Low literacy and schooling rates are a significant factor among adults in the recent migration towards Europe. Furthermore, migrants experience social marginalisation and spatial segregation in the new countries and, hence, they are low-exposed to the target language. Research on interlanguages development in such sociolinguistic contexts is still peripheral. Within the little existing research, there is consensus that adult learners with none/limited literacy acquire L2 linguistic competence more slowly compared with educated adults, but there are divided views on the relationship between L1(s) literacy and L2 acquisition (Tarone et al. 2009; Vainikka et al. 2017; Young-Scholten and Strom 2006). Slow acquisition, in fact, may result from limited literacy or from other factors deriving from literacy, e.g. low exposure to the target language and no access to written texts. Whether and how these sociolinguistic variables influence L2 acquisition (and, if so, what their respective impact is) still need to be verified. Against this background, a longitudinal study was carried out at the University of Palermo, Italy, in 2017-2019, involving 20 adult migrants from sub-Saharan Africa and Bangladesh. Half of them had little/no literacy prior to arrival. The data collected over 13 months, through interviews and narrative tasks, were analysed from a functionalist perspective inspired by the basic variety model (Klein and Perdue 1997; Giacalone Ramat 2003). Data analysis, focused on the acquisition of L2 tense, aspect and modality, brought to light a general low development of the participants’ interlanguages, which barely reach the early stages of the post-basic continuum. This results from the common scenario of very low exposure to the target language, while learners’ degree of literacy does not appear to play a role, as literate and low/non-literate learners follow the same path of morphosyntax acquisition. However, literacy acts in a subtler way, favouring the development of specific morphosyntactic sub-patterns. This involves the analytical phase that precedes the morphological encoding of verbal categories in the transition from basic to post-basic varieties. At this stage, grammatical and lexical information are encoded separately, possibly by means of non-target constructions in which they are distributed among the diverse constituents (Benazzo 2003; Benazzo and Starren 2007; Starren 2001). Some of these have already been described for L2 Italian, e.g. auxiliary constructions (non è:be.3SG credere:INF ‘he does not believe’, Bernini 2003). Others have escaped the attention of specialists, e.g. the light verb construction (fare:INF mangiare:INF ‘I eat’). Non-target constructions are temporary grammaticalisation strategies to cover the functional space of forms (bound morphemes) not yet acquired. Non-target constructions especially occur in learners with limited literacy, while literate learners use them in a more sporadic and transient way. This can be interpreted as an effect of reduced exposure to the input as a consequence of limited literacy. As learners with limited literacy are exposed exclusively to oral input, they struggle in identifying bound morphemes in the input, due to the low salience, redundancy and frequent reduction phenomena these formatives undergo in spontaneous speech. This leads them to favour and maintain “heavier” constructions, made of material more easily perceived in the input.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::00da615f68752d63a0cbeaea0dad4323&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::00da615f68752d63a0cbeaea0dad4323&type=result"></script>');
-->
</script>
Predictive analysis allows next-generation cyber defense that is more proactive than current approaches based solely on intrusion detection. In this talk, we will discuss various approaches to predicting and projecting cyber attacks. Graph-based models are dominating the field since the foundation of this research area. Attack graphs were used to traverse through the attacker’s actions and project the continuation of an ongoing attack. Later, attack graphs were combined with Bayesian networks and Markov models to reflect the probabilistic nature of predictions and overcome uncertainties in observation of attack steps. However, there are still open issues, such as how to create such models and evaluate the predictions. The talk will shed light on using graphs in this research area and summarize resolved and open issues.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::261f42a8cccda003a8507c7768f4a5bf&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::261f42a8cccda003a8507c7768f4a5bf&type=result"></script>');
-->
</script>
In this presentation, we introduce a new approach to analyzing network traffic data using associations. In the beginning, we discuss the benefits and issues of currently used analysis tools. Next, we propose a new data representation model and utilization of a graph database to store such data. In the main part of the presentation, we introduce the Granef toolkit and its use for incident investigation.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::99defff89949ebba80a7ab9ac767a005&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::99defff89949ebba80a7ab9ac767a005&type=result"></script>');
