Pay, Orchestra of the Age of Enlightenment Opera is essential to today’s society: Serge Dorny on Opéra de Lyon's DNA A mirror into the soul: Stefan Herheim on Pique Dame and the creative process of opera More by Mark Pullinger An ecstatic, fevered Tatiana from Natalia Osipova as Cranko's Onegin returns Too much of a good thing? Beethoven's 1808 Akademie in Vienna A Brahms clarinet feast from Michael Collins and friends at Wigmore Hall Pick of the plums: a dip into the highlights of 2019 Mark Pullinger Mark is one of Bachtrack’s editors. He is Chair of the Music Section of The Critics' Circle and member of its Dance Section. An experienced opera critic, with a passion for Verdi, he can often be found propping up a standing place at the ROH. He also reviews concerts and dance, with a particular love for Russian and French repertoire. Mark contributes to Gramophone and Opera magazines and blogs at Beckmesser's Quill. To add a comment, please sign in or register2015Bachtrack Ltdhttps://bachtrack.com/themes/bachtrack2013/mastheadlogo.png2019-02-13UTC17:30:55+00:002015-01-16The Campaign for Real Mussorgsky has been fighting the good fight for decades. Here, Vladimir Jurowski and the Orchestra of the Age of Enlightenment went one step further… performing original versions of his scores on period instruments. Unvarnished truth: period instrument Mussorgsky from the OAEen_GBtruehttps://bachtrack.com/review-boris-godunov-leiferkus-oae-jurowskiBachtrack Ltdhttps://bachtrack.com/themes/bachtrack2013/mastheadlogo.pngMark Pullingerhttps://bachtrack.com/22/270/list-published/15668https://bachtrack.com/22/270/list-published/15668https://bachtrack.com/files/91997-mp-glyndebourne-400.jpgMark is one of Bachtrack’s editors. He is Chair of the Music Section of The Critics' Circle and member of its Dance Section. An experienced opera critic, with a passion for Verdi, he can often be found propping up a standing place at the ROH. He also reviews concerts and dance, with a particular love for Russian and French repertoire. Mark contributes to Gramophone and Opera magazines and blogs at Beckmesser's Quill.4
cc/2020-05/en_middle_0097.json.gz/line1418508
__label__cc
0.54093
0.45907
Interview / Sally Rodgers / A Man Called Adam From beatniks, beat poetry, and Acid Jazz – being among the first artists to record for Gilles Peterson`s nascent label. To beatific Balearic “thinkers”. Penning an anthem in Barefoot In The Head. A track that serves as Ibiza 90`s aural postcard. The sonic sand in your shoes. To Techno-Pagan consciousness expanders. Knowing “the apple”. Returning to Pacha with Terry Farley & Peter Heller. Getting taken to Detroit, via Windsor – Slough, not Ontario – by Andrew Weatherall. From House inspired by Disco`s Avant-Garde – collaborating with the likes of the Idjut Boys, and running their own imprint, Other – to creating Cafe Del Mar favourites. Bass-heavy bongo grooves. Marimba, kalimba, sampled surf and fractal waves. Ecstacy and Easy-Listening. Bossa loops, and soothing woodwinds. Rockers horns, and East Of The River Nile melodica. Rolling Body and Soul Rhumbas. Trippy 808 dubs. Percussive polyrhythms. Beach holiday snapshots, and sunset campfire strum. From chilled-out classics, to challenging sound design. If you’ve been following the thirty year trajectory of Steve Jones and Sally Rodgers, AKA, A Man Called Adam, then you’ll understand that it`s been quite journey. I have to admit that I was surprised by the duo`s recent contributions to Emotional Response`s Schleißen series. Surprised by how much their music had changed. With their earlier tunes, such as Estelle, a constant in my DJ box, I asked Sally if she’d mind taking a few moments to retrace the band`s musical steps. I’m from Teeside, on the North East coast of England. Born in Middlesbrough. Ridley Scott country. Where are you currently based? After many years in London, then Cornwall, I’m back up North. Steve’s based in Paris, so we’re a kind of Anglo-French outfit now. Were A Man Called Adam your first band? How did you an Steve meet? No, I was in a couple of bands before that. One called Sliced Tomatoes – we never did a gig – and another called the Expresso 7 which was signed to CBS but disbanded shortly after. Steve came to audition for one of the first incarnations of A Man Called Adam. He played piano accordion. What drew you to making music? I’m third generation Irish, so singing and lyricism were all around me growing up – my parents ran working men’s clubs. My elder brother and sister were also big music lovers and vinyl collectors. I won a prize at school for poetry. I’m a lyricist by nature I think. Which artists did you draw inspiration from? Hmmm. I love great voices and interpreters of lyrics. Elvis, Sinatra, Streisand, Donna Summer. My dad loved Sarah Vaughn. And I love the tone of singers like Karen Carpenter, as well less obvious voices like Kenny Lattimore, Micheal McDonald, Lillian Lopez of Odyssey, or Kate Pierson of the B52s. Agnetha and Anni-Frid (ABBA) even. I also love auteurs and experimenters. I suppose Kraftwerk’s music combines the intelligence and populist sensibilities I really admire. I always go back to their albums, and those made by Talking Heads for the same reasons. I recently inherited some of my brother’s Reggae collection and I’m currently digging down into that. There’s both wonderful experimentation in the production – the studio as expressive instrument – and beautifully articulated sentiment and performance from the vocalists. King Tubby plus Delroy Wilson, or Trinity. Inspiration is everywhere if you are listening. I listen to the maddest experimental music, and the happiest Pop or gay bangers, or Jazz or Funk and Disco and Soul. We’re delving into some seriously sophisticated Pop to inspire the next material coming through after this album… That recent Netflix doc about Quincy Jones was a revelation. The work rate, the commitment was totally inspiring. I just saw Jess Glynne on TV, I think she has a beautiful tone and the songs are emotional. Inspiration is everywhere. The first A Man Called Adam release was on Acid Jazz? How did that come about? Were you part of the Acid Jazz “scene”? If so which clubs and parties did it revolve around? There was one track before that, the title track of a CBS sampler called Get Wise. But our first serious outing was the APB / Before You Know It 12” for Gilles. He had a club night called Wah Wah Acid Jazz at the WAG club in Soho, and later at Dingwall’s in Camden. The scene revolved around Rare Groove, Jazz-Funk and Fusion and there were warehouse parties with the likes of Paul Guntrip and Jay Strongman DJing. We were part of that scene along with other bands like Snowboy and Galliano. Our break through track creatively was the Earthly Powers / Techno Powers 12, again for Acid Jazz. One side was a fairly decent Lonnie Liston Smith pastiche, but for the other side we took the live musicianship and applied machine processes – sampling, sequencing – to it, and the resulting track Techno Powers was more original and interesting. I must credit our co-producer / engineer on that record, Mat Clark, for introducing us to those techniques. I also associate you with bands like The Sandals, and their shindig at The Gardening Club called Tongue Kung Fu. Did / do you know The Sandals? Did you go to Tongue Kung Fu? Members of The Sandals, Derek Delves, Will ‘Wildcat’ Blanchard and John ‘Alfredo’ Harris were in much earlier line-ups of AMCA and were / are our friends. We did go to Tongue Kung Fu now and then but I think we’d discovered Acid House and were more on the rave scene by then. The rumours that I heard about Tongue Kung Fu were that it was a kind of performance art place, full of modern day beatniks, where the divide between performers and audience was completely blurred. Which I have to admit scared the shy-boy in me off. I also heard that this was one of the first places in London that MDMA was experimented with. There`s also the story that A Man Called Adam is a reference to MDMA. Is any of this true? Or is the band`s name simply lifted from the Benny Carter LP? When we all met we were very much into that Beatnik aesthetic, performance art, 60s Kitsch and movie soundtracks, etc… you’ll have to ask the guys about the MDMA experimentation at Tongue Kung Fu – it wouldn’t surprise me (laughs), and no, A Man Called Adam was conceived as a name way before any of us took that drug. It tied in with the 60s soundtrack thing we all loved . A Man Called Adam were part of the Ibiza 90 trip. Your contributions to the accompanying film, A Short Film About Chilling, are some of the best bits. How did you get involved with Flying and Ibiza 90? Was it your first visit to the island? What were your first impressions? What were the high points? The lows? Have you visited the island frequently since then? Well thanks for saying that – we were the kind of ‘thinky’ ones maybe? Haha! Well my memory is a bit sketchy, but we’d played a few of the Flying parties, and there was Phil Perry`s club at Queens, on a reservoir somewhere in Berkshire, we played there – with Techno Powers and with Barefoot In The Head. When Charlie (Chester, Flying promoter) decided to organize the Ibiza trip I guess he wanted a live act and thought of us. We were a good fit musically with Andrew (Weatherall) and Danny (Rampling) and the Flying crew etc… We were pretty young so it was just mad fun, and our gig at Pacha was one of the most memorable of my whole life. But there was romance, and music and crazy glamour. I remember seeing Bridgette Neilson – an glamorous amazon! – outside Ku – there was some MTV party going on – and it was like studio 54 or something, a circus. Or staring at the cherubs and rainbows in the ceiling of Cafe del Mar, listening to wonderful ambient music, with the reak of the drains coming up from below. We’ve been many many times since though we had a hiatus for six or seven years in the mid naughties. We pop back in now – we have lots of friends there so always want to see them. I’ve played poolside for Harvey the last couple of years which is just the best night out for me. Play records then onto Harvey’s dance floor and fun with your friends. Perfect. Its always nice to DJ a sunset at La Torre. It’s still a wonderful place. In my opinion that Ibiza 90 trip changed the UK Balearic / Acid House scene. People realised there was proper money to be made, and as people began to promote / protect / defend what was “theirs”, the scene both grew and divided. Do you have any thoughts on this? Yes, I guess so though I’d never made the association with Ibiza 90 and the commercialisation of the scene. I mean, I think party and club promoters wanted to make a good party but they’ve always been about making money too. But yes, maybe a less professional and generally benign class of promoter appeared. It was certainly like that as an artist. The shadiness seemed to ramp up. I’ve felt it all mirrored the lifecycle of the drug. Or any drug. It`s fun, then it`s not so much fun anymore. Can you tell me what Barefoot In The Head is about? When did you first hear that Rod McKuen / San Sebastian Strings sample used in the track? It took me about ten years to track that down (thank you Phil Mison). It`s a shaman song. A call to arms. It speaks about that golden moment we all experienced that changed us all forever. There’s a bit of pagan poetry in there. My friend Carl – from the band the Farm – said to me recently ‘the trouble with you is you`re prone to mythical thinking’ and I think Barefoot is a good example of that – ha! The Rod McKuen record is a throwback to all that mad Easy-Listening and soundtrack stuff we were into a few years earlier. Can you explain Chrono Psionic Interface? And Lost In The Green Light? Is the latter about DMT? Is consciousness expansion something that interests you / still interests you? Oh gosh, I was reading a lot of Science Fiction at the time. My brother was a big fan and I was into Phillip K. Dick, and time was a big theme. I guess I`m always looking for metaphors to describe the continuous process of expanding one’s consciousness – that’s what life is, or should be I think, a journey towards that, the struggle for that. Lost In The Green Light was triggered by one of those bizarre moments when you sort of see science, gamma, infrared all that. I wasn’t on DMT. But the songs are multi-layered and I like it when people find their own meanings in them. I’m a bit of a Taoist. What made you decide to start Other Records? We got dropped from Big Life after our first album, the Rave scene was going a bit dark and we were feeling a bit sorry for ourselves. My friend Jaffa, who’d I’d known since I was up in Teeside, was designing sleeves and had a space above his studio in Kentish Town. He was like, stop feeling sorry for yourselves, put your studio upstairs and go do what you’re good at – make some bloody records! We’ll start a label, you do the music, I’ll do the sleeves. He taught us how to run a label, and we’ll always be grateful to him for that, and for the kick up the arse. At this point the band`s music seemed to become more HOUSE. What influenced this change? What artists, records, DJs, clubs, or parties? Well no, some of our first recordings were Estelle and Easter Song, but I guess yes, we did some jazzy House. The Beachflea stuff was some of the earliest stuff on Other. Jaffa had connections with great vocalists in the US, he was on the Northern Should Scene, so we got Rosie Gaines and Diane Mathis on the label. I guess we were exploring our production sound and there was cool stuff going on around us on the British and US house scenes. Luke Solomon and Kenny Hawkes` Space was an influential club (Wednesdays at Bar Rumba on Shaftesbury Avenue – mid-90s), Daft Punk, Derrick Carter. It was a jackin’ super-swung sort of house.There were the cool French labels and bands associated with the “French Touch”, and those in New York and Miami. Great music was being made independently and we were part of the scene. You`ve collaborated with Faze Action, Dan and Conrad of The Idjut Boys, Rob Mello and Zaki D at Luxury Service. How did you make these connections? Are you still in touch now? Well that was the UK scene I was talking about – that grew up in the mid to late 90s – and Other was part of it, with Nuphonic and UStar and Luxury Service. We were all friends, collaborating and hanging out together. We don’t see so much of each other now as we’re all scattered around the world, but we are all still friends and always happy to see each other when we do. AMCA recently contributed to Emotional Response`s Schleißen series. Can you tell me more about your contribution, Sketches? How they were constructed, and the concept, or history, behind them? Stuart had heard a track called Walker – something we released digitally a few years back. It was a long, improvised mix of a something we’d made to fulfill a sound design commission for the National Science Museum. The brief was for one of several thirty second idents for animations, but the thing we released was twenty-two minutes long. That’s how you find those thirty seconds, by exploring, digging down into that that little hook or idea. The release passed unnoticed, we didn’t promote it, we just threw it out there. But somehow Stuart heard it, `cos that’s what he does – like Tako at Music from Memory, his antennae are primed, looking for those golden oddities – and he asked us to contribute to the Scheißen series which was lovely for us. Our good friends Tomaga, who make wonderful improvised sonic art, are on the series too and it’s so nice for us to be alongside them. We went through a long process of finding the sketches that Stuart wanted. I sent him loads of bits from our sound design and experimental archive – we have hard disks full of this stuff – but he knew what he wanted and we got some of it down to one interesting side of vinyl. I saw a funny review that described it as ‘intriguing fragments’ , and ‘technological Balearik’ – with a ‘K’. I loved that (laughs). You and Steve both now have Ph.Ds. Can you tell me more about your doctorate, and why you decided to go back into further education? Steve still has to do his viva, so we shouldn’t jinx it, but yes, we’ll soon be Dr. Sally and Dr. Steve, hopefully. My doctorate is an impact narrative about how capture and recording technologies have, over time, changed poetic form. It traces the continuum, all the way from the Romantics to Bob Dylan and Hip Hop. Are you teaching now? What project / research are you working on at the moment? Yes, I teach a couple of days a week at Leeds College of Music. The students remind me to be open to experience and grateful for all your opportunities. I mentored a couple of the electronic music postgrads this summer – great music – and will examine someone’s PhD later this year. Releasing a new album in the new year is a big project because the music making is still ongoing, as is reviving Other Records to release it. There are live shows and films and other media to think about, and Steve and I are going to do a series of podcasts about records, music and events that have changed us. I know that you still DJ, do you have any gigs coming up? Yes, I’ve been DJing a lot these last few years. Again, there was a hiatus when I went to study, but I like it more than ever now. I love to do the research, go deep to make the connections. I’m a post Ph DJ (laughs). I recently DJ’d for Gilles at his amazing Ricci weekender in Sicily. It’s been great to reconnect with him – we really laugh about old times – and I’m going to do something for him on Worldwide FM in the new year. I’ve always got a few nice gigs coming up – The Refuge, The Pen And Pencil in Manchester – and we are having an AMCA take-over at Outlaws Yacht Club in Leeds on Dec 15th, where we’ll DJ, make sound art and try out some of the new AMCA tracks live. OYC is a home from home for us. We know we’ll be free to do what we want and the crowd will humour us. Sketches by A Man Called Adam is out now, as part of Emotional Response`s Schleißen Series. The duo have a new album, Farmarama set for release on their own Other Records early 2019. For updates please check the A Man Called Adam Facebook and Instagram pages. There are a few personal A Man Called Adam favourites here, to accompany Sally’s lovely interview. Track-list A Man Called Adam – Easter Song – Other – 1995 A Man Called Adam – Estelle – React – 1994 A Man Called Adam – One Of The Two (Insomnia Dub) – Sunday Best – 1999 A Man Called Adam – Chrono Psionic Interface (Spaced Out) – Big Life – 1991 A Man Called Adam – CPI (Godiva) – Big Life – 1991 A Man Called Adam – Techno Powers – Acid Jazz – 1989 A Man Called Adam – Barefoot In The Head – Big Life – 1990 Fazed Idjuts – Dust Of Life (Joe Claussell Piano Mix) – U Star – 1999 Coco, Steel & Love Bomb – Yachts (AMCA Mix) – Other – 1999 Posted in Interview, MixTagged 2018, A Man Called Adam, Balearic, Dr Rob, Interview, Sally RodgersBy banbantonton3 Comments 3 thoughts on “Interview / Sally Rodgers / A Man Called Adam” Pingback: Chilled / January 2019 – Ban Ban Ton Ton Pingback: A Man Called Adam / Farmarama / Other Records – Ban Ban Ton Ton Pingback: Interview & Mix / A Man Called Adam – Ban Ban Ton Ton ← Every Home Should Have One / Recent Soul, Jazz, and Rare Groove Reissues David Sylvian / Dead Bees On A Cake / Virgin →
cc/2020-05/en_middle_0097.json.gz/line1418513
__label__cc
0.514092
0.485908
Best Events Near You in Poughkeepsie, New York Exhibition - Hot/Cold: Expressions in Wax Monday, Jan 20, 2020 from 9:30am to 5:30pm Arts Mid-Hudson Tuesday, Jan 21, 2020 from 9:30am to 5:30pm Wednesday, Jan 22, 2020 from 9:30am to 5:30pm Poughkeepsie Top Searches Thursday, Jan 23, 2020 from 9:30am to 5:30pm Friday, Jan 24, 2020 from 9:30am to 5:30pm Back In Black and Never Say Die Friday, Jan 24, 2020 at 7:00pm The Chance Theater Back In Black (AC/DC TRIBUTE), Never Say Die- The Ultimate Black Sabbath Experience , SixXV The Chance Levitated, Empty Vessel, Fateless, Diamonds to Dust , Parkbench Messiah , Charred Graves Saturday, Jan 25, 2020 at 7:00pm Dr Dirty John Valby Shuli Egar Laugh It Up Comedy Club Sunday, Jan 26, 2020 at 6:00pm The Four Horsemen – The Ultimate Tribute to Metallica Benefit for Phil Peluso, Sickbay/ 3 UP 3 Down, Grunge Type Thing, Natasha Barnes 2nd Nature Skate Park 1 Highland Industrial Park Rules: - No bikes - No graffiti - No glass containers - No fighting or shoving - Please dispose of your trash properly&nbs... Angelo Canna Town Park Joseph D Spencer Lane Cairo, NY Arm of the Sea Theater Malden on Hudson, NY Our mission is to create theater that inspires wonder, provokes thought, gives joy and enriches the public imagination. We believe that such theate... Featured Yelp Deals for Poughkeepsie! ArtsWestchester 31 Mamaroneck Avenue, 3rd Floor About us: Westchester Arts Council, the county’s link between the arts, business, and culture, was established in 1965 as a private, not-for-... Bear Mountain State Park Palisades Parkway or Route 9W North Bear Mountain State Park is situated in rugged mountains rising from the west bank of the Hudson River. The park features a large play field, shade... Belleayre Mountain Ski Center 181 Galli Curci Rd Highmount, NY From the beginning, Belleayre was an immediate hit. Local residents still remember how skiers pitched tents outside the lodge to be first... 1601 Route 9D Boscobel is situated on the east bank of the Hudson River opposite the United States Military Academy at West Point. The mansion and surrounding gr... Bowl O Fun Skate Park Caramoor Center for Music and the Arts 149 Girdle Ridge Road Katonah, NY Caramoor is the legacy of Walter and Lucie Rosen who built the luxurious Mediterranean-style villa and filled it with their treasures. Walter Rosen... Cary Institute of Ecosystem Studies 2801 Sharon Turnpike (Route 44) Millbrook, NY The Cary Institute is one of the largest ecological programs in the world. More important than its size, however, is the quality of its output. Boo... Center For Performing Arts At Rhinebeck About Us The CENTER for Performing Arts at Rhinebeck (known familiarly as The CENTER, and legally as Rhinebeck Performing Arts, Inc. or RPA) is a n... Clearwater's Great Hudson River Revival 1 Croton Point Ave. Mission of the FestivalClearwater’s Great Hudson River Revival is produced by the nonprofit, member-supported, environmental organization Hud... D and H Canal Historical Society and Museum 23 Mohonk Road High Falls, NY Mission Statement: Now celebrating our 40th year, the purpose of the D & H Canal Historical Society is to preserve, protect and perpetua... Drop In Skate Park 107 Pleasant Avenue Dutchess County Fairgrounds 6550 Spring Brook Avenue Vision StatementOur vision is a society actively engaged in the pursuit and promotion of our rural and agricultural heritage, from neighborhood bac... 655 Pitcher Road The Eisenhower Hall Theatre at West Point is dedicated to bringing great performances to the United States Corps of Cadets and to its friends and n... Empire State Railway Museum 70 Lower High St Phoenicia, NY History From the late 1800's through the 1940's the rugged steam locomotives of the Ulster & Delaware, Catskill Mountain Railroad, New York C... Falcon Ridge Folk Festival 44 County Road 7D Hillsdale, NY Directions The Falcon Ridge Folk Festival is located at Dodds Farm, just off Route 22 north of Hillsdale, New York. Hillsdale is in the Tri-State ... Fasny Museum Of Firefighting 117 Harry Howard Avenue About Us:The dictionary defines a museum as "a place where important things are preserved: a building or institution where objects of artistic, his...
