745 research outputs found

    Representation of multiple cropping systems in land use data sets

    Get PDF

    Die Verordnung (EG) 805/2004 zur Einführung eines europäischen Vollstreckungstitels für unbestrittene Forderungen (EuVTVO) und ihre Konsequenzen für den Schuldnerschutz

    Full text link
    Mit der EuVTVO wird zur Vereinfachung und Beschleunigung der Vollstreckung ausländischer Titel innerhalb der europäischen Gemeinschaft der Eu-Vollstreckungstitel eingeführt. Bei dieser Verordnung handelt es sich um eine konsequente Fortsetzung des bereits mit der EuGVVO begonnenen Ansatzes zur Integration eines grenzüberschreitenden Vollstreckungstitels in die jeweiligen nationalen Rechtssysteme. Die herausragende Neuerung durch die EuVTVO stellen die Abschaffung der Vollstreckbarerklärung im Vollstreckungsstaat und der damit verbundene Wegfall der wesentlichen Anerkennungs- und Vollstreckungshindernisse dar. Die Einführung der EuVTVO und damit die Abschaffung des Exequaturverfahrens im Vollstreckungsstaat für unbestrittene Forderungen ist ein weiterer Schritt zur Verbesserung und Vereinfachung der Anerkennung und Vollstreckung gerichtlicher und außergerichtlicher Entscheidung in Zivil- und Handelssachen

    Cancellation of the Chiral Anomaly in a Model with Spontaneous Symmetry Breaking

    Get PDF
    A perturbatively renormalized Abelian Higgs-Kibble model with a chirally coupled fermion is considered. The Slavnov identity is fulfilled to all orders of perturbation theory, which is crucial for renormalizability in models with vector bosons. BRS invariance, i.e. the validity of the identity, forces the chiral anomaly to be cancelled by Wess-Zumino counterterms. This procedure preserves the renormalizability in the one-loop approximation but it violates the Froissart bounds for partial wave amplitudes above some energy and destroys renormalizability from the second order in h bar onwards due to the counterterms. (The paper has 3 figs. in postscript which are not included; send request to the author's e-mailbox with subject: figures . The author is willing to mail hard copies of the paper.)Comment: 13 pages, plain TeX, SI 92-1

    P-SCOR: Integration of Constraint Programming Orchestration and Programmable Data Plane

    Get PDF
    In this manuscript we present an original implementation of network management functions in the context of Software Defined Networking. We demonstrate a full integration of an artificial intelligence driven management, an SDN control plane, and a programmable data plane. Constraint Programming is used to implement a management operating system that accepts high level specifications, via a northbound interface, in terms of operational objective and directives. These are translated in technology-specific constraints and directives for the SDN control plane, leveraging the programmable data plane, which is enriched with functionalities suited to feed data that enable the most effective operation of the “intelligent” control plane, by exploiting the language

    One-dimensional Ising ferromagnet frustrated by long-range interactions at finite temperatures

    Get PDF
    We consider a one-dimensional lattice of Ising-type variables where the ferromagnetic exchange interaction J between neighboring sites is frustrated by a long-ranged anti-ferromagnetic interaction of strength g between the sites i and j, decaying as |i-j|^-alpha, with alpha>1. For alpha smaller than a certain threshold alpha_0, which is larger than 2 and depends on the ratio J/g, the ground state consists of an ordered sequence of segments with equal length and alternating magnetization. The width of the segments depends on both alpha and the ratio J/g. Our Monte Carlo study shows that the on-site magnetization vanishes at finite temperatures and finds no indication of any phase transition. Yet, the modulation present in the ground state is recovered at finite temperatures in the two-point correlation function, which oscillates in space with a characteristic spatial period: The latter depends on alpha and J/g and decreases smoothly from the ground-state value as the temperature is increased. Such an oscillation of the correlation function is exponentially damped over a characteristic spatial scale, the correlation length, which asymptotically diverges roughly as the inverse of the temperature as T=0 is approached. This suggests that the long-range interaction causes the Ising chain to fall into a universality class consistent with an underlying continuous symmetry. The e^(Delta/T)-temperature dependence of the correlation length and the uniform ferromagnetic ground state, characteristic of the g=0 discrete Ising symmetry, are recovered for alpha > alpha_0.Comment: 12 pages, 7 figure

