8,595 research outputs found

    Effects of beaver (Castor canadensis) on the nutrient dynamics of the Southern Beech forest of Tierra del Fuego (Argentina)

    Get PDF
    Las alteraciones provocadas por las actividades del castor (Castor canadensis) resultan un ejemplo claro de cómo los animales influencian el ecosistema forestal. Los castores modifican la morfología e hidrología de las cursos de agua por la remoción de árboles, construcción de diques y retención de sedimento y materia orgánica en la cuenca. Nosotros estudiamos el efecto de los endicamientos producidos por el castor sobre la dinámica de nutrientes del bosque de Nothofagus de Tierra del Fuego (Argentina) comparando sedimentos y agua de estanques de sitios alterados por castor y no alterados (controles) durante un periodo de 3 años. Las concentraciones de carbono, nitrógeno orgánico e inorgánico (N--nitrato y N--nitrito) y fósforo fueron significativamente mayores en los sedimentos de sitios alterados. Tambien las concentraciones de nitratos y nitritos fueron significativamente más altas en aguas de estanques de castor.Alterations induced by beaver (Castor canadensis) provide a striking example of how the animals influence forest ecosystems. Beavers modify stream morphology and hydrology by removing trees, building dams and retaining sediment and organic material in the stream channel. We studied the effect of beaver impoundments on nutrient dynamics of the native forest (Nothofagus sp.) of Isla Grande of Tierra del Fuego (Argentina), by comparing sediments and pond waters of beaver altered and unaltered sites (controls) over a 3 year period. Concentration of organic carbon, nitrogen, phosphorous, and inorganic nitrogen (nitrate --N and nitrite--N) were significantly greater in sediments of beaver sites. Also nitrites and nitrates were higher in beaver pond waters

    A compactness theorem for scalar-flat metrics on manifolds with boundary

    Full text link
    Let (M,g) be a compact Riemannian manifold with boundary. This paper is concerned with the set of scalar-flat metrics which are in the conformal class of g and have the boundary as a constant mean curvature hypersurface. We prove that this set is compact for dimensions greater than or equal to 7 under the generic condition that the trace-free 2nd fundamental form of the boundary is nonzero everywhere.Comment: 49 pages. Final version, to appear in Calc. Var. Partial Differential Equation

    "We live from mother nature":neoliberal globalization, commodification, the 'war on drugs', and biodiversity in Colombia since the 1990s

    Get PDF
    This article explores how macroeconomic and environmental policies instituted since the 1990s have altered meanings, imaginaries, and the human relationship to nature in Colombia. The Colombian nation-state is pluri-ethnic, multilingual, and megabiodiverse. In this context, indigenous peoples, Afro-Colombians, and some peasant communities survive hybridization of their cultures. They have developed their own ways of seeing, understanding, and empowering the world over centuries of European rule. However, threats to relatively discrete cultural meanings have increased since major changes in the 1990s, when Colombia experienced the emergence of new and modern interpretations of nature, such as “biodiversity,” and a deepening of globalized neoliberal economic and political management. These policies involve a modern logic of being in the world, the establishment of particular regulatory functions for economies, societies, and the environment, and their spread has been facilitated by webs of political and economic power. We trace their local effects with reference to three indigenous groups

    Soil carbon and nitrogen stocks in traditional agricultural and agroforestry systems in the semiarid region of Brazil.