cc/2020-05/en_middle_0097.json.gz/line1418517
__label__cc
0.625851
0.374149
Your full-service Automotive repair shop We Service all is our top priority Home joe@ignitevisibility.com 2019-12-02T17:44:56+00:00 Welcome to Berube's Complete Auto Care, your car service in Lewiston, ME! Auto Mechanic in Lewiston, ME Providing Auto Repair Services Throughout Lisbon, Sabattus, & Auburn, ME For over a half-century, Berube's Complete Auto Care has been assisting drivers throughout the Lewiston, ME region with prompt and reliable auto services. At our shop, the goal is simple. We aim to provide the finest service at the most competitive rates. This way, you’ll be able to get back behind the wheel in no time at all. Each one of our auto specialists are prepared to handle the most intensive auto repair work and ensure that your auto is operating up to snuff. Best of all, our team can address both domestic and imported vehicles, so there’s no need to worry. Trust Berube's Complete Auto Care with your vehicle, no matter the make or model. We’re your one-stop automotive headquarters! Whether it is time for your yearly inspection, or you need new tires, our auto mechanic has the right service for you. With services ranging from suspension repair, engine work, auto air conditioning, to computer diagnostics, rely on Berube's Complete Auto Care to come through in the clutch. Berube's Complete Auto Care Lewiston, ME 04240-5628 Daily: 6:00 am – 8:00 pm Affiliates & Offering 24-Hour Towing When You Need It Most In addition to our auto repair services, at Berube's Complete Auto Care, we are proud to offer 24-hour towing service throughout Lewiston, Sabattus, Lisbon, ME and the surrounding area. If your vehicle suffers a breakdown, don’t hesitate to contact us at (207) 782-1125. Give us a call day or night! Providing comprehensive auto services, let us be your choice for an auto mechanic. Get in touch by phone or send us an email. At Berube's Complete Auto Care we remain fully dedicated to you, the valued customer. About Berube's Complete Auto Care Lewiston, ME For years Berube's Complete Auto Care has been there for the people of Lewiston. We love what we do, and that basic fact fuels our business. We are dedicated to our customers, and that’s why they stick with us—the best auto repair Lewiston has to offer. Our family of technicians and service staff sees their work here at as more than a job. It’s their vocation and livelihood. Each member of our team is invested in your satisfaction. Berube's Complete Auto Care was founded on the basic idea that everyone deserves respect. It is our mission to treat each person that comes through our door with dignity and sensitivity. We believe this attention to detail has paid off by providing us with our loyal, friendly family of customers. That’s what makes Berube's Complete Auto Care the best car service in Lewiston! Are you ready to experience the best Lewiston car service available? Please give us a call or make an appointment here. Recently Serviced Vehicles OIL TAX Change oil Michael B. gave our service a 5 star review on 1/17/2020 PAUL M. gave our service a 5 star review on 1/8/2020 JARRED D. gave our service a 5 star review on 1/7/2020 ROTATE TIRES SUZANNE C. gave our service a 5 star review on 12/18/2019 2006 Volkswagen GTI MOUNT 2 TIRES BALANCE 2 TIRES DISMOUNT 2 TIRES ALEX W. gave our service a 5 star review on 10/14/2019 RICHARD S. gave our service a 5 star review on 10/14/2019 LEO B. gave our service a 5 star review on 10/14/2019 MICHELLE A. gave our service a 5 star review on 10/7/2019 JULIA M. gave our service a 5 star review on 10/2/2019 CHECK FOR CODES ON COMPUTER WENDY P. gave our service a 5 star review on 9/25/2019 WHEEL HUB – Remove and Replace – Front,Left Side – align 4 tires DIAGNOSTIC TIME PAUL M. gave our service a 5 star review on 9/23/2019 Driving into the future: The car show at CES Turns out that the SEMA Show isn't the only automotive showcase that annually overflows the Las Vegas Convention Center. This past week, the convention center's North Hall has been the epice [...] Car Care Council Urges Commuters to Maintain a Healthy Work-Drive Balance The Car Care Council has a number of tips for commuters to help ensure their trips to and from work are as enjoyable and worry-free as possible. [...] 2020 has arrived and many are carefully selecting New Year's Resolutions. Establishing challenging yet achievable goals is the essence of New Year's Resolutions, a tradition that dates back [...] Texting and Driving Laws and Fines by State It's something a majority of us do daily; in fact, most people text 5 times, 10 times, if not more on a daily basis. So, what's the harm in doing it while driving? [...] 5 Sounds that Signal your Car Needs Auto Repairs While modern cars are more reliable than ever, they still need regular maintenance and many motorists don't notice a needed repair until something changes, particularly how the car sounds. [...]
cc/2020-05/en_middle_0097.json.gz/line1418526
__label__wiki
0.929585
0.929585
The Close-Up Replay Of Johnny Sexton's Knee Injury Does Not Look Good by Juana Turner It does not look good at all. Tuala and Harrison made some massive carries through the heart of the Leinster defence. Hello and welcome to live text commentary of this third round, pool one game between Northampton Saints and Leinster from Franklin's Gardens. The Ross Byrne, Luke McGrath and Ed Byrne replacements sealed a comfortable victory for last year's Champions Cup runners-up against a Saints team that never gave up until the last minutes. Andrew Porter burrowed over for his sides 3rd try of the game before the break. Vivo V17, featuring 48MP quad cameras, launched at Rs. 23,000 As confirmed by the company, Vivo V17 will come with a 32MP camera at the front with "Super Night Mode" for selfies. The front camera of the Vivo V17 supports other features like AR stickers, Pose Master, AI Makeup, AI HDR and more. Premier League roundup: Manchester is Red, Chelsea lose! Liverpool boss Jurgen Klopp admits holding talks with Naby Keita before his recall for victory over Bournemout on Saturday. I was never in doubt about that. "It's one game. 'Benson,' 'Star Trek' actor René Auberjonois has died at 79 He was nominated in 1975, 1985 and 1990 for his roles in "The Good Doctor", "Big River" and " City of Angels ", respectively. Last week, an actor who appeared in the first season of " Star Trek ", Robert Walker Jr., died, it was reported . Leinster got off to a terrific start as Jordan Larmour offloaded to James Lowe for the opening try in the second minute but the home side went on to level the scores with Ahsee Tuala's touchdown in the seventh minute. But they were taught a lesson in European rugby by the four-time champions who fielded greater firepower in most departments and who were able to call on a watertight defence to contain Northampton's assault in the final half-hour. The ball eventually found Cian Healy after several phases who touched down. Sexton's exit failed to affect Irish momentum but a setback did arrive in the form of a yellow card for Ringrose for his tip-tackle on Biggar, who had recovered from a toe injury to take his place at fly-half. They forced their opponents to make a couple of handling errors and they weren't going to be denied as they sauntered to a 27 points win and their 3rd win in the Champions Cup this season. Baker Mayfield Criticizes Browns Trainers for How They Handled Odell Beckham Jr Counting of votes underway in Karnataka for 15 assembly seats Woman arrested after girl (5) carries toddler half a mile in -35°C Leicester's wobble continues against Burnley - Dublin's 1/20/2020 Anthony Joshua Prostrates for Buhari, Presents BeltsGuardian Life 1/20/2020 Barty roars back to make winning start in Melbourne 1/20/2020 Three reasons why Bruno Fernandes will be a success 1/20/2020 Zimbabwe ‘have to enjoy first home Test since 2017 1/20/2020 Man United to be without Rashford for weeks 1/20/2020 San Francisco 49ers win NFC Championship over Green Bay Packers 1/20/2020 Cavaliers' Tristan Thompson gets T'd up for 'butt slap' of Jae Crowder 1/20/2020 Osaka, Williams start strong at Australian Open 1/20/2020 Incredible start to her comeback: Mahesh Bhupathi on Sania Mirza 1/20/2020 Nadler on Impeachment Hearings: Schiff ‘Is Not a Relevant Witness’ Trump's White House said on Friday that they won't take part in the hearings, even though House rules allow them to do so. Nadler, asked whether he felt confident that Trump personally directed improper approaches to Ukraine, replied, "Yes". As part of sweeping reforms, Saudi ends gender-segregated entrances for restaurants Crown Prince Mohammed bin Salman in his vision 2030 hopes to reduce the Kingdom's dependence on oil and diversify the economy. Women and men are still kept separate at weddings, and most government-run schools and public universities. A new model of health care for the Orillia area Ontario Health Teams will play a critical role in connecting care providers and, in doing so, helping to end hallway health care. The Coalition is also working to protect home care and health care services from privatization. Crunch time for Russia's athletes as WADA decides on doping ban It won medals and proved itself across all sports until a whistle blower (an athlete originally part of the program) revealed the scandal. China's Lunar Probe Lands Safely on Far Side of Moon He added that China has Mars, Jupiter and asteroids in its sights: "There's no doubt that our nation will go farther and farther". China launched a communications relay satellite in May that would allow a rover to send images from the far side of the Moon. Biden calls Iowa voter a 'liar' after he brings up Ukraine Biden has slipped to fourth place in Iowa and New Hampshire, the two states that vote first in the nomination race. "So you're elected. Cavaliers' Larry Nance: Scores just three points in loss And, secondly, he will probably be liberated. "And I think, in so many ways, so will ours". I'm fine with everything that's open, but I'm interested in the three-point shot. Anthony Joshua Details Mysterious Health Issue Before First Andy Ruiz Jr. Fight But it was a clear factor and one that did not match up well with Joshua's improved pace and footwork. Tonight was just about winning. "So I'm just going to follow my instincts and box for myself". Buzzer-beating Thunder top Timberwolves in OT Choas reigned among those who remained in the arena and somehow the Thunder snatched another opportunity from the jaws of defeat. In particular, Canadian second-year guard Shai Gilgeous-Alexander took over to send Minnesota home with a loss. Tesla Model 3 on Autopilot collides with police auto in CT Six drivers admit Autopilot has contributed to a collision, while nine owners say the system helped keep them alive. The EV then nearly hit a second CSP patrol vehicle before coming to a rest several hundred feet down the road. Matthews, Hyman score 2 each as Leafs handle Blues The Blues tied it at 1-1 with 7:18 left in the second period on a Zach Hyman goal assisted by Alexander Kerfoot and Cody Ceci . They scored four times in the first period, including a three-goal volley in 6:06. "It happens", he said. ". Saudi is lone suspect in Florida base rampage The Saudis who accompanied Alshamrani are now being interviewed by law enforcement and are being cooperative, the source added. Speaking at the Reagan National Defense Forum in California, he said investigators must be allowed to do their work first. China November exports unexpectedly fall, but imports rebound Exports were down by 1.1 percent in the last month of the year, after a drop of 0.9 percent in October on slowing global demand . But China's imports from the U.S. grew more than 2 percent, indicating that it bought more agricultural products from the US. Panipat off to a slow start, Pati Patni Aur Woh earns well The film is a remake of the 1978 classic by the same name starring Sanjeev Kumar, Vidya Sinha and Ranjeeta Kaur in the lead roles. On its opening day, Kartik Aaryan, Bhumi Pednekar and Ananya Panday starrer did an exceptional job by minting in Rs. 9.10 crore. I worry anti-Semitism has affected our election campaign Labour branded it a "clear political assault", which they mentioned had "nothing to do with tackling anti-Semitism". British Labour Party and Opposition leader Jeremy Corbyn , May 12, 2017.