    Unforgeable Quantum Encryption

    Get PDF
    We study the problem of encrypting and authenticating quantum data in the presence of adversaries making adaptive chosen plaintext and chosen ciphertext queries. Classically, security games use string copying and comparison to detect adversarial cheating in such scenarios. Quantumly, this approach would violate no-cloning. We develop new techniques to overcome this problem: we use entanglement to detect cheating, and rely on recent results for characterizing quantum encryption schemes. We give definitions for (i.) ciphertext unforgeability , (ii.) indistinguishability under adaptive chosen-ciphertext attack, and (iii.) authenticated encryption. The restriction of each definition to the classical setting is at least as strong as the corresponding classical notion: (i) implies INT-CTXT, (ii) implies IND-CCA2, and (iii) implies AE. All of our new notions also imply QIND-CPA privacy. Combining one-time authentication and classical pseudorandomness, we construct schemes for each of these new quantum security notions, and provide several separation examples. Along the way, we also give a new definition of one-time quantum authentication which, unlike all previous approaches, authenticates ciphertexts rather than plaintexts.Comment: 22+2 pages, 1 figure. v3: error in the definition of QIND-CCA2 fixed, some proofs related to QIND-CCA2 clarifie

    Mid-gut ACTH-secreting neuroendocrine tumor unmasked with (18)F-dihydroxyphenylalanine-positron emission tomography.

    Get PDF
    Ectopic ACTH Cushing's syndrome (EAS) is often caused by neuroendocrine tumors (NETs) of lungs, pancreas, thymus, and other less frequent locations. Localizing the source of ACTH can be challenging. A 64-year-old man presented with rapidly progressing fatigue, muscular weakness, and dyspnea. He was in poor condition and showed facial redness, proximal amyotrophy, and bruises. Laboratory disclosed hypokalemia, metabolic alkalosis, and markedly elevated ACTH and cortisol levels. Pituitary was normal on magnetic resonance imaging (MRI), and bilateral inferior petrosal sinus blood sampling with corticotropin-releasing hormone stimulation showed no significant central-to-periphery gradient of ACTH. Head and neck, thoracic and abdominal computerized tomography (CT), MRI, somatostatin receptor scintigraphy (SSRS), and (18)F-deoxyglucose-positron emission tomography (FDG-PET) failed to identify the primary tumor. (18)F-dihydroxyphenylalanine (F-DOPA)-PET/CT unveiled a 20-mm nodule in the jejunum and a metastatic lymph node. Segmental jejunum resection showed two adjacent NETs, measuring 2.0 and 0.5 cm with a peritoneal metastasis. The largest tumor expressed ACTH in 30% of cells. Following surgery, after a transient adrenal insufficiency, ACTH and cortisol levels returned to normal values and remain normal over a follow-up of 26 months. Small mid-gut NETs are difficult to localize on CT or MRI, and require metabolic imaging. Owing to low mitotic activity, NETs are generally poor candidates for FDG-PET, whereas SSRS shows poor sensitivity in EAS due to intrinsically low tumor concentration of type-2 somatostatin receptors (SST2) or to receptor down regulation by excess cortisol. However, F-DOPA-PET, which is related to amine precursor uptake by NETs, has been reported to have high positive predictive value for occult EAS despite low sensitivity, and constitutes a useful alternative to more conventional methods of tumor localization. LEARNING POINTS: Uncontrolled high cortisol levels in EAS can be lethal if untreated.Surgical excision is the keystone of NETs treatment, thus tumor localization is crucial.Most cases of EAS are caused by NETs, which are located mainly in the lungs. However, small gut NETs are elusive to conventional imaging and require metabolic imaging for detection.FDG-PET, based on tumor high metabolic rate, may not detect NETs that have low mitotic activity. SSRS may also fail, due to absent or low concentration of SST2, which may be down regulated by excess cortisol.F-DOPA-PET, based on amine-precursor uptake, can be a useful method to localize the occult source of ACTH in EAS when other methods have failed

    Quantum authentication with key recycling

    Get PDF
    We show that a family of quantum authentication protocols introduced in [Barnum et al., FOCS 2002] can be used to construct a secure quantum channel and additionally recycle all of the secret key if the message is successfully authenticated, and recycle part of the key if tampering is detected. We give a full security proof that constructs the secure channel given only insecure noisy channels and a shared secret key. We also prove that the number of recycled key bits is optimal for this family of protocols, i.e., there exists an adversarial strategy to obtain all non-recycled bits. Previous works recycled less key and only gave partial security proofs, since they did not consider all possible distinguishers (environments) that may be used to distinguish the real setting from the ideal secure quantum channel and secret key resource.Comment: 38+17 pages, 13 figures. v2: constructed ideal secure channel and secret key resource have been slightly redefined; also added a proof in the appendix for quantum authentication without key recycling that has better parameters and only requires weak purity testing code
    corecore