760 research outputs found

    GLC actors, artificial chemical connectomes, topological issues and knots

    Full text link
    Based on graphic lambda calculus, we propose a program for a new model of asynchronous distributed computing, inspired from Hewitt Actor Model, as well as several investigation paths, concerning how one may graft lambda calculus and knot diagrammatics

    Evaluating Digital Libraries: A Longitudinal and Multifaceted View

    Get PDF
    published or submitted for publicatio

    The Recrudescence of Property Rights as the Foremost Principle of Civil Liberties: The First Decade of the Burger Court

    Get PDF
    The analysis of the donor-acceptor pair luminescence of P-Al and N-Al pairs obtained recently for the cubic 3C polytype of SiC is viewed in some detail. A detailed consideration is given to the fitting procedure applied to the P-Al and N-Al spectra. Fit with theoretical models of spectra of type I and type II are applied to both N-Al and P-Al experimental spectra, and it is demonstrated that only contribution from P on Si site is observable in the presented samples. The accuracy of the obtained phosphorus ionization energy of 48.1 meV is also discussed

    Monsters to Destroy? The Rhetorical Legacy of John Quincy Adams’ July 4th, 1821 Oration

    Get PDF
    This essay examines how the John Quincy Adams’s foreign policy maxim of “we do not go in search of monsters to destroy” has been appropriated in contemporary foreign policy, including the recent 2016 presidential campaign, arguing his aphorism are authorizing words that validate and ratify the positions of pundits, politicians, and policy-makers of not only critics of U.S. foreign policy, but those who defend it. Mapping Quincy Adams’s aphorism allows us to explore the boundaries and direction of America’s role in the world and how it impacts America’s exceptionalist ethos

    The Privatization of the Civil Commitment Process and the State Action Doctrine: Have the Mentally Ill Been Systematically Stripped of Their Fourteenth Amendment Rights?

    Get PDF
    The Supreme Court has recognized that civil commitment constitutes a significant deprivation of liberty that requires due process protection. A state\u27s ability to commit the mentally ill is subject to the due process limitations of the Fourteenth Amendment. However, the circuit courts have held that civil commitment by private physicians to private hospitals does not constitute state action for Fourteenth Amendment purposes. The author proposes that the state action doctrine extend to civil commitment by private physicians, and criticizes federal decisions that have held otherwise

    The Privatization of the Civil Commitment Process and the State Action Doctrine: Have the Mentally Ill Been Systematically Stripped of Their Fourteenth Amendment Rights?

    Get PDF
    The Supreme Court has recognized that civil commitment constitutes a significant deprivation of liberty that requires due process protection. A state\u27s ability to commit the mentally ill is subject to the due process limitations of the Fourteenth Amendment. However, the circuit courts have held that civil commitment by private physicians to private hospitals does not constitute state action for Fourteenth Amendment purposes. The author proposes that the state action doctrine extend to civil commitment by private physicians, and criticizes federal decisions that have held otherwise

    A Right to Read Anonymously: A Closer Look at Copyright Management in Cyberspace

    Get PDF
    It has become commonplace to say that we have entered the age of information. The words conjure up images of a reader’s paradise—an era of limitless access to information resources and unlimited interpersonal communication. In truth, however, the new information age is turning out to be as much an age of information about readers as an age of information for readers. The same technologies that have made vast amounts of information accessible in digital form are enabling information providers to amass an unprecedented wealth of data about who their customers are and what they like to read. In the new age of digitally transmitted information, the simple, formerly anonymous acts of reading, listening, and viewing—scanning an advertisement or a short news item, browsing through an online novel or a collection of video clips—can be made to speak volumes, including, quite possibly, information that the reader would prefer not to share. This Article focuses specifically on digital monitoring of individual reading habits for purposes of so-called “copyright management” in cyberspace, and evaluates the import of this monitoring for traditional notions of freedom of thought and expression. A fundamental assumption underlying our discourse about the activities of reading, thinking, and speech is that individuals in our society are guaranteed the freedom to form their thoughts and opinions in privacy, free from intrusive oversight by governmental or private entities. The new copyright management technologies force us to examine anew the sources and extent of that freedom. Part I of this Article describes the various copyright management technologies that are being developed to enable copyright owners to monitor readers’ activities in cyberspace and the uses they make of reading materials acquired there. Part II provides an overview of proposed federal legislation designed to reinforce copyright owners’ power unilaterally to institute intrusive copyright management systems. Part III considers, and rejects, the possibility that the impending digital copyright management regime constitutes no more than legitimate private ordering regarding the terms and conditions of access to copyrighted works. Part IV discusses the sources and justifications for an individual right to read anonymously, and argues that reading is so intimately connected with speech and freedom of thought that the First Amendment should be understood to guarantee such a right. Part V suggests that proposed federal protection for digital copyright management technologies may be unconstitutional to the extent that it penalizes individuals who seek only to exercise their rights to read anonymously, or to enable others to do so. Finally, Part VI argues that rather than seeking to enshrine a set of practices designed to negate reader anonymity, Congress should, instead, adopt comprehensive legislation designed to shield individual reading habits from scrutiny

    A highly efficient single photon-single quantum dot interface

    Full text link
    Semiconductor quantum dots are a promising system to build a solid state quantum network. A critical step in this area is to build an efficient interface between a stationary quantum bit and a flying one. In this chapter, we show how cavity quantum electrodynamics allows us to efficiently interface a single quantum dot with a propagating electromagnetic field. Beyond the well known Purcell factor, we discuss the various parameters that need to be optimized to build such an interface. We then review our recent progresses in terms of fabrication of bright sources of indistinguishable single photons, where a record brightness of 79% is obtained as well as a high degree of indistinguishability of the emitted photons. Symmetrically, optical nonlinearities at the very few photon level are demonstrated, by sending few photon pulses at a quantum dot-cavity device operating in the strong coupling regime. Perspectives and future challenges are briefly discussed.Comment: to appear as a book chapter in a compilation "Engineering the Atom-Photon Interaction" published by Springer in 2015, edited by A. Predojevic and M. W. Mitchel
    • …
    corecore