61 research outputs found

    The Main Belt Comets and ice in the Solar System

    Get PDF
    We review the evidence for buried ice in the asteroid belt; specifically the questions around the so-called Main Belt Comets (MBCs). We summarise the evidence for water throughout the Solar System, and describe the various methods for detecting it, including remote sensing from ultraviolet to radio wavelengths. We review progress in the first decade of study of MBCs, including observations, modelling of ice survival, and discussion on their origins. We then look at which methods will likely be most effective for further progress, including the key challenge of direct detection of (escaping) water in these bodies

    A survey of training and practice patterns of massage therapists in two US states

    Get PDF
    BACKGROUND: Despite the growing popularity of therapeutic massage in the US, little is known about the training or practice characteristics of massage therapists. The objective of this study was to describe these characteristics. METHODS: As part of a study of random samples of complementary and alternative medicine (CAM) practitioners, we interviewed 226 massage therapists licensed in Connecticut and Washington state by telephone in 1998 and 1999 (85% of those contacted) and then asked a sample of them to record information on 20 consecutive visits to their practices (total of 2005 consecutive visits). RESULTS: Most massage therapists were women (85%), white (95%), and had completed some continuing education training (79% in Connecticut and 52% in Washington). They treated a limited number of conditions, most commonly musculoskeletal (59% and 63%) (especially back, neck, and shoulder problems), wellness care (20% and 19%), and psychological complaints (9% and 6%) (especially anxiety and depression). Practitioners commonly used one or more assessment techniques (67% and 74%) and gave a massage emphasizing Swedish (81% and 77%), deep tissue (63% and 65%), and trigger/pressure point techniques (52% and 46%). Self-care recommendations, including increasing water intake, body awareness, and specific forms of movement, were made as part of more than 80% of visits. Although most patients self-referred to massage, more than one-quarter were receiving concomitant care for the same problem from a physician. Massage therapists rarely communicated with these physicians. CONCLUSION: This study provides new information about licensed massage therapists that should be useful to physicians and other healthcare providers interested in learning about massage therapy in order to advise their patients about this popular CAM therapy

    SoK: Layer-Two Blockchain Protocols

    Get PDF
    Blockchains have the potential to revolutionize markets and services. However, they currently exhibit high latencies and fail to handle transaction loads comparable to those managed by traditional financial systems. Layer-two protocols, built on top of layer-one blockchains, avoid disseminating every transaction to the whole network by exchanging authenticated transactions off-chain. Instead, they utilize the expensive and low-rate blockchain only as a recourse for disputes. The promise of layer-two protocols is to complete off-chain transactions in sub-seconds rather than minutes or hours while retaining asset security, reducing fees and allowing blockchains to scale. We systematize the evolution of layer-two protocols over the period from the inception of cryptocurrencies in 2009 until today, structuring the multifaceted body of research on layer-two transactions. Categorizing the research into payment and state channels, commit-chains and protocols for refereed delegation, we provide a comparison of the protocols and their properties. We provide a systematization of the associated synchronization and routing protocols along with their privacy and security aspects. This Systematization of Knowledge (SoK) clears the layer-two fog, highlights the potential of layer-two solutions and identifies their unsolved challenges, indicating propitious avenues of future work

    Memory Efficient Algorithms for the Verification of Temporal Properties

    Full text link
    This paper addresses the problem of designing memory-efficient algorithms for the verification of temporal properties of finite-state programs. Both the programs and their desired temporal properties are modeled as automata on infinite words (Büchi automata). Verification is then reduced to checking the emptiness of the automaton resulting from the product of the program and the property. This problem is usually solved by computing the strongly connected components of the graph representing the product automaton. Here, we present algorithms which solve the emptiness problem without explicitly constructing the strongly connected components of the product graph. By allowing the algorithms to err with some probability, we can implement them with a randomly accessed memory of size O(n) bits, where n is the number of states of the graph, instead of O(n log n) bits that the presently known algorithms require
    corecore