cc/2020-05/en_middle_0097.json.gz/line1418528
__label__wiki
0.502899
0.502899
Chelsea October 16, 2018 Reads Real Talk: How you really should be celebrating Dictionary Day Today is Dictionary Day, but hold on a second before you go posin’ your copy of Merriam-Webster next to your coffee, mini-pumpkins, and beige sweater. While some dictionaries out there try portray up-to-date, authentic language usage (i.e. Urban Dictionary), the majority of dictionaries and grammar books function as tools used to implement and naturalize prescriptivist standard language ideology. For the non-linguistics students out there, that means they prescribe how language should be used, usually with inevitable mistakes and the bias of the human author. As much as we’ve been taught to point to the dictionary as an authority on language, standard English is impossible to pin down. Take this very abridged version of the standard English debate in the US (condensed and watered-down from Lesley Milroy’s essay on standard language ideology and a paper I wrote last year): After the American Revolution, the founders were looking for a way to move forward, including how to unite a variety of regions and cultures that speak a multitude of languages. On one side of the debate, you have people like John Adams who proposed a National Language Academy to promote American achievements and those who believe that to have a community, it must be cohesive (read: homogeneous). Benjamin Franklin once complained about the influx Pennsylvanian Germans: “They will soon so outnumber us, that all the advantages we have will not, in My Opinion, be able to preserve our language, and even our government will become precarious.” On the other side, there’s a descriptivist approach, where one gives linguistic authority to the speakers themselves and sees value in multi-lingual communities. For example, Benjamin Rush (a guy that signed the Declaration of Independence) has this quote I love: “A man who is learned in the dialect of a Mohawk Indian is more fit for a legislator than a man who is ignorant even in the language of the early Greeks.” Benjamin Rush Ultimately, Adams’ proposals were given a thumbs down. (Turns out that the country newly separated from a monarchy wasn’t too thrilled about the idea of enforcing an elitist national language) (in fact, this rejection of Monarchical excess is why Webster later proposed simplified punctuations and spellings such as color instead of colour). To this day, contrary to popular belief, the U.S. has no official language. “So why bring this up if everything ended up being so chill,” you ask? The standard language struggle between descriptivists and prescriptivists has continued in the centuries since. Each attempt to pin down a variety of English as an official standard has also wielded linguistic power over minority groups. In many cases, the “English-only” movement has been used to empower racist policies. Here’s some examples: Prohibiting enslaved Africans from speaking their native tongues. The de-culturalization of indigenous peoples by, in one of many destructive chapters of our history, separating children from their communities erasing their mother tongues in boarding schools. The treatment of Japanese-Americans in WWII by closing their schools in Hawaii. Today’s pushes to enforce English-only workplaces and those who would prefer prohibiting the translation of government documents (such as ballots, documentation, even immigration paperwork) into additional languages. The discrimination against speakers of “non-standard” English language varieties which prevent them from being approved for housing, employment, or participating fully in their society. Disguised as “to have a community, it must be cohesive,” these policies have and continue to work against minority groups. Dictionary Day celebrates the birthday of Noah Webster, who made it his lifelong project to instill a “pure” American English. He was concerned “that even the smallest regional differences in spelling and pronunciation could turn into political difference, resulting in dangerous factions.” Sound familiar? Granted, the standard English debate is obviously much larger than the influential work of this one man, and dictionaries are constantly updating to be more inclusive. But it’s worth taking the second today to learn about the historical standard English debate in the U.S. and maybe take a look at other linguistic resources. To end a lighter note, here are some word-filled dictionary articles and related material we found interesting. Enjoy! And happy dictionary day! My List for Dictionary Day on Goodreads I collected an array of minority dictionaries/glossaries, language histories, and lighter word-related reads in this Goodreads list so you can easily add them to your shelf! People Say These 15 Words Aren’t Words But They Actually Are Investigators from Reader’s Digest examine the crossing-over of commonly-used “words” like prolly, conversate, and funner into “standard” dictionaries. Using Undictionaried Words In this New York Times opinion piece, Erin McKean (founder of wordnik.com) talks about “lexical ‘dark matter'”—words that haven’t yet made it into the dictionary. “Why limit your word arsenal just to the words that have already been captured and pinned down, when you can stake out a literary claim to a word that’s new and fresh?” she asks. They is a Singular Pronoun This article from Dictionary.com uncovers how they has been used as a single-person pronoun since the 1300’s. In your face, transphobic Grammar Nazis. The Dictionary of Popular TV Tropes Originally a collection of common tropes and idioms found in TV shows, TV Tropes collects, defines, and expands upon the tropes and idioms found in a variety of creative works from film to literature. The Right Rhymes A hip-hop dictionary which looks at words within and across lyrics, possible definitions, and include maps which show where the artists that use the words originate from in the US. I just found this and will probably be spending the rest of the month exploring. Posted in Reads and tagged Alternative Dictionaries, Article Round Up, benjamin franklin, benjamin rush, Book Lists, dictionary, dictionary day, English Language, Hip-hop, History of English, Holidays, Languages, linguistics, Real Talk, standard language ideology, webster. Bookmark the permalink. Vatican: Do’s and Don’ts Rome on a Budget: How to Save Money So You Can Buy More Pasta
cc/2020-05/en_middle_0097.json.gz/line1418531
__label__wiki
0.597072
0.597072
Messi, Neymar, And Surez: The Barcelona Trio (World Soccer Legends) Author: Illugi Jkulsson Attention: For textbook, access codes and supplements are not guaranteed with used items. Lionel Messi, an attacking genius and longtime player on FC Barcelona, is widely recognized as one of the greatest soccer players in history. When the emerging Brazilian talent Neymar joined him in 2013, they became known as the Invincible Duo. Then, when the colorful Luis Surez joined their roster the following year, the most unbeatable attacking unit in history had been created. Together, this trio has scored a record-breaking number of goals, and has proven time and again that their strategic unit outshines each player on his own. The book includes details of each players career, vivid photos of the trios electric force on the field, impressive stats, and fun facts about the most successful offensive formation playing today. © 2020, bookhillside.com
cc/2020-05/en_middle_0097.json.gz/line1418532
__label__cc
0.54548
0.45452
John Francis, Publisher of the Athenæum: A Literary Chronicle of ..., Band 2 'The Life and Letters of Lord Macaulay,' Life, by by his nephew, George Otto Trevelyan, M.P., is Trerelyan!° reviewed in the Athenaum of the 8th of April, 1876. CHARLES DICKENS. 'The Posthumous Papers of the Pickwick Charles Club,' edited by Boz * Nos. I. to IX., form the, TMtT'- , J' ''The Pickwick subject of the first review on the 3rd of Decem- Papers.' ber, 1836. On the 31st, 'Sketches by Boz: Second Series,' is also noticed. The article closes with the remark: "Next week we shall have to welcome Boz as a brother editor—in which, and in all other characters and undertakings, we wish him success." On the 7th of January, 1837, this promise is fulfilled, and the new comic periodical work edited by Boz and illustrated by George Cruikshank, Bent ley's Miscellany, receives kindly fiTM'^ notice. Dickens's contribution, ' The Public Life of Mr. Tulrumble,' "is Boz every line of it." The following appears on the 3rd of March, 1838: "Among the literary announcements of the week the one which will spread the widest, Announccand the work which will, in all probability, fare * Nfcholas the best, is the proclamationf 'of the only true Nickleby.' * The nickname of a pet child, his youngest brother Augustus. t Proclamation on the eve of'Nickleby.' See Forster's 'Life of Dickens,' vol. ii. pp. 76 and 77. and lawful Boz,' heralding the appearing of his new child 'Nicholas Nickleby.' This worthy's adventures, it is said, will be rich in the oddities to be gathered in the north of England." The first number was published on the 31st, and is reviewed on the same date: "The characters are drawn twice over,—to the eye as well as to the mind. Before they escape from the passport or hue-and-cry style in which 'Boz' takes them down, they are compelled to sit for their likenesses to ' Phiz.'" 'Oliver The completion of' Oliver Twist' is noticed Twist' on the 17th of November. On the 3rd of August, 1839, it is stated that the ' Pickwick Papers' have been translated into Russian. 'Master On the 7th of November, 1840, the first volume Hlclock?^S of'Master Humphrey's Clock' is reviewed. The writer of the article was Thomas Hood. 'Farnaby In its review of' Barnaby Rudge,' on the 22nd Rudge.' of January, 1842, the Athenceum says: "This story is now complete. The illuminated Clock of Master Humphrey has run down for ever, and with its last chime the works of its maker have come to a temporary stoppage. Availing himself of the pause for a little well-earned rest and recreation, the author, it appears, has sailed on a long-projected trip to America." On the 16th of July a letter appears from Dickens on the subject of literary piracy, in Literary piracy. which he advises authors "to treat on all occasions with some respectable American publishing house, and with such an establishment only." On the 5th of November it is stated that Dickens has been elected a member of the general committee of the Metropolitan Improvement Society; that "Boz" will open the year with a new novel; and that the author's former works have been translated into Turkish. On the 18th of November, 1843, in reviewing 'The Keepsake,' the Athenceum quotes a poem by Dickens entitled 'A Word in Season,' which, 'A Word in "we should think, will startle a round hundred at least of aristocratic readers in their country houses":— They have a superstition in the East, That ALLAH, written on a piece of paper, Is better unction than can come of priest, Of rolling incense, and of lighted taper: Holding that any scrap which bears that name, In any characters, its front imprest on, Shall help the finder through the purging flame, And give his toasted feet a place to rest on. Accordingly they make a mighty fuss With every wretched tract and fierce oration, And hoard the leaves; for they are not like us, A highly civilized and thinking nation; And always stooping in the miry ways To look for matter of this earthy leaven, They seldom, in their dust-exploring days, Have any leisure to look up to Heaven. So I have known a country on the earth, Where darkness sat upon the living waters, And brutal ignorance, and toil, and dearth, Were the hard portion of its sons and daughters; And yet, where they who should have oped the door Of charity and light, for all men's rinding, Squabbled for words upon the altar-floor, And rent The Book, in struggles for the binding. The gentlest man among these pious Turks God's living image ruthlessly defaces: Their best high churchman, with no faith in works, Bowstrings the Virtues in the market-places. The Christian Pariah, whom both sects curse, (They curse all other men, and curse each other,) Walks thro' the world, not very much the worse— Does all the good he can, and loves his brother. "A tale to make the reader laugh and cry— open his hands, and open his heart to charity .' A Christmas even towards the uncharitable," 'A Christmas Carol. carol( in Prose; being a Ghost Story of Christmas,' is reviewed on the 23rd of December. "Evenings of In noticing 'Evenings of a Working Man: ^ Man!'"8 being the Occupation of his Scanty Leisure,' by John Overs, "with a preface relative to the author by Charles Dickens," on the 3rd of August, 1844, the Athenceum states: "Mr. Dickens disdains all those sickly appeals to sympathy and' gentle construction' on the score of circumstance; he claims no prodigious merit for the prose and verse of Mr. Overs, though it is superior to much of its class—but he simply states, that 'the Working Man,' who is a carpenter, became known to him at the moment when he was relinquishing the editorship of a periodical—that since that period neither hammer nor plane nor chisel has been laid aside, for the more enticing service of the pen— that literary compositions have neither seduced John Overs into dreams nor lamentations which have damaged his peace of mind: and that the present miscellany sees the light. in the hope of a small sum of money being thereby raised to meet the difficulties which ill-health has brought on the author." 'The Chimes: a Goblin Story of some Bells 'The Chimes. that Rang an Old Year out and a New Year in, is the first book reviewed on the 21st of December: "The Old World cannot be so hard, and cold, and homeless as some desolate ones may be disposed to fancy, when such a gift, warm from the human heart, is put forth for the Year of Grace 1845." On the 27th of September, 1845, the Athenceum refers to the amateur performance, at Miss Kelly's Theatre on the previous Saturday, of 'Every Man Ben Jonson's ' Every Man in his Humour.' The Humour.'
cc/2020-05/en_middle_0097.json.gz/line1418533
__label__cc
0.749731
0.250269
Home / Heritage / Dodge Brand History / Happy HEMI Day! Happy HEMI Day! Posted By nflbrandy143197 | 04.26.2013 It’s April 26, and you know what that means, Dodge fans: It’s National HEMI day. 4/26 = 426. Let’s celebrate! The legendary 426 HEMI V8 was born back in late 1963 when Chrysler performance engineers, led by group manager Tom Hoover, decided to up the ante in NASCAR and on the drag strips, where the Dodge brand was already a top performer. Starting with the sturdy block and reciprocating assembly from the winning 426-cubic-inch Max Wedge engine, Hoover and crew dusted off the hemispherical combustion chamber layout from the company’s previous 1951-1958 V8s, adapting it to the current engine. The design had been discontinued a few years earlier as a bit too advanced for passenger cars – overkill, essentially. But now, Hoover determined, the timing was right for a HEMI revival for racing and performance use. There were challenges in adapting the classic HEMI configuration to the 426 V8: For one thing, the massive cylinder heads had to be tipped inward a few degrees just to allow the engine fit in the chassis. But to the engineers’ surprise, on the test stand the HEMI didn’t mind a bit. The new engine made its first public appearance in February 1964 at NASCAR’s Daytona 500, where HEMI-powered Dodge and Plymouth race cars swept the top five qualifying spots and then dominated the race, taking the win and four of the top five finishing positions. The domination carried over to drag racing: In an all-Dodge final at the U.S. Nationals in Indy, Roger Lindamood, driving the famed “Color Me Gone, ” narrowly defeated the Ramchargers to win Stock Eliminator. The 426 HEMI was discontinued in 1971 when the original muscle car era drew to a close. However, today’s drivers can get the same winning technology in the 5.7-liter HEMI V8, available in the 2013 Dodge Durango, Charger, and Challenger. And for the absolute ultimate in HEMI performance, there’s the 6.4-liter HEMI V8 in the Charger SRT8 and Challenger SRT8. To start your own HEMI legend, see your local Dodge dealer or go to Dodge.com. Tagged 426, challenger, charger, daytona 500, durango, HEMI, Max Wedge, NASCAR, SRT, v8 |
cc/2020-05/en_middle_0097.json.gz/line1418549
__label__cc
0.632561
0.367439
Re-Mystified on Tour :: Halifax 2014 It was a good event! On Sunday I took 800 points worth of Italian Wars French for two enthralling games of Field of Glory Renaissance (FOGR) in the third round of the 2014 Northern League. The army was dated 1523. This turned out to be important because this season Northern League armies before 1570 have been given a boost by an alteration of the army classification system: they are allowed to drop a class. This is to encourage players to field earlier armies and go some way towards compensating for their poorer weapons and tactics when facing later armies. My army contained just over 400 points of superior troops and would have been class 1 but now it dropped to class 2 with the incentive that they could gain 2 bonus points by beating higher class opponent. All I had to do was win a game! I have to say this army has never done well in competition managing two loosing draws last time out. So you can imagine my surprise when I emerged from the day with a tight losing draw (9-11) and a big win against a class 1 army (26-1 including 2 bonus points) putting me in second place! Not only was it the first time the French army had won a competition game but the total score gave me my best ever Northern League placing under any rules. Looking back I realised that the win in the second game was only my second ever win in the Northern League since I started playing FOGR in Feb 2013. Lots still to learn. Game #1 - In Period, Club Match Up Opponent: Colin Betts Club: MAWS Army: Early Danish (1576) Terrain: Agricultural (My choice) Result: 11-9 loss This game took the full three and a half hours. My pike blocks were difficult for Colin to handle and his artillery didn't do the damage he'd hoped. His heavily armoured Cuirassiers were everywhere but they were a little shy of my Gendarmes. I had refused my left flank and tried to hold a couple of pieces of broken ground but made a mess of it. I also placed my poor, but armoured, pike in a 4 wide, 3 deep block when they should have been the other way round to qualify as a kiel. As a result when they were attacked in the flank they disrupted and when they fled they cost me the artillery they were meant to protect and a batlegroup of light foot. This was 5 (or six I can't recall) of the 10 attrition points Colin inflicted. The game timed out just as my Swiss pike were due to push some Cuirassiers off the table and turn towards the baggage and some unprotected artillery. But that would have required at least another half and hour I didn't have! Overall, a fair result. Game #2 - Winged Hussars! Opponent: Neil Duffell Club: Rotheram Army: Later Polish Lithuanian (1649) Result: 26-1 win This was one of those games where everything went right for one player and everything went wrong for the other. It started with me winning the initiative despite having a 3-0 disadvantage and finished with me only failing two death rolls in the whole game. Most extraordinary. Again I was able to refuse my left flank and anchor it on two pieces of rough terrain leaving a wide open space for Neil's mounted. This allowed me to push forward with the Swiss kiel on the right into Neil's massed infantry closely followed by the Landsknecht kiel. Loosing only two bases to artillery and musketry on their way across the table, the Swiss took the artillery and a supporting battlegroup before turning to take two further pike and shot blocks with the help of the timely arrival of the Landsknechts. This meant I was half way toward breaking the Poles within three or four moves. Some Mob (poor) and the baggage soon followed. Neil raced his cavalry and winged Hussars across my open left flank but the gaping hole in the centre right meant he had a very open flank. This eventually lead to the loss of the remaining battlegroups and the end of the game. The French had beaten a class one army for the loss of three elements and one battlegroup of light horse who got too cocky and paid the price. A 24-1 win plus two bonus points for breaking an army one class higher: 26-1. Neil was very relaxed throughout as he tried to make the best of a very difficult start. I know from experience how frustrating this can be but Neil was a great sport throughout. The photo above was taken a while after the game and he'd had time to make a trip to the bar! Labels: Field of Glory , Hobby , On Tour , Renaissance Vexillia 31 July 2014 at 17:54:00 BST Just seen the full results at MAWS. I didn't realise I pipped Keith to second place by only 1 point. Phew!
cc/2020-05/en_middle_0097.json.gz/line1418555
__label__wiki
0.907491
0.907491
Home / Film / House, M.D.‘s Lisa Edelstein Visiting The Good Wife Lisa Edelstein joins The Good Wife for a multi-episode arc. House, M.D.‘s Lisa Edelstein Visiting The Good Wife Barbara Barnett June 23, 2011 38 Comments 65 Views It did not take very long for Lisa Edelstein to score a juicy new role after deciding not to sign on to another season of the FOX medical series House, M.D. Michael Aussielo reports in TV|Line that Lisa Edelstein will appear next season on The Good Wife. According to Ausiello, she will play a sexy, smart lawyer and “born poker player” during a multi-episode story arc early in the season. Starring Julianna Margulies, The Good Wife follows the life of attorney Alicia Florrick, a wife and mother forced to re-enter the working world after a sex and political corruption scandal lands her husband in jail. Edelstein’s role is rumored to have had a past with Will Gardner (Josh Charles), Alicia’s old law school classmate and a partner in her firm. Although she will be missed on the Fox series starring Hugh Laurie, this is great news for Edelstein’s many fans. The Good Wife airs on CBS Tuesdays at 10 PM ET, but is moving to Sunday evenings in the fall. So what do you think about it? Good move for Edelstein? Will it turn into something more permanent for her? Tags CBS fox House House M.D. julianna margulies Lisa Edelstein About Barbara Barnett Barbara Barnett is Publisher/Executive Editor of Blogcritics, (blogcritics.org). Her Bram Stoker Award-nominated novel, called "Anne Rice meets Michael Crichton," The Apothecary's Curse The Apothecary's Curse is now out from Pyr, an imprint of Prometheus Books. Her book on the TV series House, M.D., Chasing Zebras is a quintessential guide to the themes, characters and episodes of the hit show. Barnett is an accomplished speaker, an annual favorite at MENSA's HalloWEEM convention, where she has spoken to standing room crowds on subjects as diverse as "The Byronic Hero in Pop Culture," "The Many Faces of Sherlock Holmes," "The Hidden History of Science Fiction," and "Our Passion for Disaster (Movies)." @@B_Barnett TV Review: ‘Lost in Space’ (Season Two) – Battle of the Bots LuciFans Team up to Tell FOX: ‘Lucifer Needs a Season Four!’ Lucifer fans rally to protect the FOX series for a fourth season! A chat with the fans and showrunner Joe Henderson about the future of Lucifer.