    Get PDF
    Abstract: In the semiarid region of Brazil, inadequate management of cropping systems and low plant biomass production can contribute to reduce soil carbon (C) and nitrogen (N) stocks; therefore, management systems that preserve C and N must be adopted. This study aimed to evaluate the changes in soil C and N stocks that were promoted by agroforestry (agrosilvopastoral and silvopastoral) and traditional agricultural systems (slash-and-burn clearing and cultivation for two and three years) and to compare these systems with the natural Caatinga vegetation after 13 years of cultivation. The experiment was carried out on a typical Ortic Chromic Luvisol in the municipality of Sobral, Ceará, Brazil. Soil samples were collected (layers 0-6, 6-12, 12-20, 20-40 and 40-60 cm) with four replications. The plain, convex and concave landforms in each study situation were analyzed, and the total organic C, total N and densities of the soil samples were assessed. The silvopastoral system promoted the greatest long-term reductions in C and N stocks, while the grosilvopastoral system promoted the smallest losses and therefore represents a sustainable alternative for soil C and N sequestration in these semiarid conditions. The traditional agricultural system produced reductions of 58.87 and 9.57 Mg ha-1 in the organic C and total N stocks, respectively, which suggests that this system is inadequate for these semiarid conditions. The organic C stocks were largest in the concave landform in the agrosilvopastoral system and in the plain landform in the silvopastoral system, while the total N values were highest in the concave landform in the native, agrosilvopastoral and silvopastoral systems. [Estoques de carbono e nitrogênio do solo em sistemas agrícolas tradicional e agroflorestais no semiárido brasileiro]. Na região semiárida, o manejo inadequado dos sistemas de cultivo, aliado à baixa produção de fitomassa, pode contribuir para reduzir os estoques de carbono (C) e nitrogênio (N) do solo; portanto, a adoção de sistemas de manejo para a preservação desses elementos é necessária. Objetivou-se avaliar as alterações promovidas nos estoques de C e N do solo por sistemas agrícolas agroflorestais (agrossilvipastoril e silvipastoril) e tradicional (com derrubada da vegetação, queima e cultivo por dois-três anos), confrontando-os à vegetação natural de Caatinga, após 13 anos, em experimento instalado em um Luvissolo Crômico órtico típico, no município de Sobral, Ceará. Amostras de solo foram coletadas nas profundidades de 0-6, 6-12, 12-20, 20-40 e 40-60 cm, em quatro repetições, considerando os relevos plano, convexo e côncavo em cada situação de estudo, sendo determinados o C orgânico total, o N total e as densidades do solo. Entre os sistemas agroflorestais estudados, o silvipastoril, em longo prazo, promoveu as maiores reduções nos estoques de C e N, enquanto o agrossilvipastoril as menores perdas, representando alternativa sustentável para o sequestro de C e N do solo nessas condições semiáridas. O sistema de cultivo tradicional apresentou reduções de 58,87 e 9,57 Mg ha-1 dos estoques de C orgânico e N total, respectivamente, indicando sua não adequação para as condições semiáridas brasileiras. Os relevos côncavo, no sistema agrossilvipastoril, e plano, no silvipastoril, apresentaram os maiores estoques de C orgânico, enquanto para o N total, a forma côncava apresentou os maiores valores na vegetação nativa, agrossilvipastoril e silvipastoril

    Wild felid species richness affected by a corridor in the Lacandona forest, Mexico

    Get PDF
    Los efectos de la presencia de un corredor en la selva Lacandona, en México, en la riqueza de especies de félidos silvestres Los félidos silvestres se encuentran entre las especies más vulnerables ante la pérdida de hábitat causada por la fragmentación de los ecosistemas. Se analizó el efecto de la presencia de un corredor estructural, definido como una franja de vegetación que conecta dos fragmentos de hábitat, en la riqueza y ocupación de félidos en tres sitios de Marqués de Comillas, en Chiapas: uno comprende dos fragmentos de bosque aislados, otro presenta un corredor estructural y el último se encuentra dentro de la reserva de la biosfera Montes Azules. Se encontraron cuatro especies en el interior de la Reserva, cinco en el corredor estructural y únicamente dos (L. pardalis y H. yagouaroundi) en los fragmentos de bosque aislados. La presencia del corredor no afectó de forma significativa a la ocupación, pero debido a la baja tasa de detección, se necesita seguir investigando para descartar diferencias. Nuestros resultados resaltan la necesidad de manejar la conectividad del hábitat en los bosques remanentes para lograr la conservación de la comunidad de félidos en Marqués de Comillas, en Chiapas, México.Los efectos de la presencia de un corredor en la selva Lacandona, en México, en la riqueza de especies de félidos silvestres Los félidos silvestres se encuentran entre las especies más vulnerables ante la pérdida de hábitat causada por la fragmentación de los ecosistemas. Se analizó el efecto de la presencia de un corredor estructural, definido como una franja de vegetación que conecta dos fragmentos de hábitat, en la riqueza y ocupación de félidos en tres sitios de Marqués de Comillas, en Chiapas: uno comprende dos fragmentos de bosque aislados, otro presenta un corredor estructural y el último se encuentra dentro de la reserva de la biosfera Montes Azules. Se encontraron cuatro especies en el interior de la Reserva, cinco en el corredor estructural y únicamente dos (L. pardalis y H. yagouaroundi) en los fragmentos de bosque aislados. La presencia del corredor no afectó de forma significativa a la ocupación, pero debido a la baja tasa de detección, se necesita seguir investigando para descartar diferencias. Nuestros resultados resaltan la necesidad de manejar la conectividad del hábitat en los bosques remanentes para lograr la conservación de la comunidad de félidos en Marqués de Comillas, en Chiapas, México.Wild felids are one of the most vulnerable species due to habitat loss caused by fragmentation of ecosystems. We analyzed the effect of a structural corridor, defined as a strip of vegetation connecting two habitat patches, on the richness and habitat occupancy of felids on three sites in Marqués de Comillas, Chiapas, one with two isolated forest patches, the second with a structural corridor, and the third inside the Montes Azules Biosphere Reserve. We found only two species (L. pardalis and H. yagouaroundi) in the isolated forest patches, five species in the structural corridor, and four species inside the Reserve. The corridor did not significantly affect occupancy, but due to the low detection rates, further investigation is needed to rule out differences. Our results highlight the need to manage habitat connectivity in the remaining forests in order to preserve the felid community of Marqués de Comillas, Chiapas, México

