342 research outputs found

    Symmetric hyperbolic monopoles

    Full text link
    Hyperbolic monopole solutions can be obtained from circle-invariant ADHM data if the curvature of hyperbolic space is suitably tuned. Here we give explicit ADHM data corresponding to axial hyperbolic monopoles in a simple, tractable form, as well as expressions for the axial monopole fields. The data is deformed into new 1-parameter families preserving dihedral and twisted-line symmetries. In many cases explicit expressions are presented for their spectral curves and rational maps of both Donaldson and Jarvis type.Comment: 20 pages, 1 figur

    Dynamics of vortices with magnetic impurities

    Get PDF
    We investigate the dynamics of BPS vortices in the presence of magnetic impurities taking the form of axially-symmetric localised lumps and delta-functions. We present numerical results for vortices on flat space, as well as exact results for vortices on hyperbolic space in the presence of delta-function impurities. In fact, delta-function impurities of appropriate strength can be captured within the moduli space approximation by keeping one or more of the vortices fixed. We also show that previous work on vortices on the 2-sphere extends naturally to the inclusion of delta-function impurities

    Aspects of Vortices and Hyperbolic Monopoles

    Get PDF
    This thesis discusses BPS monopoles in hyperbolic space and BPS vortices in the presence of magnetic impurities. We prove explicit formulae for the spectral curve and rational map of a JNR-type hyperbolic monopole, and we use these to study some Platonic examples as well as some new 1-parameter families analogous to Euclidean monopole scattering. Explicit fields and Braam-Austin data for axial hyperbolic monopoles of a particular mass are derived using a correspondence to 1-monopoles, and this data is deformed to give new 1-parameter families. Numerical techniques are used to study the effect of magnetic impurities on vortices on a flat background. Analytic results for vortices with magnetic impurities are found by adapting previous results on vortices on the hyperbolic plane and the 2-sphere

    Why are Some Regions More Innovative than Others? The Role of Firm Size Diversity

    Get PDF
    Large labs may spawn spin-outs caused by innovations deemed unrelated to the firm's overall business. Small labs generate demand for specialized services that lower entry costs for others. We develop a theoretical framework to study the interplay of these two localized externalities and their impact on regional innovation. We examine MSA-level patent data during the period 1975-2000 and find that innovation output is higher where large and small labs coexist. The finding is robust to across-region as well as within-region analysis, IV analysis, and the effect is stronger in certain subsamples consistent with our explanation but not the plausible alternatives.

    A mix of small and large firms can be key to regional innovation

    Get PDF
    Areas such as Silicon Valley and Boston are often held up as examples of innovative regions to be emulated, but what makes them this way? By analysing patent data on computers and communication technology, Ajay K. Agrawal, Iain Cockburn, Alberto Galasso, and Alexander Oettl, argue that the mix of large and small firms in a region is very important to regional innovation. He writes that regions where a number of small and large lists coexist are more productive in terms of innovation, when compared to those that have only a small number of large firms or a large number of small ones

    Revisiting read wear: analysis, design, and evaluation of a footprints scrollbar

    Get PDF
    In this paper, we show that people frequently return to previously-visited regions within their documents, and that scrollbars can be enhanced to ease this task. We analysed 120 days of activity logs from Microsoft Word and Adobe Reader. Our analysis shows that region revisitation is a common activity that can be supported with relatively short recency lists. This establishes an empirical foundation for the design of an enhanced scrollbar containing scrollbar marks that helps people return to previously visited document regions. Two controlled experiments show that scrollbar marks decrease revisitation time, and that a large number of marks can be used effectively. We then design an enhanced Footprints scrollbar that supports revisitation with several features, including scrollbar marks and mark thumbnails. Two further experiments show that the Footprints scrollbar was frequently used and strongly preferred over traditional scrollbars

    Entrances and exits: changing perceptions of primary teaching as a career for men

    Get PDF
    Original article can be found at: http://www.informaworld.com/smpp/title~content=t713640830~db=all Copyright Informa / Taylor and Francis. DOI: 10.1080/03004430802352087The number of men in teaching has always been small, particularly in early childhood, but those that do come into teaching usually do so for the same reasons as women, namely enjoyment of working with children, of wanting to teach and wanting to make a difference to children's lives. However, in two separate studies, the authors have shown that on beginning teacher training in 1998, and at the point of leaving the profession in 2005, men and women tend to emphasise different concerns. This article will explore those differences and seek possible explanations for how men's views of teaching might be changing over time.Peer reviewe

    Finding and Resolving Security Misusability with Misusability Cases

    Get PDF
    Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice- versa. One way of using scenarios to bridge security and usability involves explicitly describing how design deci- sions can lead to users inadvertently exploiting vulnera- bilities to carry out their production tasks. This paper describes how misusability cases, scenarios that describe how design decisions may lead to usability problems sub- sequently leading to system misuse, address this problem. We describe the related work upon which misusability cases are based before presenting the approach, and illus- trating its application using a case study example. Finally, we describe some findings from this approach that further inform the design of usable and secure systems
    corecore