59 research outputs found

    History Simulation for Teaching Early Modern British History

    Get PDF
    This grant will innovate the humanities by means of serious gaming. First, we will continue development of Desperate Fishwives (DF), a cooperative game based on early modern British history. Beyond this first-phase development effort for a single game for history, DF will serve as a prototype for a simplified game development front-end for the humanities. The broader goal, beyond development of one game, is to provide humanities scholars (frequently unacquainted with programming) a tool model that facilitates making games for the humanities, including but not limited to history games, games based in literature, and virtual tours of cultural or historical sites. Our second phase plans are the development of this innovative tool and technology framework, complete with accompanying documentation, for other humanities scholars to create games in their own areas. We will then publicize and make available the tool and documentation for others to use

    Trusted Autonomy

    Get PDF
    We describe how agents are the right building blocks for constructing trustworthy systems. Robust software and trusted autonomy represent the future for agent technology and software engineering

    Extension of a theorem of Cauchy and Jacobi

    Get PDF
    AbstractLet q and p be prime with q = a2 + b2 ≡ 1 (mod 4), a ≡ 1 (mod 4), and p = qf + 1. In the nineteenth century Cauchy (Mém. Inst. France 17 (1840), 249–768) and Jacobi (J. für Math. 30 (1846), 166–182) generalized the work of earlier authors, who had determined certain binomial coefficients (mod p) (see H. J. S. Smith, “Report on the Theory of Numbers,” Chelsea, 1964), by determining two products of factorials given by Πk kf! (mod p = qf + 1) where k runs through the quadratic residues and the quadratic non-residues (mod q), respectively. These determinations are given in terms of parameters in representations of ph or of 4ph by binary quadratic forms. A remarkable feature of these results is the fact that the exponent h coincides with the class number of the related quadratic field. In this paper C. R. Mathews' (Invent. Math. 54 (1979), 23–52) recent explicit evaluation of the quartic Gauss sum is used to determine four products of factorials (mod p = qf + 1, q ≡ 5 (mod 8) > 5), given by Πk kf! where k runs through the quartic residues (mod q) and the three cosets which may be formed with respect to this subgroup. These determinations appear to be considerably more difficult. They are given in terms of parameters in representations of 16ph by quaternary quadratic forms. Stickelberger's theorem is required to determine the exponent h which is shown to be closely related to the class number of the imaginary quartic field Q(i√2q + 2a√q), q = a2 + b2 ≡ 5 (mod 8), a odd

    A Reconfigurable Distributed Computing Fabric Exploiting Multilevel Parallelism

    Get PDF
    This paper presents a novel reconfigurable data flow processing architecture that promises high performance by explicitly targeting both fine- and course-grained parallelism. This architecture is based on multiple FPGAs organized in a scalable direct network that is substantially more interconnectefficient than currently used crossbar technology. In addition, we discuss several ancillary issues and propose solutions required to support this architecture and achieve maximal performance for general-purpose applications; these include supporting IP, mapping techniques, and routing policies that enable greater flexibility for architectural evolution and code portability. 1

    A Reconfigurable Distributed Computing Fabric Exploiting Multilevel Parallelism

    Get PDF
    This paper presents a novel reconfigurable data flow processing architecture that promises high performance by explicitly targeting both fine- and course-grained parallelism. This architecture is based on multiple FPGAs organized in a scalable direct network that is substantially more interconnect-efficient than currently used crossbar technology. In addition, we discuss several ancillary issues and propose solutions required to support this architecture and achieve maximal performance for general-purpose applications; these include supporting IP, mapping techniques, and routing policies that enable greater flexibility for architectural evolution and code portability

    CsA can induce DNA double-strand breaks: implications for BMT regimens particularly for individuals with defective DNA repair

    Get PDF
    Several human disorders mutated in core components of the major DNA double-strand break (DSB) repair pathway, non-homologous end joining (NHEJ), have been described. Cell lines from these patients are characterized by sensitivity to DSB-inducing agents. DNA ligase IV syndrome (LIG4) patients specifically, for unknown reasons, respond particularly badly following treatment for malignancy or BMT. We report the first systematic evaluation of the response of LIG4 syndrome to compounds routinely employed for BMT conditioning. We found human pre-B lymphocytes, a key target population for BMT conditioning, when deficient for DNA ligase IV, unexpectedly exhibit significant sensitivity to CsA the principal prophylaxis for GVHD. Furthermore, we found that CsA treatment alone or in combination with BU and fludarabine resulted in increased levels of DSBs specifically in LIG4 syndrome cells compared to wild-type or Artemis-deficient cells. Our study shows that CsA can induce DSBs and that LIG4 syndrome patient's fail to adequately repair this damage. These DSBs likely arise as a consequence of DNA replication in the presence of CsA. This work has implications for BMT and GVHD management in general and specifically for LIG4 syndrome

    The Chandra Deep Wide-field Survey: A New Chandra Legacy Survey in the Boötes Field. I. X-Ray Point Source Catalog, Number Counts, and Multiwavelength Counterparts

    Get PDF
    We present a new, ambitious survey performed with the Chandra X-ray Observatory of the 9.3 deg2 Boötes field of the NOAO Deep Wide-Field Survey. The wide field probes a statistically representative volume of the universe at high redshift. The Chandra Deep Wide-field Survey exploits the excellent sensitivity and angular resolution of Chandra over a wide area, combining 281 observations spanning 15 yr, for a total exposure time of 3.4 Ms, and detects 6891 X-ray point sources down to limiting fluxes of 4.7 × 10−16, 1.5 × 10−16, and 9 ×10−16 erg cm−2 s−1 in the 0.5–7, 0.5–2, and 2–7 keV bands, respectively. The robustness and reliability of the detection strategy are validated through extensive, state-of-the-art simulations of the whole field. Accurate number counts, in good agreement with previous X-ray surveys, are derived thanks to the uniquely large number of point sources detected, which resolve 65.0% ± 12.8% of the cosmic X-ray background between 0.5 and 2 keV and 81.0% ± 11.5% between 2 and 7 keV. Exploiting the wealth of multiwavelength data available on the field, we assign redshifts to ~94% of the X-ray sources, estimate their obscuration, and derive absorption-corrected luminosities. We provide an electronic catalog containing all of the relevant quantities needed for future investigations

    Integer squares with constant second difference

    Get PDF
    The problem addressed is this: Do there exist nonconsecutive integers n0, n1, n2, . . ., such that the second differences of the squares of the ni are constant? Specifically, can that constant be equal to 2? A complete characterization of sequences of length four can be given. The question of whether or not sequences of length five exist is still open but the existence or nonexistence of such sequences can be described in a more algorithmic way than the simple statement of the problem

    Binary quadratic forms: classical theory and modern computations

    No full text
    corecore