cc/2020-05/en_middle_0097.json.gz/line1418558
__label__cc
0.701848
0.298152
Oracle Construction and Engineering Blog Energy and Resources Oracle Trailblazers Product Evolution Insights and best practices for construction management technology and project delivery Innovation Innovation ... view less How USG's Innovation Philosophy Helps Sustain Its Inventive Culture Corie Cheeseman In this month's "Trailblazers" interview, we speak with Dr. Srinivas Veeramasuneni, senior vice president and chief technology officer at USG Corporation. Veeramasuneni discusses his career and how USG is addressing the mega trends driving innovation in the construction industry. He also shares how USG fosters a culture of innovation by focusing on people, processes, and the environment, as well as exploring which emerging technologies are poised to deliver the most value in the building industry. Dr. Burcin Kaplanoglu, executive director, innovation officer at Oracle Construction and Engineering, leads the conversation. BK: Tell us about your current role and how your career has evolved since you started in the industry. SV: My current role is senior vice president and chief technology officer for USG. I support the current business units while also assembling the plans and vision for the future of our company. I joined USG 20 years ago after getting my PhD in metallurgical engineering at the University of Utah. I started as a scientist in the lab and spent a few years developing products and understanding the technologies before I moved into research and technology management. I’ve been in various roles throughout my time at USG, managing research, innovation, and other areas. I’ve been an officer of the company for the past five years. BK: What is the state of innovation in our industry? SV: The building and construction industry is very conservative compared to industries like consumer goods or technology. Our customers—whether they’re contractors, builders or architects—are looking for proven solutions that will improve their bottom line without adding risk. A building’s lifespan—whether it's residential or commercial—typically is about 40 to 50 years. That's why adopting change is slower and more complicated in the construction industry. It takes time to adopt and use our end products because they’re supposed to last a long time. Mega trends in construction However, the winds of change are starting to blow stronger in the construction industry. The mega trends driving the industry include urbanization, digital technologies, sustainability, and a shortage of skilled labor. Innovations are being explored and adopted more quickly in all three phases of a building’s lifecycle: design, build, and occupy. USG is focused on addressing these trends and meeting the needs of contractors, builders, and architects by providing sustainable and high-performance materials, enabling faster construction, and adopting digital tools to enhance productivity and customer experience. Sustainable materials: USG was the first manufacturer to accept the Architecture 2030 Challenge for Products. We innovated and introduced a wallboard product called USG Sheetrock® Brand EcoSmart Panels that dramatically reduced the global warming impact of wallboard by 25%. EcoSmart Panels are also 25% lighter than any other product on the market and provide productivity improvement to contractors. We believe this is the most sustainable and lightest wallboard in the world. Speed of construction: USG has provided products and systems that address our customers’ desire to speed up construction for over 100 years, beginning with our invention of Sheetrock® wallboard. For example, in the 1960s, there was a limit to a building’s height. USG created a lighter shaft wall system to make it easier to build tall buildings - not only in this country, but throughout the world. A few years back, we also introduced an air and water barrier system called Securock® ExoAir® 430, in which the barrier is pre-applied during manufacturing. The product eliminates a time-consuming step on the jobsite and accelerates installation times by up to 40%. We also introduced USG Structural Panels, which can be used for floors, roofing applications, and pouring. In the past, you poured concrete and waited for several days for it to cure. Now, once you have a steel framing structure built, you simply lay down panels and immediately cover it with carpet, wood flooring, or whatever product is required. High-Performance Materials: We continue to invest in our pre-existing and industry-leading product lines while also adding new products that better address the needs of our customers. In our newly formed Performance Materials division, we still offer our industry-leading brands such as USG Durock® cement board, USG Fiberock® tile backerboard, and Levelrock® poured floors, but we also added new products like our waterproofing systems. Digital technologies: Lastly, USG is committed to investing in advanced manufacturing technologies to help encourage innovation in our plants and on the job site, including drones, machine learning, AR/VR (augmented reality/virtual reality), robots, and 3D printing. BK: What are the biggest challenges you see in terms of technology adoption? SV: From an operations perspective, employers must provide workforce training and development to empower employees as new technology is introduced. For example, Industry 4.0. not only increased connectivity, but more sophisticated analytical capabilities have disrupted the manufacturing and construction sectors as well. There’s more opportunity than ever to make operations safer and more efficient. From a customer perspective, the construction industry wants proven solutions to address their pain points and emerging needs. How USG is addressing proven solutions head-on Traditionally, proven solutions have been in the market for years and work seamlessly. Obviously, a proven solution conflicts with the rapid adoption of technologies. USG is addressing proven solutions head-on by conducting sophisticated modeling and simulation of material and system performance, identifying beachhead market segments, and conducting market pilots with early adopters who are willing to try new products. BK: It’s clear that innovation is part of your culture. How can organizations foster a culture of innovation? SV: Innovation is part our company’s core values and strategy. We have fostered a strong culture of innovation by focusing on people, processes, and the environment. People: We’re focused on recruiting talent and subject matter experts. For example, for several decades, we used a lot of starch in our products. But in the last eight years, we hired a subject matter expert with a PhD in grain technology to research starch. This hire helped us to design our own starch molecule, adding tremendous value to the business. While we have very talented employees at USG, we created a philosophy called “open innovation” to address the scores of talented people outside of our organization. We’re working with universities, national labs, vendors—as well as other companies—to co-develop and co-market products pertaining to our open innovation methodology. Talent is all about the diversity, including educational backgrounds. Different perspectives help us innovate. We’re fortunate to have a diverse workforce that thinks very differently. Processes: You must have the right processes in place to eliminate any roadblocks or constraints. We implement specific processes depending upon the type of initiatives at hand—whether they’re incremental, business-unit related, or big ideas that address industry challenges—while also instilling accountability among our employees. Environment: USG increased team collaboration by making innovation everyone’s responsibility, regardless of whether you’re in operations, sales, or marketing, etc. People can always come up with new ideas and add value to the company. We have created an open, transparent organization that encourages experimentation. Experimenting, failing, and making mistakes is the only way to learn. Innovation should start at the top—beginning with the CEO—and be integral to a company’s strategy. We’re fortunate to have a CEO who embraces innovative practices. BK: What emerging technologies represent the best opportunities? What technology do you see offering the best value? SV: Our company has relied on natural materials for our sustainable growth for more than 115 years. A lot of material technologies are being developed, including green and sustainable materials. We’re also working on advanced manufacturing technologies, including things like augmented reality/virtual reality, robots, drones, machine learning, and 3D printing. Over the last few years, we’ve started using drones to map and monitor our mines. In the past, consultants spent weeks— sometimes months—to map everything in our mines in various operations. We can map mines quickly for mineral deposits using drones, adding tremendous value and convenience to our operations. Automated guided vehicles (AGVs) USG has also implemented automated guided vehicles (AGVs) to replace our forklifts that transport products in our plants, improving our operational efficiency and safety. In addition, we’re collaborating with outside partners to explore how we can incorporate robots in construction practices, whether it's installing or finishing wallboard. Similarly, we’re using machine learning and artificial intelligence to help improve our operations as well as piloting several virtual reality apps to help our customers better understand our products. Our customers can try different products to determine which will best address their specific business case, whether it’s for a hospital, school, or office. BK: What are the short and long-term benefits of artificial intelligence (AI) and machine learning to your line of business? SV: USG is exploring machine learning and artificial intelligence (AI) to improve our operations and customer experience to drive efficiencies and unparalleled customer loyalty. In the past, we’d test different materials and formulations and often say: “Okay, we need to go back and adjust things because we didn’t meet the quality requirements.” Now, we can use predictive analytics in our manufacturing plants to improve quality, efficiency, safety, and reduce cost of our products. Machine learning and almost 50 years of data We're building machine learning models to leverage our 40 to 50 years of test data on performance of walls, floors, and ceilings to provide advanced digital tools for architects who design and specify our products. We also use web and social media analytics to continuously improve our website and provide the right information to the customers quickly. As a leader in the materials sector of the building industry, incorporating these innovative technologies will lead to better things in the future. Read our eBook: "Innovation in Construction, Perspectives from AEC Innovation Leaders" Brick & Mortar Ventures Borealis Ventures Explore innovation in action at the Oracle Construction and Engineering Innovation Lab, a simulated worksite with integrated technologies. Powering Great Ideas: French Innovation and Technology in the Energy Industry France has the largest share of nuclear electricity in the world. The country derives about 75 percent of its electricity from nuclear... Skender CTO on How Disruptive Technologies Are Influencing Construction In our most recent "Trailblazers" interview, we speak with Stacy Scopano, chief technology officer of Skender. Scopano discusses how his... Middle East Industry Leaders Win 2019 Oracle Construction and Engineering Excellence Awards Qatar has a promising future ahead. The country is expected to be among the fastest growing global construction markets from 2019-2024.* The...
cc/2020-05/en_middle_0097.json.gz/line1418561
__label__wiki
0.86973
0.86973
Noel Pearson delivers the 2016 Keith Murdoch Oration Noel Pearson delivered the 2016 Keith Murdoch Oration at the Library last night, on the topic ‘Still hunting the radical centre: revisiting Daniel Patrick Moynihan 50 years later’. Watch here. ‘My interest is in the radical centre: this is the place where those in search of a better society might best hunt.’ Noel Pearson Noel Pearson is the Founder of the Cape York Partnership and Co-Chair of Good to Great Schools Australia. He is an activist and a History and Law graduate of the University of Sydney. Noel comes from the Guugu Yimidhirr community of Hopevale on South Eastern Cape York Peninsula. His goal is to enable Cape York’s Indigenous people to choose a life they value by reinstating the rights of Aboriginal people to take responsibility for their lives. Noel Pearson delivering the 2016 Keith Murdoch Oration at State Library Victoria Established in 2001, the Keith Murdoch Oration raises funds to support the work of State Library Victoria, and to recognise the Library as a centre for excellence in the world of ideas and information. Proceeds from the 2016 Oration will support the State Library Victoria Vision 2020 redevelopment project. Tags: Keith Murdoch Oration — News — Noel Pearson — Sir Keith Murdoch
cc/2020-05/en_middle_0097.json.gz/line1418563
__label__wiki
0.713462
0.713462
My Barrister Direct Adam Clegg — a successful family law barrister — needed a professional website that also performed. Responsive Website and SEO Adam had previously built his own website, but it was simply not performing. We discovered that as far as the search engines were concerned, the website had no authority at all. While Adam is a sought after expert in his field, no-one was coming across his site. Our solution had two parts: Redesign and redevelop the website so that it was responsive, and technically sound Start an SEO campaign to improve ranking in search engines Legal websites by their nature tend to have a lot of text. With the redesign we were careful to structure the text. We broke it down into manageable chunks so it was easy to scan. We also made some shrewd choices, such as not using web fonts to ensure the website was as fast as possible. At launch we tested the site speed and it was more than 20% faster than his nearest competitor. Blue House Design know what they’re doing. I was concerned that the project would take too long, but after the useful initial meeting I was happy about the timescales. Adam Clegg, Barrister
cc/2020-05/en_middle_0097.json.gz/line1418567
__label__cc
0.567341
0.432659
T.R. (Tom) Harris – Science Fiction Writer Author of The Human Chronicles Saga Conversations with George (tips for self-publishing success) Free Excerpt: The Unreachable Stars What I’m working on: An Update The Novels of T.R. Harris HomeNew Beginnings January 1, 2014 February 21, 2014 T.R. (Tom) Harris Notices to Readers/Fans, The Novels of T.R. Harris, Thoughts and Muses, What I'm working on, Writers & WritingAmazon Kindle, Amazon.com, authors, Book cover, Business, indie publishing, inspiration, making money from writing, Online book, Publishing, self-publishing, Writing, writing advice It’s the first of January, 2014! It’s hard to believe, but for a person like me who grew up in the late 60’s and 70’s, THIS is the future. And as a writer of science fiction, I’m a little disappointed that there aren’t permanent settlements on the moon and that we haven’t already landed people on the Mars. In other areas of science and technology, we’re right on schedule, with regards to computers and medicine. In other areas, we’re way behind the vision of the future we all had back then. I really can’t blame society that much, since we’ve already invented the airplane, the automobile and other major leaps in technology, and cellphones are pretty well on the way to Dick Tracy-type devices. Advances today are more subtle and they seem to creep up on us when we least expect them. Even then, opportunity can reveal itself in the most unexpected manner. Here are a few examples: In the mid-80’s I owned a print shop and one of my regular customers told me about this opportunity he had to invest in a thing called a ‘facsimile machine.’ I often wonder where he is today and whether or not he went through with it. Also, in the mid-70’s I was in Washington DC and saw a table-top pong game. I was blown away. I was in the Navy at the time, but a buddy and I applied for an SBA-loan to buy some units and put them in the bars in the Hampton Roads area of southern Virginia. Unfortunately we didn’t qualify because we didn’t have enough minority employees at the time. (We didn’t have any, just two pasty white guys trying to get in on the ground-floor of a new technology.) Where would I be today if the loan had gone through? That, too, was a missed opportunity. There was another moment I remember vividly back in the year 2000. I was thinking about ebooks, and realized that the only thing holding back that advancement from proceeding was the lack of a good reading device. With the internet and PDF’s, producing electronic books was easy, even back then, yet there wasn’t an economical way to read these books, and also in a format where the authors wouldn’t have their work reproduced and passed around without compensation. Needless to say, I wasn’t the one who came up with the Kindle or the Nook, yet I was proved right when these devices began to gain popularity — and changed the publishing industry forever. Now ebooks are the wave of the future, and there’s no turning back, even if the purists want to. There will always be paper books, but in the future they will become the novelty, and not their electronic versions. It seems popular today for bloggers/authors to come out with their predictions for 2014, so I’ll give it a go myself. 1) Ebooks are here to stay and will dominate sales once again, gaining an ever-growing market share. 2) Traditional publishers will seek consolidation to survive and will change their business models to be more followers of trends rather that creators of trends. What I mean by this is that major publishers will pursue more of the successful indie authors, those who already have a proven audience, and will publish very few first-timers who do not already have a track record in the ebook market. So if you’re an aspiring author, forgo the traditional route and get your book up on Amazon as soon as possible. You’ll not only start making money right away, but you’ll begin to build the audience that the trade publishers will insist upon. 3) Publishing rights will become more fragmented, with successful authors successfully negotiating to retain the ebook rights for most of their books. And even if they do allow the trades to have a piece of the ebook royalties, the splits will be overwhelmingly in favor of the author and not the publisher. 4) More big-name authors will go the indie route, at least for their ebooks (see #3 above). This will put more pressure on the Big Six publishers to adapt or die in this new paradigm. Since paper books will not die completely, there will be survivors in the world of traditional publishing. How they’ll make it economically is still the sixty-four thousand dollar question. 5) Indie’s will become more professional in every way. The days of producing crap and making money off of it are gone. Readers are becoming more savvy and more demanding. However, there is a new sub-industry emerging to help us with regards to editing, formatting, cover design and even submissions to all the ebook outlets available. Soon, there will be no difference between a trade-published book and an indie-published book — except for who keeps the lion’s share of the royalties. And when indie authors have only pay-for-service expenses, rather than an on-going split of the royalties taken by the trades, then it will become easier to make a living as a writer. 6) More books will continue to be bought by readers. With the relatively low price of ebooks, readers appear to be buying more books than ever before, and this trend will continue. When two to three ebooks can be purchased for the price of one paperback, or four to five for the price of a hardcover, it comes as no surprise that readers are loading up their ereaders with more books than ever. Whether or not they’ll ever get around to reading them all is another question. 7) 2014 will be year of the author. Everything is trending in this direction. We’re making more money, selling more books and gaining more control over our destinies than ever before. But remember, you still need to produce a quality product. Ebooks are not the novelty item anymore. They are the accepted format for readers these days, and so your books must stand against all the big-names from the trades, as well as the every-growing ranks of very professional indies. The time for ground-floor entry into this business has passed. Opportunity and access has expanded because of technology and acceptance, yet just as every kid can’t grow up to be a pro basketball player, not everyone who aspires to write a novel will find success. Just do the best you can and accept the fact that there are no shortcuts. Learn your craft and accept the reality that successful authors are not lucky, they are skilled, just as in any profession. Acquire the skill, release your imagination, and then give it a go. There has never been a better time to be an author than right now … in 2014. T.R. (Tom) Harris ← Don’t forget: December 15th for the next Adam Cain novel, The Apex Predator 2013 Sales Figures → Follow T.R. (Tom) Harris – Science Fiction Writer on WordPress.com Blog Stats (as of 10/17/2013) The Horsehead Nebula RECENT POSTS (See below for posts by category) Phantoms makes its debut! Destroyer of Worlds is Now Available (Adam Cain #26) New T.R. Harris Facebook Fan Page Just Set Up The 4th book in the REV Warriors Series is now available on Amazon.com The Human Chronicles #25 (The Immortal War) is now available…. For the fans of Adam Cain … he’s back and ready for action! The Second Book in the REV Warriors Series is Now Available: REV: Renegades Another Adam Cain Adventure is available Introducing: REV…a new space opera adventure from T.R. Harris Adam Cain #22 is now available on Amazon.com. Force of Gravity And the hits just keep on coming! The Human Chronicles #21 — Invasion Force — is now available on Amazon.com Book Update from T.R. Harris Posts by Category Select Category A Galaxy to Conquer (9) Notices to Readers/Fans (12) The Novels of T.R. Harris (9) Thoughts and Muses (8) Uncategorized (4) What I’m working on (11) Writers & Writing (51) My Books (on Amazon.com) Cain's Crusaders The Legend of Earth The War of Pawns The Fringe Worlds The Tactics of Revenge A Galaxy To Conquer The Apex Predator A Clash of Aliens The Unreachable Stars Prelude to War The Masters of War Captains Malicious The Enclaves of Sylox The Day of the Drone davidlender on Another Adam Cain Adventure is available Sherry Dixon on Adam Cain #12 is now available on Amazon.com live t20 world cup on Adam Cain #12 is done…and heading to the editor. Archives Select Month May 2019 March 2019 February 2019 January 2019 October 2018 August 2018 May 2018 March 2018 January 2018 October 2017 July 2017 April 2017 February 2017 November 2016 September 2016 July 2016 June 2016 April 2016 March 2016 February 2016 December 2015 August 2015 July 2015 April 2015 December 2014 November 2014 October 2014 September 2014 June 2014 April 2014 January 2014 December 2013 November 2013 October 2013 Author Blog Links Alison Blake Andy Downs Andy Downs – Facebook Angeline Perkins Anna J. McIntyre B.V. Larson Barbara Mack Pinkston Beck Bee — Facebook Ben M. Cassidy — Facebook Billy Kring – Facebook Bobbi Ann Johnson Holmes Brandon Hale Brian Dockins Carol Ann Newsome Carol Caddo – Facebook Chris Ward – Facebook Dale Roberts – Facebook David A. Cuban — Facebook Donna Blanchard McNichol Dora McAlpin – Facebook Eddie Boggs — Facebook Elizabeth Mackey — Facebook George Wier George Wier, Author Heather Meyer J.A. Konrath (non-Retreat member) J.L. Jarvis Jacques Antoine James Rozoff Jason Deas Jay Allan Jeanette Raleigh Jess Mountfield John Daulton John Salter Karen Davison — Facebook L.S. Burton Lee Hanson Lindsay V. Sabbarton — Facebook Liz Miller — Facebook Meghan Ciana Doidge Michael Edwards — Facebook Michael G. Thomas Mike Meyer – Facebook Molly Snow Mona Ingram Nick Russell Nick Russell (Bad Nick)
cc/2020-05/en_middle_0097.json.gz/line1418570
__label__cc
0.535075
0.464925
An evening with Raghu Ram Great Hyderabad Adventure Club - GHAC Founder Diyanat Ali compered a session at Lamakaan - An Open Cultural Space with Raghu Ram of MTV Roadies fame at Hyderabad as part of 8th Anniversary celebrations of Lamakaan. Raghu shared his journey from his childhood, youth, a long stint with MTV Roadies, His life experiences with different creative works and His campaigning to support honest politics. Raghu showed up in his deep authenticity, he was vulnerable and humble. He shared his childhood story and his frustration for being bullied in school and why bullying of any kind frustrates him so much that it has become a reason for his fight for supporting the weak, innocent and honest. He is a intuitive and creative person who follows his heart in whatever he does. His yearning to find a personal meaning made him explore many different creative projects where he experimented with failure and discovered a strength. He has the tenacity to take up life as it comes and most of the successes he had was when he went with the flow of life and accepted what came his way courageously. His strength to take up challenges and face many hurdles has taught him about persevering through action and not focus too much on results. From bringing creativity in TV, to acting in movies, making music, campaigning in every nook in corner to support a party he considers honest. He had his fair share of failures and successes. He was known for being rude and mean on MTV Roadies, However off the screen he is a kind gentleman. His action oriented approach of following his heart and celebrating failure was a learning and inspiration for all in the audience.