-->
</script>
The talk discusses syncretism between gen.sg and nom.pl. I propose that the key is to model the relationship between the use of genitives in pseudo-partitives and counting constructions. Evidence is provided by discussing Finnish, Russian and also adjectival agreement in Bulgarian.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::05c9b13e797127b4bea97c69e16b101d&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::05c9b13e797127b4bea97c69e16b101d&type=result"></script>');
-->
</script>
This manual is intended for implementers (research agencies, academic institutions), commissioners (public institutions, companies, NGOs, media, academic institutions) and users (all of the above, including other entities working with data) of questionnaire surveys. To meet the needs of these groups of readers, the manual presents information for a) implementing mixed-mode, b) considering it when commissioning data collection, and c) reflecting on data generation when analysing and processing the results. The individual chapters build on each other rather loosely and can therefore be read selectively according to current needs. Tento manuál je určen pro realizátory (výzkumné agentury, akademická pracoviště), zadavatele (veřejné instituce, firmy, neziskové organizace, média, akademická pracoviště) i uživatele (všichni výše zmínění včetně dalších subjektů pracujících s daty) dotazníkových šetření. Pro potřeby těchto skupin čtenářů manuál představuje informace pro a) realizaci smíšeného módu, b) jeho zvážení při zadávání sběru dat a c) reflektování vzniku dat při analýze a zpracování výsledků. Jednotlivé kapitoly na sebe navazují spíše volně a je tedy možné číst je selektivně dle aktuálních potřeb.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::d9c639730479440858bd2fde98a1fff2&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::d9c639730479440858bd2fde98a1fff2&type=result"></script>');
-->
</script>
Even though network traffic is typically encrypted, and it is almost impossible to look into the content of transmitted data, the analysis of metadata and characteristics of individual connections still plays an essential role in an incident or criminal investigation. In recent years, we have seen a significant development of various approaches for storing and analyz-ing large-scale data, including graph databases. Such an approach offers great potential for expert analysts performing digital forensics and network traffic investigation, as it corresponds to their natural perception of the data. In addition, it allows a simple connection of different types and sources of data, which represents the primary focus of our research.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::2fb04d96b79c67bfa046a3a46629f6e1&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::2fb04d96b79c67bfa046a3a46629f6e1&type=result"></script>');
-->
</script>
In the languages of the world, there appears to be a bi-furcation among languages depending on whether numerals combine with a noun in the singular (e.g., Turkish, Estonian) or plural (e.g., English, Czech). A relatively common approach is to explain this variation by invoking “semantic parameters.” The idea is that the singular (or plural) in a language of the first type does not mean the same thing as in a language of the other type. In this talk, I will suggest an alternative way of thinking about the data. I will give reasons to think that the a noun after numerals has a special grammatical number that should not be unified with the singular or the plural denotation. When the counted noun looks the same as one of these, this is because the special “counting” number is morphologically realized the same as singular or plural (classical syncretism). The evidence for this claim will be drawn from a variety of languages including Serbian, Bulgarian, Ossetic, Saami.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::bcf6b70c80ae7d231aea1ac0048edfd0&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::bcf6b70c80ae7d231aea1ac0048edfd0&type=result"></script>');
-->
</script>
The talk discusses the morphology of demonstrative concord in Russian. An explanation is provided within the Nanosyntax model of spellout.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::77986881f5f8383de17ff5c3c542d0b9&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::77986881f5f8383de17ff5c3c542d0b9&type=result"></script>');
-->
</script>