    Sharp constants in weighted trace inequalities on Riemannian manifolds

    Full text link
    We establish some sharp weighted trace inequalities W^{1,2}(\rho^{1-2\sigma}, M)\hookrightarrow L^{\frac{2n}{n-2\sigma}}(\pa M) on n+1n+1 dimensional compact smooth manifolds with smooth boundaries, where ρ\rho is a defining function of MM and σ(0,1)\sigma\in (0,1). This is stimulated by some recent work on fractional (conformal) Laplacians and related problems in conformal geometry, and also motivated by a conjecture of Aubin.Comment: 34 page

    Protocol analysis modulo combination of theories: A case study in Maude-NPA

    Full text link
    There is a growing interest in formal methods and tools to analyze cryptographic protocols modulo algebraic properties of their underlying cryptographic functions. It is well-known that an intruder who uses algebraic equivalences of such functions can mount attacks that would be impossible if the cryptographic functions did not satisfy such equivalences. In practice, however, protocols use a collection of well-known functions, whose algebraic properties can naturally be grouped together as a union of theories E 1... ¿ n. Reasoning symbolically modulo the algebraic properties E 1... ¿ n requires performing (E 1... ¿ n)-unification. However, even if a unification algorithm for each individual E i is available, this requires combining the existing algorithms by methods that are highly non-deterministic and have high computational cost. In this work we present an alternative method to obtain unification algorithms for combined theories based on variant narrowing. Although variant narrowing is less efficient at the level of a single theory E i, it does not use any costly combination method. Furthermore, it does not require that each E i has a dedicated unification algorithm in a tool implementation. We illustrate the use of this method in the Maude-NPA tool by means of a well-known protocol requiring the combination of three distinct equational theories. © 2011 Springer-Verlag.R. Sasse and J. Meseguer have been partially supported by NSF Grants CNS0716638, CNS-0831064 and CNS-0904749. S. Escobar has been partially supported by the EU (FEDER) and the Spanish MEC/MICINN under grant TIN 2007-68093- C02-02. C. Meadows has been partially supported by NSF Grant CNS-0904749National Science Foundation, EEUUSasse, R.; Escobar Román, S.; Meadows, C.; Meseguer, J. (2011). Protocol analysis modulo combination of theories: A case study in Maude-NPA. En Security and Trust Management. Springer Verlag (Germany). 6710:163-178. doi:10.1007/978-3-642-22444-7_11S1631786710Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 367(1-2), 2–32 (2006)Armando, A., Basin, D.A., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P.H., Héam, P.-C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The avispa tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281–285. Springer, Heidelberg (2005)Baader, F., Schulz, K.U.: Unification in the union of disjoint equational theories: Combining decision procedures. In: Kapur, D. (ed.) CADE 1992. LNCS, vol. 607, pp. 50–65. Springer, Heidelberg (1992)Basin, D.A., Mödersheim, S., Viganò, L.: An on-the-fly model-checker for security protocol analysis. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 253–270. Springer, Heidelberg (2003)Baudet, M., Cortier, V., Delaune, S.: YAPA: A generic tool for computing intruder knowledge. In: Treinen, R. (ed.) RTA 2009. LNCS, vol. 5595, pp. 148–163. Springer, Heidelberg (2009)Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: CSFW, pp. 82–96. IEEE Computer Society, Los Alamitos (2001)Bursuc, S., Comon-Lundh, H.: Protocol security and algebraic properties: Decision results for a bounded number of sessions. In: Treinen, R. (ed.) RTA 2009. LNCS, vol. 5595, pp. 133–147. Springer, Heidelberg (2009)Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: An NP decision procedure for protocol insecurity with XOR. In: LICS, pp. 261–270. IEEE Computer Society, Los Alamitos (2003)Chevalier, Y., Rusinowitch, M.: Hierarchical combination of intruder theories. Inf. Comput. 