cc/2020-05/en_middle_0097.json.gz/line1418578
__label__wiki
0.794528
0.794528
Dalis Car – “InGladAloneness” EP release date of 5th April announced Update: a review of “InGladAloneness” can be found here. This release both excites and concerns me. I love Bauhaus. Along with the Sisters they define the goth sound, and image, for the early 80s. I love Japan, again seminal although this time for the emergence of the New Wave movement. Japan split in 1982 and Bauhaus in 1983 (with both bands at the peak of their influence and popularity) so when, in 1984, Peter Murphy (singer for Bauhaus) and Mick Karn (bass player for Japan) announced they would be forming Dalis Car everyone waited with bated breath. The result was, err, interesting. Their only LP “the Waking Hour“, comprised a brief seven tracks of art-house, fretless bass-driven art-pop. There are some good bits, but there is also some filler where there was really room for none. It has no edge – disappointing given the potential of the ingredients. The general feeling was that this was a curio, a taster for something better. But nothing else came and we all assumed Dalis Car had come to a natural conclusion. There was also a shocking series of press photos with a distinctly “casual” theme – too many pastel clothes and a profusion of tank tops – and a long, long way from Bela Lugosi! Ouch… and here’s one of them… After Mick Karn had been diagnosed with cancer, Peter Murphy suggested getting back together to do a second Dalis Car record. After much delay a release date of 5th April 2012 has been announced, and the EP, entitled “InGladAloneness” is available for pre-order from Burning Shed. And this is a bigger Dalis Car… Paul Lawford – the original Dalis Car drummer – is still present, albeit playing the congas, and Steve Jansen (the Japan drummer and David Sylvian’s brother) is now behind the kit (the first 250 copies of the EP are signed by Steve Jansen, but these have now sold out). The complete line-up is: Peter Murphy – lyrics and vocals, keyboards Mick Karn – bass, bass clarinet, additional guitars Steve Jansen – Drums Jakko M Jakszyk – Nylon Acoustic, Electric Guitars, and Gu Zheng Theo Travis – Saxophones and Flute Sengul – Additional Vocals on “Subhanallah” Gill Morley – Violin Ellen Blair – Violin and Viola Pete Lockett – Percussion Paul Lawford – Congas Steve D’Agostino – Additional Keyboards The track listing is all too brief: King Cloud If You Go Away “Artemis” originally appeared on the first Dalis Car EP, but this is an all new version with a new vocal (the original was instrumental). “If You Go Away” is a cover of “Ne Me Quitte Pas” by Jacques Brel. Mick Karn sadly passed away in January 2010 and this was his final musical venture. And that is what concerns me. It might be average, and that would be no way to honour the fantastic talent. The original LP, in terms of production, was full of clichés (the synth on “His Box” was all over the 80s, and is the main Sisterhood keyboard sound), and now sounds dated. Interesting, but dated. But I don’t think this will fall into the same trap. The 1991 “Rain Tree Crow” material (essentially Japan – with the same personnel, but David Sylvian refused to release any more material under the name of Japan) is a similar sound to the David Sylvian solo material (also with Steve Jansen playing drums) – with a very open and natural production. From the blurb: Conceived during the final months of Karn’s life, the resulting 5 track EP recalls the exotic Eastern-tinged Art Pop sensibility of Dali’s Car’s fondly remembered 1984 album, The Waking Hour, while also possessing an elegiac quality which fittingly evokes the sad circumstances under which the material was written and recorded. Featuring significant contributions from friends and regular musical collaborators Steve Jansen, Jakko M Jakszyk and Theo Travis, InGladAloneness begins with the life-affirming King Cloud and Sound Cloud. Driven by Karn’s dense and compelling bass and bassoon patterns and Murphy’s singular voice, the songs contain lyrics that emotionally echo Murphy’s response to Karn’s condition and suggest musical directions the project might have pursued had it continued as a creative concern. Along with the inventively multi-layered re-imagining of Artemis (from The Waking Hour), these pieces operate as the rhythmically propelled spiritual storm before the glacial calm of the two closing numbers. The Arvo Part meets Turkish chant lament of Subhanallah and – prefaced by a mournful Karn instrumental – the deeply personal reading of Jaques Brel’s classic If You Go Away (a favourite song of Karn’s), provide a moving conclusion to a poignant final statement. Both Karn and Dali’s Car distinctively combined the sophisticated and the primitive to produce a challenging music with an instinctive and heartfelt emotional core. InGladAloneness is a glorious testament to a unique vision tragically cut short by illness. Posted on February 19, 2012 April 17, 2012 Author godsandalcovesCategories Gods & Alcoves original content, the alcovesTags Dalis Car 2 Comments PreviousJamie Oliver finds Joy Division master tapes, treasure and guns in his basement NextJoy Division – “Aerial” un-released track leaked on YouTube 2 thoughts on “Dalis Car – “InGladAloneness” EP release date of 5th April announced” Ronak says: I am very sad to know that Mick has passed on. He has been my uitamlte bass player since seeing Japan during their last tour back in the 80 s. He opened up my world to an instrument that I had not noticed before but which is the one I choose to listen to now. Mick had an incredible and amazing ability to produce unique sounds, voices and feelings to this most underated instrument he could make it sing and swirl with a soul of it’s own. May God bless you Mick and thank you for your amazing music & wonderful stage presence. Fizz x I cant read music either and Mick Karn along with John Taylor and Steve Severin (to name a few) was what made me dicede to play bass. I had a fretless for a while but coudl never make it sound as good as him (or this for that matter)I think there are some very minor variants between this version and what on the song itself but with a full band playing no one but Mick would probably be able to tell.Good job. Its made me want to get a fretless again!
cc/2020-05/en_middle_0097.json.gz/line1418579
__label__wiki
0.615437
0.615437
Are you a Developer? HackerRank Codescreen Online technical assessments HackerRank Codepair Live or remote technical interviews HackerRank Projects Role specific real world projects HackerRank Insights AI-powered insights for tech hiring University Recruiting Tech talent hiring knowledge & best practices straight to your inbox! InsightsPosted on Aug 08, 2019 Published by Vivek Ravisankar Which Universities Have the Strongest Developers in the World? We analyzed 1,457,000 student interviews to identify the trends and influences driving university recruitment across the world. Which university’s students are the strongest in key developer skills and why? How we evaluated student skills To better understand how university students perform in key skill areas, we analyzed over 1M student attempts on HackerRank assessments. These assessments, administered by employers as a part of their tech hiring processes for both full time positions and internships, were taken by students at 409 unique universities, spanning a total of 176 countries. Using data from those HackerRank assessments, we identified the 4 key technical skills employers need most in interns and new grads: problem solving, language proficiency, data structures knowledge, and computer science (CS) fundamentals. Using data from the 1M+ student attempts on HackerRank assessments, we assessed student performance across each of the 4 dimensions (more on that in our methodology). While traditional rankings like Times Higher Education evaluate based on university-centric data points like research and teaching, in this analysis, we evaluated universities based on student performance. Why? Because the strength of a university’s program isn’t a surefire indicator of its graduates’ skills. By ranking universities based on student skills, we aim to highlight universities that are producing students with the technical skills employers need. Most skilled universities by region Coastal US universities excel in the Americas UC Berkeley made appearances across all skills—but US programs like Stanford, MIT, and Princeton didn’t appear in the leaderboard (though they were included in our analysis). UC Berkeley ranked across 4 out of the 4 key technical skills. Despite its strengths, UC Berkeley did not earn a spot amongst Computer Science (CS) program rankings in Times Higher Education in 2019. So what makes UC Berkeley’s developers strong? It likely comes down to a combination of its CS curriculum and prominent developer culture. Through their academics, they emphasize “large interdisciplinary real-world system projects” as a core component of its program. Outside of class, they’re able to participate in their robust developer community through a wide variety of clubs. And university recruiters have taken notice. Data shows that 246 unique employers have targeted UC Berkeley for technical talent via HackerRank, making them the most popular school for university tech talent sourcing in the world. And they’re hiring them, too—UC Berkeley reports that 79% of its CS graduates are employed upon graduation. Indian Institutes of Technology lead the Asia-Pacific landscape The Indian Institutes of Technology (IITs) are a system of 23 independent, but interconnected public universities spread across India. From Kanpur, to Madras, and beyond, they specialize in creating curriculums that focus on engineering and technology. And when it comes to skills, they dominate the majority of the Asia-Pacific landscape. Two universities appeared from outside of the IIT system: Banaras Hindu University and Vellore Institute of Technology (VIT). VIT fared particularly well, securing a first-place ranking across 2 of the 4 key skills. Unlike the IIT system, VIT is a private university based in Vellore. Their educational program focuses on “futuristic technical education” disseminated through 27 unique undergraduate programs. It’s a drastic shift from their reception via Times Higher Education, which places their CS program in the #501-600 ranking globally. VIT has a strong foothold in the Asia-Pacific region, likely due to its robust offerings in Computer Science. While other top schools in the region, like IIT Guwahati, offer a CS major, VIT has doubled down on their CS offerings, with 6 distinct majors that cover a variety of specialties within CS. Specialized majors like “Computer Science and Engineering & Business Systems” and “Computer Science and Engineering with Specialization in IoT” may give students an upper hand in learning practical (vs. academic) applications of coding concepts. Imperial College London establishes stronghold in EMEA When it comes to EMEA, Imperial College London (Imperial) was the only university to secure a ranking across all skills. Imperial is highly regarded on top CS program lists (such as Times Higher Education, which ranks it as the #11 CS program in the world). With a heavy educational focus on science and engineering across the university, Imperial’s CS program focuses on helping students learn through “an emphasis on practical work,” including a variety of group and individual projects that emphasize “transferable problem solving skills, rather than the teaching of specific technologies.” Unlike its peers in the EMEA rankings, Imperial is unique in that it has a high volume of international students—56%, to be exact. Ranking amongst #501-600 in the Times Higher Education top CS program list, Bilkent University (Turkey) is lesser known amongst university recruiters. In fact, Bilkent University was targeted by only 18 unique companies via HackerRank. When compared to more popular university targets—like Imperial, for example, who was visited by 39 unique employers over the same time period—it’s clear they may be underutilized in the university recruiting landscape, especially given their strengths in Data Structures Knowledge and CS Fundamentals. Key takeaways for university recruiters University reputation isn’t a reliable proxy for student skills In our analysis, student performance didn’t always align with university reputation. Take Bilkent University, for example, which was ranked in the bottom 100 universities in the Times Higher Education CS rankings. But their students were the 1st in the EMEA region for CS fundamentals, and 3rd for data structures knowledge. That’s because traditional university ranking lists focus on the university programs themselves—not the skills of the students that attend them. In that, their methodologies focus on factors like teaching, citations, and research. In other words, traditional rankings focus on factors that would help them appeal to potential students. But those factors aren’t as important for university recruiters. They don’t want to choose target schools based on the strength of a university’s research program; they want to choose them based on the skills and performance of its students. The best way to do that is to focus on proven student skills. Hands-on learning breeds strong developers Strong performers in our rankings—like UC Berkeley, VIT, and Imperial—build their curriculums around teaching practical skills. From UC Berkeley’s emphasis on real-world projects, to VIT’s variety of specialty CS programs, to Imperial’s emphasis on skills over technologies, the highest performing universities aimed to give students hands-on development experience. And that aligns with what we know about student developers. Even those pursuing a degree lean on hands-on, independent learning to learn to code. The opportunity to focus on hands-on projects—instead of research and theory alone—makes for stronger technical skills. Between January 2017 and June 2019, HackerRank reviewed 1,457,000 assessment attempts made by university students, including 409 universities from 176 different countries. We included universities with only statistically significant volumes of attempts, including (but not limited to) universities like Stanford University, Harvard University, Yale University, Princeton University, and more. From this data, we established a performance-based University ranking for different skills and languages. But how can you rank based on scores across different tests, especially since one test might be more challenging than the other? We computed a normalized “weighted score” which takes into account the question difficulty, the weightage that a question has in the test and by discounting questions that do not have a significant number of attempts. For each skill and language within a university, we then identified the “top students” based on the university size, and score distribution. The final university rankings are a function of the “median weighted score” of these students and the actual count of students that qualify as top students. Interested in learning more about the skills that make a strong new grad developer? See more here: Would you like to receive similar articles straight to your inbox? previous article New CodePair Features: CodeScreen-CodePair Integration, REPL Support, & More Next article Connecting Global Tech Ecosystems: Andela Shines a Light on Africa’s Developer Talent HackerRank for Developers HackerRank for School HackerRank Copyright © 2020 HackerRank
cc/2020-05/en_middle_0097.json.gz/line1418581
__label__cc
0.613774
0.386226
Jewcer Home Speak to a Crowdfunding Expert The Jewcer Advantage The Story of MI POLIN: Being a Jewish Entrepreneur in the Contemporary Poland MI POLIN is the first Polish Judaica company since World War II. It was founded by Helena Czernek and Aleksander Prugar in 2014 to design and produce contemporary Judaica from Poland with the mission of making Judaism tangible. Katia Kobylinski talked with Helena and Aleksander about what it means to be a (Jewish) entrepreneur in the contemporary Poland. How does it feel like to be a Jewish entrepreneur in the Poland of today? Aleksander Prugar: First of all – MI POLIN is a way of preserving and reinforcing our ”Polish-Jewish” identity, which gives us strength and inspiration. The question should be – how to be an entrepreneur at all? I don’t think that being an entreprenur means that you have to be stress-resistant and work much more than 8 hours per day. Entrepreneurship is a matter of attitude. It can be described as being ready for change, creating values and a market. This is what we do. At MI POLIN we create Jewish stories that emphasize Jewish symbolism. Behind this activity is pure freedom. We create objects based on the principle that the ideas behind them must be tangible. Nowadays, customers want to be told a story not just own a”nice” product. Therefore, we do not sell mezuzot, chanukiot and so on. Our products are the memory and the history with the aim to enrich Jewish life and strengthen Jewish identity. Helena Czernek: The pre-WWII Poland was home to many companies and factories producing Judaica. The famous Norblin’s factories were producing gorgeous items. With the end of the war and the death of three million Jews, these companies disappeared as well. What is important to us is the fact that we come from here and that we offer judaica from Poland. This is how we show to our customers that Poland is once again a place of Jewish creativity. Moreover, it is important to us to send a message to the Jews living abroad. We are demonstrating that Jewish life in Poland is working and developing. Many people who have not visited Poland are not aware of this rebirth. That is why we called our brand MI POLIN, Hebrew for “From Poland”. Is there anything that makes Jewish entrepreneurship unique? Aleksander Prugar:Yes, interpretation. Interpretation is at the very essence of Judaism. For centuries interpretation was done through writing. We interpret Jewish tradition and symbolism through our contemporary objects. We observe hiddur micvah, the biblical commandment ordering that ritual objects should be beautiful. Helena Czernek: To me, it is a constant and ongoing pursuit of the dialogue between tradition and modernity, and the reference to history. We bring together cultural content and symbolism through which we create new meanings. Your company MI POLIN is the first Judaica company in Poland since WWII. What does this fact mean to you personally and to the business itself? Helena Czernek: It’s both a challenge and creation of something new. At MI POLIN, references to tradition and history are important but everything we do is given a local context. The very fact that we are working here [in Poland] is actually important to many of our customers. They are often descendants of Polish Jews and as such feel a sentiment for their former “home”. They would like to transfer part of this world to themselves, to other countries or to other continents. But at the end of the day there is one meaning – Poland. Therefore, we feel like we give a continuity to the world that vanished, but which we are bringing alive, not allowing it to sink into oblivion completely. Aleksander Prugar: When we first sent our offer to US retailers, they were surprised and shocked. They had no idea that someone was designing, producing and offering Judaica from Poland. This market is nowadays dominated by Israeli products. We had to answer many questions about ourselves but in the end, everyone was very excited. Your project ‘Mezuzah from This Home’—bronze casts of imprints of mezuzah cases from around Poland—links the past and the present in a very deep and meaningful way. How did this idea come to you? Helena Czernek: I was walking once in Cracow and noticed mezuzah traces on old town houses. It is much more difficult to notice them in Warsaw. 80% of Warsaw was completely destroyed by the Nazis during the war. Mezuzah traces are the witnesses and the evidence of the existence of that ancient world. These traces are disappearing quickly due to home renovations. I ask myself: how can these traces be preserved? Photographs are a form of documentation, but not of preservation. Alexander and I created the idea of preserving these traces in a tangible way with the aim of reviving them. Aleksander Prugar: For four years we have been traveling throughout Poland, preserving the mezuzah traces we found in bronze casts. We have made 78 casts so far. By inserting a klaf (a mezuzah scroll with the Shema Israel prayer on it) that has not existed here for years, the bronze-cast mezuzot get a new life. The touch of such a mezuzah symbolically takes us to back to that ancient Jewish world. Part of this project is a historical research about the places where we found the mezuzah traces. In the cooperation with the Department of Genealogy of the Jewish Historical Institute, we reconstruct the fate of the former owners of these mezuzot. Our mezuzot are cast in bronze. They are indestructible and eternal. Why a mezuzah? Helena Czernek: MI POLIN designs not only mezuzot, we also offer a candlestick that combines chanukiah (a Chanukah candlestick), a menora and a Shabbat candlestick, a Havdalah set for besamim, and jewelry. We are also working on more ritual objects. Yet, the theme of the mezuzah truly inspires us somehow. When it comes to the project “Mezuza from This House,” our special interest mostly comes from the fact that the mezuzah traces have not yet been developed in any way. Since they are not worthwhile to the conservationists of historical monuments, they are disappearing fast. However to us, they carry a great sentimental value, and are to some extent proof of the Jewish life flourishing here. Every time we find a mezuzah trace in a town that was once home to a flourishing Jewish community, I ask myself – “How can this be everything that remains?” Mezuzot were placed on almost all Jewish homes, on the doorsteps of all doors in the apartment. Sometimes we fail to find something. Time blurs the traces. Our project is in a sense a race with time. What are your favorite Jewish sources that you derive motivation and support from on the days when you feel like you need it? Helena Czernek: There are some parts of the Torah that affect both MI POLIN and myself. Shema Israel is certainly one of them, the part that is inscribed on the scroll inserted in the mezuzah. We are paying attention to the memory and passing it onto the next generations. This gives me the strength to work further and supports the sense of a kind of a mission that I see in MI POLIN. Aleksander Prugar: History. What’s the business plan for 5778? Aleksander Prugar: This year we are heading for Belarus in search of more mezuzah traces. It will be a long journey. We want to tour all important Jewish places such as Pinsk, Homiel, Mogilev, Słonim, Dawidgródek and others. Helena Czernek: This year we are also changing our approach to design by expanding the scale of our operations. We are going to focus on a few selected Jewish issues and create an exhaustive collection of several products. Favorite Judaica piece and why? Helena Czernek: It is impossible to hide that it is the mezuzah, for sure. Perhaps it is the peculiarity of the Shema Israel prayer as well as the touch of the mezuzah itself but it is also about the personal. The mezuzah is inseparably connected with home, private life and the individuals. In the past, mezuzot were not placed on the doors of synagogues. The mezuzah immediately points out that the house is Jewish. Attached to the doorframe, it leaves a trace even after the home changes its owners. It is part of the house. Chamsa is another symbol that is very important to me although it is difficult to claim it as Judaica. Yet, it is an important element of the contemporary Jewish symbolism. It is a symbol that keeps on inspiring me and that I am trying to develop it in different ways. About Helena & Aleksander Aleksander Prugar (b. 1984, Gliwice) studied Journalism and Mass Comunication at Warsaw University, Social Sciences at Katowice School of Economics and film course in National Film School in Łódź. For 5 years he worked as a photojournalist with the newspaper Gazeta Wyborcza. In 2009, critics, art historians and photo-editors associated with the Month of Photography in Krakow included him in the top hundred of the most significant Polish artists of the decade working in the field of pho tography. Helena Czernek (b. 1985, Warsaw) studied Product Design at Academy of Fine Arts in Warsaw, at Bezalel Academy of Arts and Design in Jerusalem and Hebrew Studies at the University of Warsaw. Combining her interests in design and Jewish heritage, her work is concerned with representing the relationship between the past and the present. Her project (a collaboration with Klara Jankiewicz ) a crosswalk in a shape of pianokey was awarded 1st place in a competition for designs promoting the 2010 “Year of Chopin” in Warsaw. Katia Kobylinski Katia Kobylinski is an avid brand strategist & social entrepreneur. To merge her passions for causes, stories and arts, she founded ‘creative: for good’ – a virtual ad agency that connects millennial artists and nonprofits for advertising for the good – at JCC Chicago’s start-up incubator Seed613. Katia loves city life, hummus & company. Stories From Our Successful Campaigns: MyMDband for Holocaust Survivors 5 Free Marketing Tools for Every Entrepreneur Between My Nation and Yours: Judaism, Multiculturalism and The Future of Business 5 Eli Talks Every Jewish Entrepreneur Should Watch Stories from our successful campaigns: “Hummus Wars” 613 Seeds of Social Entrepreneurship in Chicago: Bringing Advertising to Nonprofits & Other Ideas November 27, 2017 /by Katia Kobylinski Tags: holocaust, jewish entrepreneurs, jewish heritage, jewish history, mezuzah, poland, polish jews, preservation, world war II https://i0.wp.com/blog.jewcer.org/wp-content/uploads/2017/11/klaf-slider-1.jpg?fit=1008%2C477&ssl=1 477 1008 Katia Kobylinski https://blog.jewcer.org/wp-content/uploads/2017/05/jewcer_insight_logo_h50e-300x40.png Katia Kobylinski2017-11-27 08:00:262017-11-27 08:55:47The Story of MI POLIN: Being a Jewish Entrepreneur in the Contemporary Poland Get new articles, tips and resources to boost your impact straight to your inbox: Taking on Entrepreneurship: Leaving a Steady Job and Building “Community Connect” The Art of Risk-Taking: Creative Strategies to Facing the Uncertain Creating Events That Have Impact 3 Tips for Balancing Work and the Jewish Calendar What Does Purim Teach Us? Join our Writers Passionate about Jewish entrepreneurship? Would you like to join our writers? Fill out your information below and our blog manager will contact you: Writers Login This Thanksgiving, Notice the Good The Hannukah Story: A Recipe for Startups?