The lecture introduces two milestones of new media art history in Brno, Czech Republic. It will start with one of the very first exhibitions of computer art worldwide which took place in the Brno House of Arts in 1968. This little-known exhibition will be described both from the historiographical perspective, and from the point of view of it reconstruction using fully immersive virtual reality system (2017, 2018). The second milestone to be introduced is an opening of Vašulka Kitchen Brno – Center of New Media Art (2018) dedicated to the work and legacy of pioneers of video art: Brno native Woody Vašulka and his wife Steina. Beside information about the center and its mission, the research project using machine learning to deal with content of the archive, and to test potential of these new tools for research, and mediation of the Vasulkas work and poetics to the contemporary audience will be discussed. Vašulka Kitchen Brno www.vasulkakitchen.org Přednáška představuje dva milníky historie nových médií v Brně. Začne s jednou z prvních výstav počítačového umění na světě, která se uskutečnila v Brně v roce 1968. Tato málo známá výstava bude popsána jak z historiografického hlediska, tak i z hlediska její rekonstrukce s využitím systému virtuální reality (2017, 2018). Dále bude představeno slavnostní otevření Vašulka Kitchen Brno - Centrum umění nových médií (2018), které je věnováno práci a odkazu průkopníků videoartu: brněnského rodáka Woody Vašulky a jeho manželky Steina. Kromě informací o centru a jeho poslání bude diskutován výzkumný projekt využívající strojové učení k řešení obsahu archivu a testování potenciálu těchto nových nástrojů pro výzkum a zprostředkování Vašulkovy práce a poetiky současnému publiku. Vašulka Kitchen Brno www.vasulkakitchen.org
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::15d0e68387c1e8928e64de1fc2941ea4&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::15d0e68387c1e8928e64de1fc2941ea4&type=result"></script>');
-->
</script>
handle: 11012/196458
In autumn 2019, the Czech Republic celebrated the 30th anniversary of the 1989 Velvet Revolution, which ended four decades of communist rule in the former Czechoslovakia. New freedoms have made it easier for LGBTQ people to live their lives more openly in this Central European country, yet they still face significant challenges. Established in 2014, the Society for Queer Memory is the first Czech queer archives and museum. It now holds more than 1,000 objects. Art historian Ladislav Zikmund-Lender will discuss the work of the organization, providing insight into how the history of queer lives and experiences is being documented and presented in the Czech Republic. His talk will compare and contrast the ways that the path to queer emancipation in Central Europe has been distinct from the United States.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=11012/196458&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=11012/196458&type=result"></script>');
-->
</script>
Low literacy and schooling rates are a significant factor among adults in the recent migration towards Europe. Furthermore, migrants experience social marginalisation and spatial segregation in the new countries and, hence, they are low-exposed to the target language. Research on interlanguages development in such sociolinguistic contexts is still peripheral. Within the little existing research, there is consensus that adult learners with none/limited literacy acquire L2 linguistic competence more slowly compared with educated adults, but there are divided views on the relationship between L1(s) literacy and L2 acquisition (Tarone et al. 2009; Vainikka et al. 2017; Young-Scholten and Strom 2006). Slow acquisition, in fact, may result from limited literacy or from other factors deriving from literacy, e.g. low exposure to the target language and no access to written texts. Whether and how these sociolinguistic variables influence L2 acquisition (and, if so, what their respective impact is) still need to be verified. Against this background, a longitudinal study was carried out at the University of Palermo, Italy, in 2017-2019, involving 20 adult migrants from sub-Saharan Africa and Bangladesh. Half of them had little/no literacy prior to arrival. The data collected over 13 months, through interviews and narrative tasks, were analysed from a functionalist perspective inspired by the basic variety model (Klein and Perdue 1997; Giacalone Ramat 2003). Data analysis, focused on the acquisition of L2 tense, aspect and modality, brought to light a general low development of the participants’ interlanguages, which barely reach the early stages of the post-basic continuum. This results from the common scenario of very low exposure to the target language, while learners’ degree of literacy does not appear to play a role, as literate and low/non-literate learners follow the same path of morphosyntax acquisition. However, literacy acts in a subtler way, favouring the development of specific morphosyntactic sub-patterns. This involves the analytical phase that precedes the morphological encoding of verbal categories in the transition from basic to post-basic varieties. At this stage, grammatical and lexical information are encoded separately, possibly by means of non-target constructions in which they are distributed among the diverse constituents (Benazzo 2003; Benazzo and Starren 2007; Starren 2001). Some of these have already been described for L2 Italian, e.g. auxiliary constructions (non è:be.3SG credere:INF ‘he does not believe’, Bernini 2003). Others have escaped the attention of specialists, e.g. the light verb construction (fare:INF mangiare:INF ‘I eat’). Non-target constructions are temporary grammaticalisation strategies to cover the functional space of forms (bound morphemes) not yet acquired. Non-target constructions especially occur in learners with limited literacy, while literate learners use them in a more sporadic and transient way. This can be interpreted as an effect of reduced exposure to the input as a consequence of limited literacy. As learners with limited literacy are exposed exclusively to oral input, they struggle in identifying bound morphemes in the input, due to the low salience, redundancy and frequent reduction phenomena these formatives undergo in spontaneous speech. This leads them to favour and maintain “heavier” constructions, made of material more easily perceived in the input.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::00da615f68752d63a0cbeaea0dad4323&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::00da615f68752d63a0cbeaea0dad4323&type=result"></script>');