206(2-4), 352–377 (2008)Chevalier, Y., Rusinowitch, M.: Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures. Theor. Comput. Sci. 411(10), 1261–1282 (2010)Ciobâcă, Ş., Delaune, S., Kremer, S.: Computing knowledge in security protocols under convergent equational theories. In: Schmidt, R.A. (ed.) CADE-22. LNCS, vol. 5663, pp. 355–370. Springer, Heidelberg (2009)Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, pp. 294–307. Springer, Heidelberg (2005)Cortier, V., Delaitre, J., Delaune, S.: Safely composing security protocols. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855, pp. 352–363. Springer, Heidelberg (2007)Cremers, C.J.F.: The scyther tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008)Escobar, S., Meadows, C., Meseguer, J.: A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties. Theoretical Computer Science 367(1-2), 162–202 (2006)Escobar, S., Meadows, C., Meseguer, J.: Maude-NPA: Cryptographic protocol analysis modulo equational properties. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007/2008/2009 Tutorial Lectures. LNCS, vol. 5705, pp. 1–50. Springer, Heidelberg (2009)Escobar, S., Meseguer, J., Sasse, R.: Effectively checking or disproving the finite variant property. Technical Report UIUCDCS-R-2008-2960, Department of Computer Science - University of Illinois at Urbana-Champaign (April 2008)Escobar, S., Meseguer, J., Sasse, R.: Effectively checking the finite variant property. In: Voronkov, A. (ed.) RTA 2008. LNCS, vol. 5117, pp. 79–93. Springer, Heidelberg (2008)Escobar, S., Meseguer, J., Sasse, R.: Variant narrowing and equational unification. Electr. Notes Theor. Comput. Sci. 238(3), 103–119 (2009)Escobar, S., Sasse, R., Meseguer, J.: Folding variant narrowing and optimal variant termination. In: Ölveczky, P.C. (ed.) WRLA 2010. LNCS, vol. 6381, pp. 52–68. Springer, Heidelberg (2010)Fabrega, F.J.T., Herzog, J., Guttman, J.: Strand Spaces: What Makes a Security Protocol Correct? Journal of Computer Security 7, 191–230 (1999)Guo, Q., Narendran, P.: Unification and matching modulo nilpotence. In: CADE-13. LNCS, vol. 1104, pp. 261–274. Springer, Heidelberg (1996)Harkins, D., Carrel, D.: The Internet Key Exchange (IKE), IETF RFC 2409, (November 1998)Jouannaud, J.-P., Kirchner, C., Kirchner, H.: Incremental construction of unification algorithms in equational theories. In: Díaz, J. (ed.) ICALP 1983. LNCS, vol. 154, pp. 361–373. Springer, Heidelberg (1983)Küsters, R., Truderung, T.: Reducing protocol analysis with xor to the xor-free case in the Horn theory based approach. In: ACM Conference on Computer and Communications Security, pp. 129–138 (2008)Küsters, R., Truderung, T.: Using ProVerif to analyze protocols with Diffie-Hellman exponentiation. In: CSF, pp. 157–171. IEEE Computer Society, Los Alamitos (2009)Lafourcade, P., Terrade, V., Vigier, S.: Comparison of cryptographic verification tools dealing with algebraic properties. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 173–185. Springer, Heidelberg (2010)Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147–166. Springer, Heidelberg (1996)Meadows, C.: The NRL protocol analyzer: An overview. J. Log. Program. 26(2), 113–131 (1996)Meseguer, J.: Conditional rewriting logic as a united model of concurrency. Theor. Comput. Sci. 96(1), 73–155 (1992)Meseguer, J.: Membership algebra as a logical framework for equational specification. In: Parisi-Presicce, F. (ed.) WADT 1997. LNCS, vol. 1376, pp. 18–61. Springer, Heidelberg (1998)Meseguer, J., Thati, P.: Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols. Higher-Order and Symbolic Computation 20(1–2), 123–160 (2007)Ohlebusch, E.: Advanced Topics in Term Rewriting. Springer, Heidelberg (2002)Santiago, S., Talcott, C.L., Escobar, S., Meadows, C., Meseguer, J.: A graphical user interface for Maude-NPA. Electr. Notes Theor. Comput. Sci. 258(1), 3–20 (2009)Schmidt-Schauß, M.: Unification in a combination of arbitrary disjoint equational theories. J. Symb. Comput. 8(1/2), 51–99 (1989)Terese (ed.): Term Rewriting Systems. Cambridge University Press, Cambridge (2003)Turuani, M.: The CL-atse protocol analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol. 4098, pp. 277–286. Springer, Heidelberg (2006
    corecore