To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Georas analyzes different dilemmas that arise when we use robots to serve humans living in the digital age. She focuses on the design and deployment of carebots in particular, to explore how they are embedded in more general multifaceted material and discursive configurations, and how they are implicated in the construction of humanness in socio-technical spaces. In doing so, she delves into the "fog of technology," arguing that this fog is always also a fog of inequality since the emerging architectures of our digitized lives will connect with pre-existing forms of domination. In this context, resistive struggles are premised upon our capacity to dissent, which is what ultimately enables us to express our humanity and at the same time makes us unpredictable. What it means to be human in the digital world is thus never fixed, but, Georas argues, must always be strategically reinvented and reclaimed, since there always will be people living on the “wrong side of the digital train tracks” who will be unjustly treated.
This article proposes the Function–Behavior–Structure–Failure Modes (FBSFMs), a novel ontological framework for an enhanced representation of system knowledge, to address the integration gap between the system models and design risk analysis activities during the early product development phase. As a theoretical contribution, the FBSFM extends the well-established function–behavior–structure ontology for system design information representation in terms of functions, intended behaviors, and structure, with an ontology schema for the representation of the actual behavior as function failure modes, enriched with linkages to causes and effects across multiple levels of system abstraction. This integrated representation improves design risk analysis by facilitating the traceability between design decisions captured in system models and potential failure scenarios documented in Failure Mode and Effects Analyses (FMEAs). The framework was implemented using formal ontology engineering methods and implemented in Web Ontology Language using Protégé. A real-world automotive case study was conducted in collaboration with practicing engineers and domain experts from a global automotive manufacturer, to demonstrate the framework’s applicability and its ability to support structured failure knowledge representation. The case study illustrates the capability of the ontology to consolidate multisource engineering knowledge, specifically design data derived from system modeling and structured risk artifacts from FMEA, into a coherent, machine-readable repository, supporting enhanced traceability from user goals to potential system failures. The use of ontological reasoning and structured querying facilitates the systematic review and validation of FMEA information against system models, with a positive impact on product development practice.
In Chapter1, it was explained how linear approximations can be used to set up key-recovery attacks using Matsui’s Algorithm 1 or 2. This chapter takes a closer look at Algorithm 2 and its improvements. The most important improvement, and the main topic of this chapter, is the “fast Fourier transformation method.”
Millar and Gray argue that mobility shaping is raising a set of unresolved ethical, political, and legal issues that have significant consequences for shaping human experience in the future. By way of analogy, they unpack how these emerging issues in mobility echo those that have been asked in the more familiar context of net neutrality. They then apply some of the ethical and legal reasoning surrounding net neutrality to the newly relevant algorithmically controlled mobility space. They conclude that we can establish and ensure a just set of principles and rules for shaping mobility in ways that promote human flourishing by extending some of the legal and regulatory framework around net neutrality to mobility providers.
Chapter 11 reconstructs the theory of linear cryptanalysis from a more general point of view. To do this, we need to cover some mathematical ground. We first discuss linear algebra over the field of complex numbers, and then turn to the Fourier analysis of functions on a finite Abelian group. Both of these topics play a central role in Chapter 11.
Determining the effectiveness of linear cryptanalysis is an application of statistical theory. In this chapter, we review some basic concepts from statistics and discuss how they are used to estimate the cost of linear attacks, and Matsui’s second algorithm in particular.
Traditionally, linear cryptanalysis exploits linear approximations with atypically high absolute correlation. In this chapter, we discuss instead how linear approximations with correlation zero can be used. This variant of linear cryptanalysis is called zero-correlation linear cryptanalysis.
If more than one good linear approximation is available, then it is natural to try to exploit all of them simultaneously. This is called multiple linear cryptanalysis. The first part of this chapter discusses multiple linear cryptanalysis in general. The second part focuses on the special case with a set of masks that forms a vector space, which is called multidimensional linear cryptanalysis.
Finding linear trails with high absolute correlation quickly becomes tedious work, especially for ciphers with a more complicated structure than the example that we have worked with so far. Since the total number of trails is finite, finding linear trails with a maximal absolute correlation is an example of a combinatorial optimization problem. This chapter discusses three commonly used optimization methods: Matsui’s branch and bound method, mixed-integer linear programming, and satisfiability or satisfiability modulo theories. At the same time, the chapter introduces two additional example ciphers that follow a different design strategy.