cc/2020-05/en_middle_0097.json.gz/line1418582
__label__cc
0.742297
0.257703
Featured, What's New Kravet Inc. Welcomes Clarke & Clarke and Studio G Kravet now represents Clarke & Clarke and Studio G in the U.S. Esteemed brands Clarke & Clarke and Studio G are now officially part of the Kravet Inc. family. Designers at Clarke & Clarke and Studio G hard at work. “The product offering from Clarke and Clarke and Studio G offers us a unique perspective in design,” says Cary Kravet, President of Kravet Inc. “With a strong brand identity in the U.S., the collections of prints, upholstery and wallpaper will allow for a seamless transition and offer distinct colors with a variety of price points that is a perfect complement to our Kravet Inc. collections.” Founded in 1999 by Lee & Emma Clarke, Clarke & Clarke has established itself as one of the global leaders in the home furnishings market. The company now distributes products to retailers, manufacturers and interiors designers in over 90 countries and has earned a reputation for providing innovative designs, exceptional quality and excellent value for money. The company markets its products under two brands; Clarke & Clarke, which is transitional in style, targeting the mid to upper end of the interiors sector and brings inspirational design from the catwalk to the home. Studio G, launched in 2016, is aimed at the mid sector of the market; lively, fashionable and accessible, appealing to aspirational and fashion aware consumers. In addition, C&C Contract collections are specially produced for the contract and hospitality markets, bringing a fashion-forward look to commercial spaces around the world. Both brands are now available through Kravet Inc., starting with the launch of these illustrious collections: Oriental Garden, Kaleidoscope, Lusso Sheers, Lusso 2 – Decorative Weaves. You can now shop Clarke & Clarke and Studio G in our showrooms nationwide, through a sales representative, or on our website. Studio G Roof Garden Collection Kravet Couture Introduces Terrae Prints Fabrics That Perform Introducing… Oceanview by Jeffrey Alan Marks Introducing Kate Spade New York Amusements Jan Showers: A Casually Glamorous Lifestyle
cc/2020-05/en_middle_0097.json.gz/line1418584
__label__cc
0.62938
0.37062
Explore Clubs Interview with Featured Illustrator Graeme Base written by Gaby Brabazon April 27, 2017 Every month, Literati features original artwork by a distinguished illustrator introducing the theme. Subscribers receive this artwork made exclusively for Literati kiddos inside their monthly deliveries. In preparation for May, we had the distinct pleasure of chatting with one of our favorite illustrators, Graeme Base, based in Melbourne Australia. You’ll likely recognize Graeme as both author and illustrator of the 1986 masterpiece Animalia, the alliterative adventure through the alphabet with vibrant, intricate spreads that has kept kids — and adults — immersed for hours, and has been in print for over thirty years. And he hasn’t stopped there. With a growing bibliography of books he’s either illustrated for another author or he’s written and illustrated solo, we can’t get enough of the strange and lively creatures in Graeme’s world. Naturally, we had to know more. All of your illustrations are so incredibly detailed and vivid, and some include rather elaborate narrative elements as well. I’d imagine it varies by the project, but generally do you find that the words and story come first, or imagery? For me everything begins with images – sometimes just one strong mental picture that I become fixated on and eventually develop into a book. The inspiration is very often travel-based – whenever I go somewhere new I am pretty sure I will come back with another book idea. What made you take the leap from advertising to creating picture books? Getting fired! I was hating what I did and it showed. As soon as I go the flick I started going around to publishers looking for work doing book jackets or illustrations for other peoples’ texts – within a year or two it tumbled to me that if I wrote the text as well I would be able to draw what I liked rather than what someone else told me – and that’s what I’ve been doing ever since. What makes a great children’s book? Not writing it for children. The worst thing you can do is talk down to kids – far better to aim above their heads and encourage them to leap. What’s your favorite interaction you’ve had with a child about your work? I got a letter from kid many years ago as follows: ‘Dear Mr Base, I really like your book Animalia – I nearly bought a copy.’ That’s hard to beat. Do you have any advice you’d like to pass on to children who aspire to write and illustrate? Passion, Perspiration, Patience, Persistence and Pizza. Which book really captured your imagination as a kid? What about as an adult? The first book that really grabbed me was J. R. R. Tolkien’s ‘The Lord of the Rings’ way before it became a series of movies. I was given it in paperback form – all three book in one – and it was 1065 pages long. I thought to myself I would never get through it. When I finished I had only one complaint: it was too short. I still love it as an adult. What about a book of your own you’re pleased with, or that is especially close to your heart? It’s hard not to love Animalia – still in print after all these years – who could have guessed an alphabet book could hit the nerve like that? Maybe it’s because I followed my own advice from Question 3! I’m also very fond of The Waterhole – a sweet project that just flowed so well – and more recently Eye to Eye which was inspired by a close encounter with a pod of killer whales of the coast of Antarctica. You said creating the Literati May illustration was easy for you because the idea just came to you. What does that feel like? It’s that ‘one strong mental picture’ thing I was talking about in Question 1 – sometimes an image arrives fully-formed and you just to follow the five Ps from Question 5 until what you see in front of you looks as close to what you imagined in your head as possible. It feels good when you get close. Your characters’ personalities jump off the page and feel so real — almost human. If you were an animal character in the world of one of your books, what would you be? I’d be an elephant. But without the memory. What were we talking about…? To join Literati and have your child receive Graeme’s illustration, sign up at www.literatibooks.com by April 30, 2017. Interview with Featured Illustrator Graeme Base was last modified: July 19th, 2019 by Gaby Brabazon The 10 Best Children’s Books That Celebrate Immigration Interview with Featured Illustrator Jenni Desmond Featured Illustrator: Amy June Bates Featured Illustrator: Jessica Love Featured Illustrator: Isabelle Arsenault Featured Illustrator: Jessica Tickle Featured Illustrator: Matt Lamothe Featured Illustrator: Misha Blaise Last-minute gifting? You’ve still got time! 🎅 Naughty or nice, this gift fits everyone. 📚 Visit… https://t.co/HsYFzmwzWp Will your kid grow up to be academic, empathetic, or globally conscious? Will they be able to articulate what's in… https://t.co/tWm87Z3MqJ Today's the last day to get your gift on the sleigh! Visit https://t.co/HGBVNxQUOs to start personalizing yours. 📚… https://t.co/1dA97bDJqJ Who else loves that book? Snap a pic of it and find out. Details on our IG: https://t.co/BCRbiDPgxa… https://t.co/ZJFmEjiCr7 Last call for free shipping! ⏰ Today is your last chance to get a limited edition gift box delivered in time for Ch… https://t.co/jv01RaGPiV You have to write the book that wants to be written. And if the book will be too difficult for grown-ups, then you write it for children. Literati Giving Back on #GivingTuesday All Aboard The Del Valle Book Bus! Featured Illustrator: Steve Adams Featured Illustrator: Sophie Blackall About Literati © 2018 Literati Inc. All Rights Reserved.
cc/2020-05/en_middle_0097.json.gz/line1418585
__label__cc
0.682073
0.317927
Black Sand Dunes At White Sands Posted on July 16, 2012 June 28, 2014 by Randall R Bresee The largest pure gypsum dune field in the world lies in the Tularosa Basin of New Mexico and approximately 115 square miles of the field are located in White Sands National Monument. An especially notable feature of the sand is its brilliant white appearance. A black & white photograph which featured the white sand was discussed in a previous blog on January 6, 2011. The bright gypsum dunes in that photo were contrasted with the dark mountains far away. The image was named “New Mexico Waves” to emphasize the transient nature of sand dunes as wind causes them to “flow” like water. While at White Sands National Monument, I made a photograph using a different approach that will be discussed in today’s blog. My goal was to render the bright sand in very dark tones for the photo. To accomplish that, the photo emphasized shadowed areas of the dunes and the shadows were deepened substantially. Many things are relative and photographers know that a particular object at a scene can be rendered bright if placed next to a darker object or rendered dark if placed next to a brighter object. This was an important key to rendering the dunes very dark in today’s photograph. Implementing the “relative brightness” idea at White Sands National Monument was challenging since the brilliant white gypsum dunes were easily the brightest objects in the area. What object could be placed next to the dunes to render them very dark in a photograph? The only option was to contrast the sand dunes with themselves. That is, I could place relatively dark shadow areas next to relatively bright sunlit areas of the dunes. After all, Ansel Adams, Edward Weston and many others made beautiful sand dune photographs which contained dark shadowed areas. My goal was a bit different, however, because I wanted to render nearly all of the dunes very dark. I realized that it would be best if the sun was behind the dunes and the camera faced the dunes and the sun. Then, most dune shadows would face the camera and I might be able to locate a dune area which was tilted to the sun at an angle that reflected much sunlight. In other words, I would take advantage of the old optical law, “the angle of incidence equals the angle of reflection” to locate a sufficiently bright dune area that could be placed next to dune shadows to render them in very dark tones. The “relative brightness” idea made sense in theory but I wondered how well it would work in practice. A light meter provided information about that so I searched for a suitable location until I found one that I thought might work. It had plenty of dune shadows which faced me. As is the case with most shadows, these were colored slightly blue since they were illuminated mostly by blue skylight rather than direct sunlight. The location also had a broad, flat area of sand that reflected sunlight strongly toward me. The bright sand was more neutral colored than the dune shadows since it was illuminated mostly by white sunlight. I made a few readings with a light meter and realized that the relative brightness idea might actually work because brightness values of shadowed and bright sand differed by several Zones (f-stops). When I placed the darkest dune shadows on Zone I (nearly pure black), the bright sunlit area fell on Zones IV (slightly darker than middle gray) and V (middle gray). Since I was at White Sands National Monument, I needed to render the bright sand considerably brighter. That is, image contrast needed to be increased substantially if the photograph was to succeed. I apologize in advance for the diversion that follows in the next nine paragraphs. The web is replete with arguments about which photographic approaches are superior to others. For example, many people argue that digital cameras are better than film cameras or vice versa. To me, these arguments are senseless without considering the specific photographic task to be achieved with the camera. I’ll have to admit, however, that I sometimes enter the fracas when people claim that film will soon be dead because digital cameras simply outperform film cameras. A similar argument was made about painting 150 years ago. However, painting remains a viable artistic approach even though people claimed that the invention of photography would lead to the demise of painting. Each artistic approach has advantages and disadvantages and the same thing applies to cameras. I have a long history in digital imaging for scientific applications that dates back to the days when digital imaging was only black & white. I spent many years developing computer controls to automate digital imaging and worked at both standard speeds and very high speeds (using pulsed laser illumination). However, I prefer to use a view camera with black & white film for my personal photography work because I enjoy the superb controls offered by a view camera, the benefits of film and the abstract nature of black & white images. My current workflow consists of exposing large format black & white film, drum scanning the film and then editing/printing digitally. An advantage of this workflow is that it provides four different opportunities to modify contrast in images that require it. All of these opportunities were used to make today’s photograph as discussed below. First, shooting black & white allowed me to increase contrast during exposure by placing a colored contrast filter over the camera lens. A dark red filter was used because it blocked much light from dune shadows (since they were colored blue) but blocked less light from the bright sand area (since it was neutral white). The filter produced less exposure for shadows (they were darkened a lot) than for the bright sand area (it was darkened only a little) so image contrast was increased overall. I believe the red filter increased contrast by one Zone (one f-stop) for today’s photograph. Second, shooting black & white film allowed me to increase contrast by increasing film development time. I developed the film for today’s photograph N+2 to increase contrast of the brightest areas two Zones (two f-stops). The brightest image areas were clouds and the bright sand was less bright so the brightest clouds were brightened two Zones and the bright sand was brightened approximately one Zone (one f-stop). Third, contrast was increased while the film was scanned to obtain a digital image. Most scanners vary contrast using software after scanning is completed but my Howtek drum scanner uses Digital PhotoLab software to adjust scanner hardware during scanning. This is a serious advantage compared to most film scanners. The bright sand was brightened one Zone (one f-stop) during scanning. My digital image file was now ready for the fourth and final method of contrast enhancement which involved digital software editing using PhotoShop as one can do with any digital image. It is important to realize that image modifications generally produce better technical results if they are performed sooner rather than later in the photographic process. Shooting black & white film for today’s photo provided three early opportunities to increase image contrast before opening PhotoShop. Contrast was increased substantially during these three steps (by approximately three Zones) and was done before digital editing even began. Black & white film may not be such a bad workflow, eh? Enough of this diversion so back to the discussion of composition! I composed an image which included plenty of dune shadows and a large bright sand area. I used an area where the dune shadows had wonderful shapes. I used only a single area of bright sand to simplify the composition. Bright sand was important to the image but using a single flat area produced more uniform tones than a more complicated arrangement. In addition, the emphasis of the photograph was dark sand and bright sand was only needed to put the dark sand in tonal perspective.As a bonus, the bright sand area had a sexy curve at its interface with the dark sand. I exposed one sheet of film and departed the area to search for something else to photograph. I previewed the 4inch x 5inch negative on my drum scanner and the image looked flat. Its histogram showed that it was indeed flat. Consequently, I instructed the Digital PhotoLab scanning software to adjust the scanner’s hardware to increase image contrast during scanning. A high resolution digital file was recorded at 5,000 dpi and 16-bit pixel depth to produce a digital image of nearly one GB in size. The image obtained from the scanner was viewed on a computer monitor with PhotoShop and it was evident that the image was quite dirty. I seldom experience such bad contamination and believe that the film holder had gotten contaminated with sand somehow. An hour using PhotoShop’s Healing Brush tool was needed to fix the contamination. The overall contrast of the image was pretty good in the sense that dark dune areas appeared quite low in the gray-level histogram and bright clouds appeared quite high. This “success” was misleading, however, because the mood of the image did not represent what I envisioned at the scene. I realized that my composition could have been much better but recognized that it could be fixed with PhotoShop. I dealt with the compositional shortcoming by removing two areas from the image using PhotoShop’s cropping tool. First, the bright clouds were cropped from the image because they were the brightest areas in the image. Excluding them allowed the next brightest and more important area (foreground sand) to be brightened later. Second, I realized that the area of bright sand in the foreground was too large so the lowest portion of it was excluded. This shifted more viewer attention toward the dark dunes and curved line which separates the dark and bright sand areas. Next, a Levels adjustment layer was opened to modify image tones globally. The black slider of the histogram was moved to deepen dark areas and increase their visual weight. The white slider of the histogram was moved to brighten the foreground sand so it became the brightest area of the image. Next, four relatively distinct image areas were adjusted individually. These were the bright foreground, black dunes, mountains and sky. PhotoShop’s Magnetic Lasso tool was used to select the bright foreground sand and a curve adjustment layer was opened for the selected area. The image was sampled to identify parts of the curve that corresponded to the brightest areas of sand as well as the slightly darker sand areas which provide texture. The brightest areas were brightened moderately by bending their portion of the curve upward. At the same time, darker textural areas were darkened somewhat by bending their portion of the curve downward. This edit emphasized the word “white” in white sands. Then, PhotoShop’s Magnetic Lasso tool was used to select dark dunes and a curve adjustment layer was opened for the area. The image was sampled to identify parts of the curve that corresponded to dark but somewhat weak areas of the dunes. These areas were darkened by bending their portion of the curve downward to deepen shadows that were not dark enough. This edit added punch to the word “black” sand dunes. PhotoShop’s Magnetic Lasso tool was used to select the mountains and a curve adjustment layer was opened for them. The image was sampled to identify parts of the curve which corresponded to the brightest (although still fairly dark) features of the mountains. These features were brightened by bending their portion of the curve upward. This adjustment increased contrast within the mountains so their structure was more visible and more visually interesting. Finally, PhotoShop’s Magnetic Lasso tool was used to select the sky and a curve adjustment layer was opened for it. The curve was modified to brighten the darker cloud areas and darken the brighter cloud areas. This edit increased tonal uniformity in the sky and shifted viewer attention toward the dunes. The goal of making this photograph was to render sand dunes very dark even though they were part of a dune field that was composed of blisteringly white sand. I believe the goal was achieved and a photograph was made which is quite distinctive and beautiful. Any comments you might have about the image, the photographic approach used for it, the image composition or its workup will be appreciated. For a slightly better view of this image, visit http://www.RandallRBreseePhoto.com and click on the Galleries tab on top, select the “Western USA” gallery and then click twice on the image labeled, “Black Sand Dunes at White Sands.”
