3,551 research outputs found
Three Stories and Their Morals
Fundamentally, the common law tradition is a collection of stories. Stories also become the law professor\u27s stock in trade. We tell students stories or have them read stories in the form of cases or hypothetical situations and help them discern the morals to the stories-i.e., what the stories mean in the context of business or in their business lives? In a sense, that is what the Socratic Method is all about: analyzing stories in the form of cases and discerning their greater meaning. In this paper I will relate three true stories within the context of just-in-time production management and develop their morals or implications for business and business lawyers
Legal History Meets the Honors Program
In this article, the author discusses the Law and Culture course that he developed to teach in the Butler University Honors Program. The course looks at some landmark periods or events in legal history and explores how those events were the product of their culture, and how they affected their culture. Among the events or periods that the author has looked at in iterations of this course were the survival instinct on display in Regina v. Dudley and Stephens, the Nuremberg trials, the Scopes Monkey Trial, the modern American litigation explosion, and the events surrounding the U.S. Supreme Court decision Kelo v. City of New London. A goal of this course is to address the themes using a number of different types of texts, including court decisions, historical documents, novels, essays, research scholarship, and films. The interdisciplinary nature of this course and the interplay of fiction, nonfiction, and film have caused students to appreciate the importance of law and its development and the interplay of law and culture. They also develop insights on the influence of law and culture on their daily lives
Enabling Data-Driven Transportation Safety Improvements in Rural Alaska
Safety improvements require funding. A clear need must be demonstrated to secure funding. For transportation safety, data, especially data about past crashes, is the usual method of demonstrating need. However, in rural locations, such data is often not available, or is not in a form amenable to use in funding applications. This research aids rural entities, often federally recognized tribes and small villages acquire data needed for funding applications. Two aspects of work product are the development of a traffic counting application for an iPad or similar device, and a review of the data requirements of the major transportation funding agencies. The traffic-counting app, UAF Traffic, demonstrated its ability to count traffic and turning movements for cars and trucks, as well as ATVs, snow machines, pedestrians, bicycles, and dog sleds. The review of the major agencies demonstrated that all the likely funders would accept qualitative data and Road Safety Audits. However, quantitative data, if it was available, was helpful
A de Finetti representation for finite symmetric quantum states
Consider a symmetric quantum state on an n-fold product space, that is, the
state is invariant under permutations of the n subsystems. We show that,
conditioned on the outcomes of an informationally complete measurement applied
to a number of subsystems, the state in the remaining subsystems is close to
having product form. This immediately generalizes the so-called de Finetti
representation to the case of finite symmetric quantum states.Comment: 22 pages, LaTe
The Nature and Location of Quantum Information
Quantum information is defined by applying the concepts of ordinary (Shannon)
information theory to a quantum sample space consisting of a single framework
or consistent family. A classical analogy for a spin-half particle and other
arguments show that the infinite amount of information needed to specify a
precise vector in its Hilbert space is not a measure of the information carried
by a quantum entity with a -dimensional Hilbert space; the latter is,
instead, bounded by log d bits (1 bit per qubit). The two bits of information
transmitted in dense coding are located not in one but in the correlation
between two qubits, consistent with this bound. A quantum channel can be
thought of as a "structure" or collection of frameworks, and the physical
location of the information in the individual frameworks can be used to
identify the location of the channel. Analysis of a quantum circuit used as a
model of teleportation shows that the location of the channel depends upon
which structure is employed; for ordinary teleportation it is not (contrary to
Deutsch and Hayden) present in the two bits resulting from the Bell-basis
measurement, but in correlations of these with a distant qubit. In neither
teleportation nor dense coding does information travel backwards in time, nor
is it transmitted by nonlocal (superluminal) influences. It is (tentatively)
proposed that all aspects of quantum information can in principle be understood
in terms of the (basically classical) behavior of information in a particular
framework, along with the framework dependence of this information.Comment: Latex 29 pages, uses PSTricks for figure
The Federal Trademark Dilution Act of 1995: Potent Weapon or Uphill Battle?
Following a brief discussion of the history of trademark infringement law, the events leading to the FTDA, and an overview of the FTDA, this paper discusses the major causes of the FTDA\u27s ineffectiveness. We will then review the application of the act, discuss its implications on the future of trademark ownership in business, and suggest improvements to the legal application of the act
Two qubit copying machine for economical quantum eavesdropping
We study the mapping which occurs when a single qubit in an arbitrary state
interacts with another qubit in a given, fixed state resulting in some unitary
transformation on the two qubit system which, in effect, makes two copies of
the first qubit. The general problem of the quality of the resulting copies is
discussed using a special representation, a generalization of the usual Schmidt
decomposition, of an arbitrary two-dimensional subspace of a tensor product of
two 2-dimensional Hilbert spaces. We exhibit quantum circuits which can
reproduce the results of any two qubit copying machine of this type. A simple
stochastic generalization (using a ``classical'' random signal) of the copying
machine is also considered. These copying machines provide simple embodiments
of previously proposed optimal eavesdropping schemes for the BB84 and B92
quantum cryptography protocols.Comment: Minor changes. 26 pages RevTex including 7 PS figure
The Effect of Lifting the Blindfold From Civil Juries Charged with Apportioning Damages in Modified Comparative Fault Cases: An Empirical Study of the Alternatives
Focuses on a study on the effect of lifting the blindfold from civil juries charged with apportioning damages in modified comparative fault cases. Historical background on comparative fault in the United States; Origin of blindfolding; Comparison of blindfold modified comparative fault verdicts with sunshine verdicts; Conclusions
- …