-->
</script>
Predictive analysis allows next-generation cyber defense that is more proactive than current approaches based solely on intrusion detection. In this talk, we will discuss various approaches to predicting and projecting cyber attacks. Graph-based models are dominating the field since the foundation of this research area. Attack graphs were used to traverse through the attacker’s actions and project the continuation of an ongoing attack. Later, attack graphs were combined with Bayesian networks and Markov models to reflect the probabilistic nature of predictions and overcome uncertainties in observation of attack steps. However, there are still open issues, such as how to create such models and evaluate the predictions. The talk will shed light on using graphs in this research area and summarize resolved and open issues.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::261f42a8cccda003a8507c7768f4a5bf&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::261f42a8cccda003a8507c7768f4a5bf&type=result"></script>');
-->
</script>
In this presentation, we introduce a new approach to analyzing network traffic data using associations. In the beginning, we discuss the benefits and issues of currently used analysis tools. Next, we propose a new data representation model and utilization of a graph database to store such data. In the main part of the presentation, we introduce the Granef toolkit and its use for incident investigation.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::99defff89949ebba80a7ab9ac767a005&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::99defff89949ebba80a7ab9ac767a005&type=result"></script>');
-->
</script>
The talk discusses syncretism between gen.sg and nom.pl. I propose that the key is to model the relationship between the use of genitives in pseudo-partitives and counting constructions. Evidence is provided by discussing Finnish, Russian and also adjectival agreement in Bulgarian.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::05c9b13e797127b4bea97c69e16b101d&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::05c9b13e797127b4bea97c69e16b101d&type=result"></script>');
-->
</script>
This manual is intended for implementers (research agencies, academic institutions), commissioners (public institutions, companies, NGOs, media, academic institutions) and users (all of the above, including other entities working with data) of questionnaire surveys. To meet the needs of these groups of readers, the manual presents information for a) implementing mixed-mode, b) considering it when commissioning data collection, and c) reflecting on data generation when analysing and processing the results. The individual chapters build on each other rather loosely and can therefore be read selectively according to current needs. Tento manuál je určen pro realizátory (výzkumné agentury, akademická pracoviště), zadavatele (veřejné instituce, firmy, neziskové organizace, média, akademická pracoviště) i uživatele (všichni výše zmínění včetně dalších subjektů pracujících s daty) dotazníkových šetření. Pro potřeby těchto skupin čtenářů manuál představuje informace pro a) realizaci smíšeného módu, b) jeho zvážení při zadávání sběru dat a c) reflektování vzniku dat při analýze a zpracování výsledků. Jednotlivé kapitoly na sebe navazují spíše volně a je tedy možné číst je selektivně dle aktuálních potřeb.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::d9c639730479440858bd2fde98a1fff2&type=result"></script>');
-->
</script>
citations | 0 | |
popularity | Average | |
influence | Average | |
impulse | Average |
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=od______3253::d9c639730479440858bd2fde98a1fff2&type=result"></script>');
-->
</script>
Even though network traffic is typically encrypted, and it is almost impossible to look into the content of transmitted data, the analysis of metadata and characteristics of individual connections still plays an essential role in an incident or criminal investigation. In recent years, we have seen a significant development of various approaches for storing and analyz-ing large-scale data, including graph databases. Such an approach offers great potential for expert analysts performing digital forensics and network traffic investigation, as it corresponds to their natural perception of the data. In addition, it allows a simple connection of different types and sources of data, which represents the primary focus of our research.