Lyon uses the COVID epidemic to think about the instrumentalizing role of surveillance capitalism in digital society. He argues that the tech solutionism proffered by tech companies during the pandemic too often implied that democratic practices and social justice are at least temporarily dispensable for some greater good, with disastrous consequences for human flourishing. As a counterpoint, Lyon uses the notion of an ethics of care as a way to refocus on the importance of articulating the conditions that will enable the humans who live in datafied societies to live meaningful lives. He then offers Eric Stoddart’s notion of the “common gaze” to begin to imagine what those conditions might be. From this perspective, surveillance can be conceptualized as a gaze for the common good with a “preferential optic” focused on the conditions that will alleviate the suffering of the marginalized.
Murakami Wood makes both an empirical and a theoretical contribution by analysing the discourses contained in smart city marketing materials to create a detailed description of the kind of human that smart city developers and promoters envision as smart city residents. The resulting portrait of the “platform human” – a being whose entrepreneurial and libertarian needs are seamlessly enabled by technology built into the lived environment – is informed by a technologically-enabled notion of class, a particular and specific political identity of smart citizens as property-owning, entrepreneurial, and libertarian, and a generic environmental ‘goodness’ associated with smart platforms. The combination of these three elements resonates strongly with transhumanist speciation where humans are imagined as data-driven, surveillant, and robotic.
This paper presents the development of a graph autoencoder architecture capable of performing projection-based model-order reduction (PMOR) using a nonlinear manifold least-squares Petrov–Galerkin (LSPG) projection scheme. The architecture is particularly useful for advection-dominated flows modeled by unstructured meshes, as it provides a robust nonlinear mapping that can be leveraged in a PMOR setting. The presented graph autoencoder is constructed with a two-part process that consists of (1) generating a hierarchy of reduced graphs to emulate the compressive abilities of convolutional neural networks (CNNs) and (2) training a message passing operation at each step in the hierarchy of reduced graphs to emulate the filtering process of a CNN. The resulting framework provides improved flexibility over traditional CNN-based autoencoders because it is readily extendable to unstructured meshes. We provide an analysis of the interpretability of the graph autoencoder’s latent state variables, where we find that the Jacobian of the decoder for the proposed graph autoencoder provides interpretable mode shapes akin to traditional proper orthogonal decomposition modes. To highlight the capabilities of the proposed framework, which is named geometric deep least-squares Petrov–Galerkin (GD-LSPG), we benchmark the method on a one-dimensional Burgers’ model with a structured mesh and demonstrate the flexibility of GD-LSPG by deploying it on two test cases for two-dimensional Euler equations that use an unstructured mesh. The proposed framework is more flexible than using a traditional CNN-based autoencoder and provides considerable improvement in accuracy for very low-dimensional latent spaces in comparison with traditional affine projections.
Central to drawn representations of activism and memory are ideas of embodiment and trace. From DIY protest signs to craftivism, the articulation of protest and memory is connected to the handmade trace of a witnessing individual present in time and place. This is reflected in comics scholarship through the notion of the drawn line conveying subjective experience through the trace of the body.
This article will consider the relationship between witnessing, truth claims, autographic drawing, and memory at a moment when AI image-generation tools have called into question the connection of drawn traces to their origin in time, space, materiality, and the body.
Although a combination of critical AI theory and comics studies, this article will outline ways in which generative AI presents a challenge to these ideas. Through comparison of Joe Sacco’s graphic reportage with recent AI images of conflict and history, the article considers the truth claims of images that are the products of computational and algorithmic processes considered broadly.
Comics scholarship has been slow to critically respond to these new conditions, and the task of disentangling the human/non-human in ontologies of trace is now compounded by generative drawings, which represent the outcome of archival reappropriation defined by opaque algorithmic parameters. This article will explore theoretical assumptions around authenticity and truth claims in analogue, computational, algorithmic, and generative drawing practice and ask what kinds of theory and practice are appropriate if activist graphic memoir is to endure as documents of political memory.