cc/2020-05/en_middle_0097.json.gz/line1418591
__label__wiki
0.521732
0.521732
85 So. 308 (Miss. 1920), 21211, Gulfport & Mississipi Coast Traction Co. v. Manuel Docket Nº: 21211 Citation: 85 So. 308, 123 Miss. 266 Opinion Judge: ETHRIDGE, J. Party Name: GULFPORT & MISSISSIPI COAST TRACTION CO. ET AL. v. MANUEL ET AL Attorney: White & Ford, for appellant. Rushing & Guice, for appellant. Mize & Mize, for appellee. Case Date: March 01, 1920 Court: Supreme Court of Mississippi 85 So. 308 (Miss. 1920) 123 Miss. 266 GULFPORT & MISSISSIPI COAST TRACTION CO. ET AL. MANUEL ET AL Supreme Court of Mississippi APPEAL from the circuit court of Harrison County, HON. D. M. GRAHAM, Judge. Action by Mrs. Eugenia Manuel and Flores Manuel, a minor, against the City of Biloxi and the Gulfport & Mississippi Coast Traction Company. Judgment for plaintiffs, and defendants appeal. Reversed, and judgment rendered for defendants. White & Ford, for appellant. While the question as to what constituted negligence is one for the jury whenever there are facts shown upon which negligence can reasonably be predicated, where the undisputed testimony shows a state of facts such that reasonable or careful man would believe that there was no possible danger therefrom, a peremptory instruction should be given, and in such case this court does not, hesitate to reverse and dismiss. Gin Co. v. Moore, 103 Miss. 447; Railroad Company v. Frazier, 104 Mass. 379; A. & V. Ry. Co. v. White, 106 Miss. 141; Chicago Title & Trust Co. v. Standard Fashion Co., 106 Ill.App. 135; Terminal Ass'n. v. Larkins, 112 Mo.App. 366; Union Pac. Ry. Co. v. Leppard, 47 P. 625, 5 Kan.App. 484; Chicago B. & Q. Ry. Co. v. Schwanenfeldt, 105 N.W. 1101, 75 Neb. 80. "Where there is no controversy as to the facts, the question of negligence is for the court; otherwise, it is for the jury." Thomas v. Wheeling Electrical Co., 46 S.E. 217, 54 W.Va. 395. This pole was set in a grass plot three feet from the traveled street and in the place selected by the city authorities as a safe and proper place for it. It was absolutely safe to all persons using the slightest care in traveling the street, and for all persons using the street in a lawful manner. Appellant could not foresee that some reckless rider of a motorcycle, driving his machine at a reckless rate of speed in violation of law, would lose control of his machine at this particular place and leaving the traveled street run against this pole. The facts are undisputed and there is no act of appellant from which a jury by the widest stretch of imagination could infer negligence and we therefore confidently insist that there was no question for the jury to pass upon and that the judgment should be set aside, the cause reversed and a judgment entered here for defendants. There is another established fact which is fatal to appellee's cause. The deceased was killed while violating the laws of the state and the ordinances of the City of Biloxi and his death was the direct result of his unlawful act. That this is true was shown by the undisputed testimony of witnesses and by the conditions and circumstances surrounding the accident itself. Broschart v. Tuttle, 11 L. R. A. 33; W. U. Tel. Co. v. McLaurin, L. R. A. 1915C, 389; Railroad Company v. Messina, 111 Miss. 884. No case has been brought to our attention and upon careful investigation we have found none in which a plaintiff, whose violation of law contributes directly or proximately to cause him an injury, has been permitted to recover for it, and decisions are numerous to the contrary. Newcome v. Boston, Protective Department, 4 Am. St. Rep. 358 (and authorities cited on this page); Boswart v. Inhabitants of Swaney, 41 Am. Dec. 341; Heland v. City of Lowell, 81 Am. Dec. 670; Knickerbocker, Ice Co. v. Leyda, 128 Ill.App. 66; Dudley v. N. H. Street Ry. Co., 89 N.E. 25; Wyatts v. Traction Company, 57 So. 471; So. Ry. Company v. Rice, 78 S.E. 592; Haumesser v. Central Brewing Company, 158 Ill.App. 648. The law does not place upon this appellant the duty of placing its poles in the street in such manner as to make them safe for speed maniacs and violators of the law, nor does the law penalize one for the unlawful act of another. We therefore submit that the record shows two perfect defense to this suit; first, the proof conclusively shows that appellant's pole was set in a perfectly safe place, and second; that the death of Manuel was the direct result of his own unlawful act. Rushing & Guice, for appellant. The pole in question was not in a dangerous place for any person in the exercise of even ordinary care for his own safety and certainly municipal corporations do not owe a higher duty to those persons who recklessly and without the slightest regard for their own safety use the streets for reckless driving. Such reckless riders not only endanger their own lives but those of all others of cities whose business requires them to use the streets. In the case of Walker v. Vicksburg, 71 Miss. 899, 15 So. 132, the court through CAMPBELL, C. J., said: "Assuming the law to be that Walker did not sustain such relation to the city, by reason of his employment as a fireman, as to preclude him from recovering from any injury sustained because of a defect in the street, under circumstances which would entitle any traveler to recover, it appears too plain for dispute that his injury resulted from want of due care on his part, and that on this ground he should not be allowed to recover. The extent of the obligation of the city is to keep the streets in a condition reasonably safe for a general use, and it is not required to have them so as to insure the safety of a reckless driver, whether a fireman or another. According to the... Macpherson v Buick Motor Co McGrain v Daugherty
cc/2020-05/en_middle_0097.json.gz/line1418596
__label__cc
0.701919
0.298081
Archbishop Chaput Addresses Financial Transparency March 21, 2012 ~ Susan Matthews ARCHBISHOP CHAPUT’S WEEKLY COLUMN: THE NATURE OF THE CHURCH AND THE IMPORTANCE OF LAY ACTION In the next few months, at my request, the Catholic Standard and Times will publish a report on the financial condition of the Archdiocese of Philadelphia, including its offices, ministry programs and many of its related agencies and non-profit corporations. Too often we think of the Church as an institution, and institutions are hard to love. The structures of Catholic life are required by canon and civil law, and they’re important. But they’re also secondary. At her heart, the Church is a family, a community of believers. Like any family, her members have mutual obligations of respect and accountability. This has practical consequences. We ask our people to be generous. As a result, they have a right to know that their resources, which the Church holds in trust for them, are used properly. To put it another way: We can’t be confident about the future; we can’t even begin to solve our problems; unless we’re well informed. Much of this year’s financial information will be new. Some of it will be quite sobering. Nonetheless, beginning this year and every year in the future, we will provide to our people as full a picture of our financial life as a Church as we reasonably can. Part of my accountability as a bishop involves seeking the advice of skilled, prudent people. In the life of the Church, advisory bodies exist for a purpose. They have a duty to be faithful to the Church and her teachings, but if they simply say what they think the pastor or bishop wants to hear, they fail in their mission. They have a responsibility to offer honest counsel based on their experience and on proper access to good information. The Archdiocesan Priests’ Council (along with the College of Consultors) brings together experienced priests from around our local Church to share in the bishop’s decision-making. These men share in the priesthood with their bishop, they lead our local parishes, and they have uniquely important experience of the problems and opportunities in Catholic life at the grassroots level. Likewise the Archdiocesan Finance Council should gather together the best Catholic professionals in business and finance from the Philadelphia region to help the Church steward her people’s resources. Again, the resources of the Church belong to her people, not to the clergy and not to some impersonal monolith. They come from the sweat and sacrifices of generations of Catholics who came before us. The Church holds these resources in trust for the whole Catholic community to carry out the ministries and apostolic works that the Gospel calls all of us to pursue. The Church requires that every diocese must have a council of priests, a College of Consultors and a finance council. But she also recommends another key advisory body: a diocese-wide pastoral council composed mainly of laypeople and focused on the pastoral issues facing the Catholic community. Philadelphia’s Archdiocesan Pastoral Council (APC) has been planned for some years, with important groundwork done by Dr. Robert Miller of our archdiocesan research staff and Auxiliary Bishop John McIntyre. Last month, on February 25, their work bore fruit in the first ever meeting of the Pastoral Council of the Archdiocese of Philadelphia. The meeting began with Mass, and work continued throughout the day. Council sessions included briefings on the legal and financial issues facing the archdiocese; the future of Catholic education in the Philadelphia region; and an overview of our efforts to deal with issues of sexual abuse and to preclude such incidents in the future. Going forward, APC meetings will occur quarterly. Remaining 2012 dates include May 5, September 8 and December 15. In practice, the council should be a local snapshot of the whole People of God. In Philadelphia, that means it will always include at least one priest, one permanent deacon and one religious. But the rest of the roughly 30 members are laypeople from every walk of life and region in the archdiocese. This makes sense, since the Church is overwhelmingly lay in her membership, and – especially today — laypeople must play a vital role in advancing the work of the Gospel. I select APC members from candidates nominated by their pastors through the local deaneries. I also reserve a number of at-large appointments to myself to ensure a balance in gender, age, ethnicity and experience. Service on the council follows four simple rules: fidelity to Catholic teaching; charity; mutual respect; and candor. Members do not “represent” any constituency but themselves. Their great value to the bishop lies in bringing their personal life experience to the honest discussion of pastoral issues facing our Church. Over the past six months, I’ve written several times about the hard challenges that lie ahead for our Church. But it won’t always be so. To borrow a thought from Francis of Assisi, God has given us too many good people in our archdiocese — clergy, laypersons and religious — to fail if we work together to “repair [God’s] house.” Things like a financial report and an Archdiocesan Pastoral Council are a beginning. More will come. Posted in Prevent & Advocate ‹ PreviousThe List Cardinal Bevilacqua Didn’t Want You to See Next ›Questions for the OCE and OCYP 69 thoughts on “Archbishop Chaput Addresses Financial Transparency” haditCatholic says: Chaput, Keep it up. Verging on 100% ineffectual. get a shovel…Why should we have to repair the damage his types did to God’s house? …So there’s going to be a financial report and a quarterly council of puppets meeting…what a major breakthrough .. agree, Crystal, get out the shovel. I just can’t read this stuff anymore. I start to read and then it all turns into the same old song. It really is mind boggling. Good news laity will finally have representation ..better news we have chosen who will represent you. What other organization functions this way. In my area recently there was a lot of upheaval with the local school board and the community was out in force organizing grass root campaigns,write in candidates etc…. It doesn’t mean everyone was happy with the results but at least they played a part in the process. Even look at universities with student government associations that act as liasons/reps between students and university admin- they are elected by the students. …We deplore this tyrannical nonsense, because Democracy is in our DNA. It’s the only way we know how to live. They foolishly underestimate this. Chaput drove home the fact that the council members will not be representing their parishes or deaneries. They represent no constituents, and we have no representation at those meetings… Same old stuff. Gloria Sullivan says: It’s so sad to realize we have been generationally brain washed. Now that we KNOW, we must be able to “not buy into their evil drivel”. It’s so hard on the older people. I’m glad we left when I was younger(72), ten yrs ago, The one scripture that the LORD has given me is ;”The Lord has not given me a spirit of fear but of POWER, LOVE AND A SOUND MIND.” I’VE KEPT THAT IN MY HEART, SO THEY CAN’T TRY AND TRANS FORM ME AGAIN WITH THEIR INTELLECTUAL (faux spiritual )LIES. “Sweet Talkers”, especially Chaput, being an Indian, he knows how to get the people to believe in the CHIEF.I live in Colo. so I know what how he operates. Now if the Lord can convince those , who are still going to the rcc, ’cause of their children and maybe wives or husbands that may have converted, to realize, what an “evil empire” this place is( that we have found out about ten yrs ago) ,God will get them on Jesus’ band wagon, for the abused and into The Word of Almighty God…..to renew them all. This is my prayer. God knows there’s nothing like getting Christians away from the rcc … Once they have left “say , they can’t believe what they missed by not KNOWING God’s Word”.. They say the rcc gave them nothing but rote stuff and guilt. They now have “The Joy of the Lord as their strength” .”They rejoice and are glad.”..That’s what we want for all our children and most especially,our precious vunerble” the Spiritually Murdered”, by the rcc’s evil clerical system. . Amen??? S. Reid Warren, III says: From outside The Church it is difficult for me to find Archbishop Chaput credible in what he says. He speaks of The Church as Family but The Family is male dominated by the Vatican. Families that are successful have respect for and representation for the contributions of women. He refers to The Church as She, but it is run by men – priests, bishops, cardinals, and the Vatican. When will there be a recognition and an admission that it is the men in The Church who have caused the multiple problems – only the men? This issue is never addressed, and until it is, it will be business as usual. Nancy O'Brien says: This is just a beginning. If they are really going to be forthcoming about finances I welcome it. Nancy, Jason Beryy in Render Unto Rome on pages 12 and 13 in a piece entitled ‘Financial Accountability’ speaks to these issues. He makes the point that ‘ the bishops are under no obligation to produce profit and loss statements for stockholders or the IRS.’ He goes on to note that many dioceses now post financial statements on their web page. He then tells you what the many limitations of such ‘statements’ are. His bottom line is that unless these financial statements are audited by a CPA firm, with ALL the data necessary for such an audit, they are less than wonderful. Three ADs out of 194 have presented such ‘credible’ data. They are, Boston, LA and Kalamazoo, Michigan. A bit more on Jason Berry, Render Unto Rome, 2011, page 13. “A CPA firm will not provide an audit report without all of the figures for a statement. Ruhl credits the Archdioceses of Boston and Los Angeles, and the Kalamazoo, Michigan for posting audited statements.” ( this 3 out of 194 diocese). Berry goes on to say that a ‘review’ commonly masking as a full financial statement is ‘substantially less in scope than an audit.’ That’s how the Chicago AD releases info. No assurance is provided by financial statements THAT HAVE NOT BEEN AUDITED, by a CPA firm! Do not be misled by financial statements that have been ‘COMPILED’ by a firm…’A compilation just requires the CPA to look for obvious errors. An example is the AD of New Orleans. The numbers may or may not be close. Berry then goes on to note that Atlanta, Austin, Arlington, and Anchorage have audited statements that DO NOT INCLUDE THE PARISHES!…Austin states that it’s parishes and other agencies have been separately incorporated. (to shield them from abuse claims). “Finally, there are financial statements that are not even accompanied by a compilation report. Somebody has just put some numbers together. An example of that is the Archdiocese of Philadelphia. “ “…..Service on the council follows four simple rules: fidelity to Catholic teaching; charity; mutual respect; and candor. Members do not “represent” any constituency but themselves….” A number of troubling words here………….”constituency”………Seems like the Archbishop looks on the “internal matters” within the Church as political. One wonders where he got that idea? In Denver? Would the lobbyists in Harrisburg be part of Archbishop Chaput’s “constituency”? The other word of importance and concern…….”candor”……..It is a “two-way” street, don’t you know. There needs to be “candor” on both sides of the table. As a matter of fact, some “mutual respect” from archdiocesan leadership in their relationships with the Philadelphia faithful is long overdue. Like you Michael, I’m wondering what does the Archbishop mean when he states, “members do not ‘represent’ and constituency but themselves.” Hmmmm…..he probably means he doesn’t want people with their own agendas on the council, okay, then who and what does the Archbishop represent? Does he really think individuals come to a group without any of their own priorities, convictions, experiences, beliefs and passions? Sorry but I don’t see people as ‘blank slates’, we all have our own causes, be they expressed or unexpressed. If he fails to realize the passions some in his archdiocese feel about a whole host of issues then he will soon dismiss them as contrarian, rebellious and divisive. Unless he has the patience and willingness to explore the deeper issues that some may hold then he misses the boat completely…so it’s back to back to square one, his mantra may well be “if they’re not with us or they disagree with us, then they need to leave the Catholic Church.” Finally, they sure do represent at least one constituency that I know of, it’s called the Catholic Church. If they don’t have any of our survivors on board that council………..they have learned nothing…………… I’m completely guessing here…but maybe Chaput meant the people chosen were not “spokespeople” for the parish they attend. Meaning they speak for and represent themselves…they aren’t speaking for all the parishioners of the church they attend? That’s how I read it. I’d like to see Susan Matthews on the Council. I was thinking that. Do we have any good catholics ………..go to church, help with parish that also support the law changes and helping survivors on that council? That is what we need. Kris and Beth, actually Susan was nominated or her name was thrown in the ring or whatever the process . I am thinking Susan having a constituency of angry betrayed Catholics,parents demanding child protections and victims seeking justice ,deemed her ineligible for a seat at the table. That and the fact that she asks excellent questions 🙂 It doesn’t matter that we want to see Susan on the Council. According to Chaput’s letter, it’s the parish priests and the bishop who determine the APC members. Same old same old… Susan was nominated-it wasn’t her idea. And yes -hand picked by clergy and approved by the Archbishop -wow I feel like such a part of the process already!! Will Susan decline and make a public statement asserting her position against the clergy-controlled process of choosing APC members? Susan was nominated ,not chosen friscoeddie says: As a west coaster I can’t believe there was no Pastoral council and that it will take ‘ the next few months’ to bring forth a financial accounting. Why not show us the non profit tax return due 4-15-12 .. like we all have to do? I was wondering if they ha done in Denver and other areas also. Just what the church needs…another hand-picked council…just like their review board? My favorite line, “Nonetheless, beginning this year and every year in the future, we will provide to our people as full a picture of our financial life as a Church as we reasonably can.” I’ll translate for the people who don’t understand bishop-eze: “We’ll tell you what we want to tell you and nothing more. Same as before.” There is so much fluff and puff to his writing, it’s a wonder anyone takes him seriously. God help the people who read it and believe it. Yes are they just the big donaters? I nominate you SW you tell it like it is:) Time will tell………..it always does……… Jane Kosiek says: I’ll second that nomination!!! Another favorite, “The Church holds these resources in trust for the whole Catholic community to carry out the ministries and apostolic works that the Gospel calls all of us to pursue.” Like legal defense teams? Like prayer and penance houses for all the pedophiles? Cut out the middle man and donate directly to your charities!!!! These people do not manage your money well. They use it to hide criminals and pay legal defense teams to save their behinds from the clink. If Chaput is sincere about financial transparency, then the legal teams expenses and prayer and penance “retirement” houses and living expenses will be reflected in the numbers. Watch for it. If I were a betting person, I would wager that no one will ever really “know” those numbers either. That’s for the secret archives along with the master list of “liabilities.” The AD is on fire with the trial coming up and he puts out a column about finances and a pseudo-transparency/accountability tactic? Look over here…pay no attention to that man (Lynn) behind the curtain. This isn’t funny, but I can’t stop laughing at the ridiculousness of this. SW, I would hazard a guess that the prayer and penance costs will be lumped into ‘retired priests costs’ and they will all be lumped together under a Catholic Charities, Catholic Appeal banner. Want to bet? AND, legal defense costs will be subsumed under the banner of ‘Administration’. survivors wife, I also see it as a way to fire up the laity when the SOL battle heats up…they are taking your money..not our money..it is your money these victims are after. You bet…He’s getting “all financially transparent” and “open to lay advice” at this moment for his own reasons. When does the trial start? Ahhhh…. Thank you for making that point Kathy. John Richard says: Astute and interesting point. Thanks Kathy Some questions that will never be answered. How much money has the AD spent on defending Lynn and how much are they paying a high priced legal dream team to protect their interests. “Their” interests not my interests. I totally agree. I would have him plead guilty and open all files save alot of time, money and suffering ………. I believe chaput can talk a cat off of a fish truck ! unabletotrust I think your right. That is why they ent him right? “sent him” I couldn’t help but by hit by this line,”…an overview of our efforts to deal with issues of sexual abuse and to preclude such incidents in the future.” How about precluding the incidents of COVERING UP the sexual abuse? There are 2 parts to this problem….the abuse and the massive cover-up. Which I would be very interested how many council members are survivors. We need them on the board because they know the truth. “Part of my accountability as a bishop involves seeking the advice of skilled, prudent people”. The Archbishop may be making a start in the right direction, but a full disclosure of the financial practices that put us in our current predicament would be a far better step. True transparency consists of a summary disclosure of past practices to current financial realities. Speaking from a “prudent” financial standpoint, “prudent advice” would demand at a minimum a comprehensive examination of assets, liabilities, and financial standards of practice. The Philadelphia Diocese has been the recipient of endowments, grants, and contributions from wealthy individuals, corporations, alumni groups and the general laity for generations, where exactly did all this money go? And who spent it? Patrick OMalley says: Its interesting that this comes out on the same day that the Boston Herald breaks the news that the Boston Catholic church paid 17 of its employees over $150,000 a year. See http://bit.ly/GEsSHq Of course, they continue to hide everything that they can hide, and they do say that Cardinal O’Malley only makes $41,000 per year plus $14,000 non-taxable compensation. What they hide, of course, is that all of his expense are paid, including housing, food, transportation, clothes, retirement, et cetera. My favorite are the first class tickets to Rome to see the pope, or first class tickets to Ireland or someplace else to be there while they explain why they hid their rampant child sex abuse. I just checked the price of a 14 day advance first class ticket from Boston to Rome, and its $6,300. Anyone know if Jesus flew first class? Kathy, I think you have the right of it. If it is like the BS people ‘chosen’ to host the meeting that St. Joe’s put together to address Lynn’s arrest and the sex scandal last year, it WILL be a joke. Solutions using corporate trainers/puppets, games with m & m’s….., now some kind of promise of financial tranparency? Please. They think we are idiots. Irene Banionis says: Was the timing of the Bishop’s announcement about transparency just before the beginning of the big Lynn et al trial on March 26 a coincidence or was it made to stir up some support for the AD? Also, is the archdiocesan rally for “religious freedom” at Independence Hall this friday, the 23rd, another diversionary tactic? I think they may be trying very hard to build up some support and sympathy before all the bad news starts to gush out at the trial. As good as the transparency seems to sound, I wonder about Chaput’s motives. It would be great to know that the monthly vigils at diocesan headquarters were finally taken seriously. Is all this, including putting the bishop’s mansion up for sale, being done at the advice of the legal team to quiet the faithful somewhat? Time will surely tell. Irene with leadship lying for so long it is just common snese not to trust them. Maybe one day they can restore trust but not in my lifetime. Trust is very fragile it can be destroyed in an instant and take years to restore if ever…………… This paragraph from Archbishop Chaput’s letter summarizes the essential problem at the core of the Catholic Church : In the life of the Church, advisory bodies exist for a purpose. They have a duty to be faithful to the Church and her teachings, but if they simply say what they think the pastor or bishop wants to hear, they fail in their mission. They have a responsibility to offer honest counsel based on their experience and on proper access to good information. My experience in Parish Life of the Church has been that when asked to sit on these counsels ; providing honest counsel for the good of the parish has been rejected. Feedback is neither listended to or responded to if it is not what leadership wants to hear. Thoughtful insights and suggestions are completley ignored. Eventually those who speak up are removed from the counsels. Sadly, I see in so many anger and energy fading with each passing day. An attitude of apathy is taking over…you get tired fighting after a while. I believe that if true collaboration and interaction with involved dedicated lay and religious (including and especially women) had been taking place in our Church, it would not be in the situation it is today. http://catholicphilly.com/2012/03/news/archdiocese/archbishop-chaput-forms-archdiocesan-pastoral-council/ Here is their names. I recognize a few. They are in my prayers. Face it folks. We’re asking a patriarchal, medieval and corrupt institution to play and behave according to 21st century, ethical standards. With all its entrenched and ingrained “character traits” firmly in place, it comes to the table with a “good faith-deal.” Word after word, it is unrecognizable to us. What??? From what planet do you hail? Excuse me, but we’re normal, informed, hard-working, passionate and dedicated human beings. And you? Conspiring and inept aliens, sporting facial smirks. Do not trust this institution! Until the priesthood is reformed, it is not fit for human consumption. From where I sit, they are just laying the groundwork for declaring bankruptcy like other diocese have done. It wasn’t that long ago that Wilmington Diocese declared bankruptcy just as the trial was about to begin regarding their abuse scandal. Chaput started with the somber message a few months ago that there would be Big Changes. We’ve seen the schools close. Now here comes the financial “transparency”. Soon most likely it will be parishes merging. (They’ve learned to call it “merging” now.. it sounds much nicer than “closing”) Now it’s time to pull the laity in on the process so we can pass the buck when it comes down to who made the decisions. It was the Blue Ribbon Commission who made the suggestions regarding the schools. Here in NJ, it was the committees from both schools and parishes that were credited for changes made here.. funny though how none of us recognized any of the suggestions that were implemented. They all work from the same playbook. It is so disheartening. It also gives a new meaning to the word tranparency. mimzyb, so well put..So it’s, “Gather a committee of all-too-willing helpers, stroke their egos, then make them do the dirty work and take the fall.” It’s mentioned here that council members’ backgrounds can be found online…anyone know where? Think these council members already know how they’re being used to shift the blame for the bad news ahead…?— Maybe when the the thrill of being chosen above the other brownies wears off, it’ll dawn on them and they’ll get angry…? since he is talking finances will he say how much and where the money is coming from to pay for the lawyers and other legal fees?i think they keep saying insurance covers it.thats what i tell my father when he asks me where the money is coming from to pay for the assisted living home that he is living in! Your comments keep me sane in the insanity. And your dry humor is so insightful. L. Newington says: I’d like to pick up on the second paragraph, the Catholic family, structured by by civil and canon law and important and I couldn’t agree more. It’s the implemting of Canon Law [1139]. “Illegitimate children are legitimated by the subsequent marriage of their parents, whether valid or putative, by a rescript of the Holy See”. Yet when such a request is made it is denied due to the evident cause for scandal, not withstanding, the spurious brother/sister arrangement sanctified, to preserve the priesthood/francican image is acceptable. Ultimately forcing the “Catholic family unit”, to a life of subtefuge deceiving the faithful and living a lie. It all counts in the scheme of things and the attitide towards transaparency, not only in America, but universally. A review of the professional backgrounds, careers and positions of those on the Pastoral Council of the Archdiocese of Philadelphia is very revealing. Does the Archbishop really believe that the persons on the pastoral council truly reflect a representative cross-section of the faithful in the Archdiocese of Philadelphia? I ask that other posters on this site do some investigating on their own via the Internet and you too will be disheartened, but certainly not surprised, how the “deck has been stacked” re the makeup of the Pastoral Council of the Archdiocese. I thought I just read an article from the Archbishop today on catholicphilly.com wherein he spoke of candor and mutual respect between the faithful and Church leadership. If this is the first instance of candor and mutual respect (i.e., the makeup of the Pastoral Council), then the faithful can certainly be assured….”the more things change, the more things remain the same.” Yes. I was looking myself online…….. Beth, Michael, may i ask where you found this info online? Takes awhile google their name and parish etc.Michael might have a quicker way he use to be a cop. Some names I recognize from articles etc. I do hope they can make some postive changes. How much longer will we wait before the Leaders of the Church of Rome face full legal accountability? Before we hold them Criminally Responsible for the full extent of their Illicit Activities? Is there even a single instance, anywhere, that a public school teacher had sex with a student and was transferred by School Administrators from LA to Phillie, or from San Francisco to South America; from Poland to Massachusetts; or from Italy to Illinois, or even within the same city? Is there any other corporation anywhere in the world that we would permit to continue with the kind of ONGOING Criminal Activity epidemic in the Church of the Roman Empire, and permit to remain as part of our community? Why do we put up with it? Because a bunch of brain-washed brain-dead zombies want to hold onto fake stories of Mary appearing somewhere? “I love the scent of incense in the morning. It’s the smell of raw political power.” “Anybody that doesn’t think there is widespread sexual abuse within the Catholic Church is living on another planet.” Sadly, yes….there are teachers who have been passed on to other schools. I want the administrators who knew of “boundary issues” to be held accountable as well. I’m not sure I would categorize it as “conspiracy,” but true ignorance and indifference to children outside of their jurisdiction, which is just as horrible. SW- i so agree.. administrators and teachers helped enable and perpetuate the abuse by staying at their jobs. So unethical! They sensed and oftentimes knew that children were being violated and nothing serious was ever done about it. They tolerated the deal and cashed their paychecks year after year. “The measure of a man’s real character is what he would do if he knew he never would be found out.” Thomas Babington Macaulay “The most useful thing about a principle is that it can always be sacrificed to experiency.” W. Somerset Maugham “We grow with the years more fragile in body, but morally stouter, and can throw off the chill of a bad conscience almost at once.” Logan Pearsall Smith “Waste no more tijme arguing what a good man should be. Be one.” Marcus Aurelius “I hate mankind, for I think myself one of the best of them, and I know how bad I am.” Joseph Baretti I love those Reid. They come from a quirky magazine called The Sun – the back page entitled SUNBEAMS. The mag. carries articles about faith issues, poverty and exploitation, poems and personal letters regarding a human issues in whih the writers sometimes share their hearts and their souls. A good bit of it is very touching. Truth is what keeps me sane.The Archdiocese leadership have robbed the survivors of their trust for the church and many laity their peace of mind……….how do you plan on restoring this Archbishop Chaput when your actions are not always congruent with what you say? Please stop lobbying against law changes…….. they will protect our children. Turn over the files and clean house. That is the only way to restore trust………though it will be painful it is nothing compared to the pain of the survivors and it will lead to the saving of many souls. Marty Tantum says: RE: Archdiocesan Finances – Frankly,it’s about time. this is actually good and almost encouraging news. it’s a step in the right direction. I’ve heard rumors about Chaput doing a housecleaning at the archdiocese hq too. re: proposed law – I’m for it only if it covers all institutions, not just the church. if it was pointed just towards the church that would be a non starter and I gotta believe unconstitutional Bill Wilson says: I agree with the person above who said that this board will be the scapegoat for any unpleasant financial decisions Chaput has to make, such as school and parish closings. Another thing to watch for is how willing this Vatican toady will be to embrace a decision this group makes that goes against his wishes– assuming there are any independent voices on this panel who are most likely hand-picked sycophants. I know of no instance where a prelate or priest has let a mere layman (much less a mere laywoman) tell him what to do.
cc/2020-05/en_middle_0097.json.gz/line1418600
__label__cc
0.546615
0.453385
Co2 Emissions For Coal Boiler Carbon emissions from burning biomass for energy - pfpi.net Utility-scale biomass boiler: 24% Average efficiency US coal fleet: 33% Average gas plant: 43% Carbon emissions from burning biomass for energy Is biomass Worse than coal? Yes, if youre interested in reducing carbon dioxide emissions anytime in the next 40 years. Biomass burning: a major carbon polluter What is the average CO2 emission in a coal fired power plant? Apr 05, 2018· Depends a little. For good coal with little de-SOx and good efficiency it can be as low as 0.9 kg CO2 per kWh electricity. For high sulfur coal, low efficiency boiler, it can be 1.1. Emission Factors for Greenhouse Gas Inventories Bituminous Coal; 24.93 93.28 11 1.6 2,325 274 40 short tons Assumption: 80% boiler efficiency (PDF) to 40 CFR part 98, subpart C: Table C1 to Subpart CDefault CO2 Emission Factors and High Heat Values for Various Types of Fuel and Table C2 to Subpart CDefault CH4 and N2O Emission Factors for Various Types of Fuel. CO2 Reduction by Oxy-Fuel Combustion CO2 Reduction By Oxy-Fuel Combustion - Summary 100% oxy-fuel firing of coal fired boilers is feasible for CO2 sequestration. Stand alone oxygen generation plant consumes 10 to 20% of the power plant output and is not economically attractive Oxy-fuel combustion without producing pure O2 appears promising for CO2 sequestration. co2 percentage in coal fired boiler Industrial Boiler Carbon Dioxide Emission Factors for Coal Coal is an important source of energy in the United States, and the Nation's reliance on this fossil fuel for electricity generation is growing. The combustion of coal, however, adds a significant amount of carbon dioxide to the atmosphere per unit of heat energy, more than does the combustion of Guide to Low-Emission Boiler and Combustion Equipment GUIDE TO LOW-EMISSION BOILER AND COMBUSTION EQUIPMENT SELECTION C. B. Oland Date Published: April 2002 Prepared for the U.S. Department of Energy Office of Industrial Technologies Prepared by OAK RIDGE NATIONAL LABORATORY Oak Ridge, Tennessee 37831 managed by UT-BATTELLE, LLC for the U.S. DEPARTMENT OF ENERGY under contract DE-AC05-00OR22725 High Efficiency Low Emission Coal | HELE | WCA High efficiency low emission coal. Moving the current average global efficiency rate of coal-fired power plants from 33% to 40% by deploying more advanced off-the-shelf technology could cut two gigatonnes of CO2 emissions. Carbon emissions | Partnership for Policy Integrity The study concluded that net carbon emissions from burning biomass in utility-scale facilities emitted more carbon than even coal, and that it would take decades to pay off the carbon debt created by harvesting forests for fuel. Estimating carbon dioxide emissions from coal plants (Of course, on a tonnage basis, higher grade coals do produce more carbon dioxide than lower grade coals.) IPCC. The following carbon dioxide emission factors for stationary combustion in the energy industries are estimated by the IPCC. Lignite: 101,000 kg of carbon dioxide per TJ; Subbituminous coal: 96,100 kg of carbon dioxide per TJ Estimation of NOx emissions from coal-fired utility boilers It targeted on the development and utilization of modern CFD (computational fluid dynamics) based combustion modeling technology to increase efficiency and reduce emissions from coal-fired utility boilers GAS TECHNOLOGY: Boiler NOx Emissions - Plant Engineering In many areas, industrial boiler operators face stricter regulation of NOx emissions, even with the use of clean natural gas. In some areas, operators are required to meet what are called Ultra-Low NOx (ULN) requirements, typically less than 10-12 ppm. It is widely believed that the ULN requirements will be broadened to more areas. In [] Fossil fuel power station - Wikipedia Emissions from the boiler include carbon dioxide, oxides of sulfur, and in the case of coal fly ash from non-combustible substances in the fuel. Waste heat from the condenser is transferred either to the air, or sometimes to a cooling pond, lake or river. Gas turbine and combined gas/steam A Review on Technologies for Reducing CO2 Emission from Figure 2. Stationary sources of CO2 in Australia (AGO, 2006). Continued use of coal to produce electricity makes it very important to undertake a study on coal fired power plants with the aim of reducing the hazardous emissions of CO 2 as well as sulphur oxides (SO x), nitrogen oxides (NO x) and other particulates to help maintain a sustainable environment. Advanced Technologies for the Control of Sulfur Dioxide emissions targets for coal-fired boilers subject to CAAA compliance. Control of SO2 Emissions A major goal of the CCT Program is the demonstration of technologies designed to reduce emissions of sulfur dioxide (SO2) from coal-fired utility boilers. Many U.S. coals have a sufficiently high sulfur con- CO2 Emissions Test for Coal Burner - YouTube Jan 12, 2019· NARJON System - This video shows the test for CO2 and dangerous gasses emissions using coal to fuel the NARJON System. The NRAJON Combustion Chamber (NCC) has been tested to successfully burn : David Narula: 81Estimation of NOx emissions from coal-fired utility boilershttps://· It targeted on the development and utilization of modern CFD (computational fluid dynamics) based combustion modeling technology to increase efficiency and reduce emissions from coal-fired utility boilers Boiler Combustion | CleanBoiler.org The Small Boiler NSPS apply to all new, modified, or reconstructed boilers with inputs between 10-100 MMBtu/hr where construction, modification, or reconstruction commenced after June 9, 1989. The Small Boiler NSPS set emission standards for SOx and particulate matter for boilers firing coal, distillate and residual oil, and wood. Controlling Particulate Emissions From Coal-Fired Boilers Various types of wet scrubbers have been used for years to control paniculate emissions from industrial sources However, significant improvements will be nec- essary before wet scrubbers can be used effectively and economically on tomorrow's coal-fired boilers co emissions of modern biomass boilers steam boilers and it emissions Co2 Measuring Data Of A Coal Boiler boiler exhaust co2 collection co2 emissions credit by using solid fuel boiler Boiler Dengan Bahan Bakar Gas Co2 how cfb boiler reduced emissions boiler exhaust flue gas of co2 percentage How Much Make Co2 From Coal Boiler
cc/2020-05/en_middle_0097.json.gz/line1418603