883 research outputs found

    Regression and the Maternal in the History of Psychoanalysis, 1900-1957

    Get PDF
    This paper examines the history of the concept of ‘regression’ as it was perceived by Sandor Ferenczi and some of his followers in the first half of the twentieth century. The first part provides a short history of the notion of ‘regression’ from the late nineteenth century to Ferenczi's work in the 1920s and 1930s. The second and third parts of the paper focus on two other thinkers on regression, who worked in Britain, under the influence of the Ferenczian paradigm – the interwar Scottish psychiatrist, Ian D. Suttie; and the British-Hungarian psychoanalyst, and Ferenczi's most important pupil, Michael Balint. Rather than a descriptive term which comes to designate a pathological mental stage, Ferenczi understood ‘regression’ as a much more literal phenomenon. For him, the mental desire to go backwards in time is a universal one, and a consequence of an inevitable traumatic separation from the mother in early childhood, which has some deep personal and cultural implications. The paper aims to show some close affinities between the preoccupation of some psychoanalysts with ‘regression’, and the growing interest in social and cultural aspects of ‘motherhood’ and ‘the maternal role’ in mid-twentieth-century British society

    A Characterization of Infinite LSP Words

    Full text link
    G. Fici proved that a finite word has a minimal suffix automaton if and only if all its left special factors occur as prefixes. He called LSP all finite and infinite words having this latter property. We characterize here infinite LSP words in terms of SS-adicity. More precisely we provide a finite set of morphisms SS and an automaton A{\cal A} such that an infinite word is LSP if and only if it is SS-adic and all its directive words are recognizable by A{\cal A}

    Interpolator symmetries and new Kalton-Peck spaces

    Get PDF
    Diagrams generated by three interpolators in an abstract Kalton-Montgomery complex like interpolation scheme. We will consider in detail the case of the first three Schechter interpolators associated to the usual Calder\'on complex interpolation method in two especially interesting cases: weighted ℓ2\ell_2 spaces, i.e., interpolation pairs (ℓ2(w−1),ℓ2(w))θ(\ell_2(w^{-1}), \ell_2(w))_\theta, and ℓp\ell_p spaces, i.e., the interpolation pair (ℓ∞,ℓ1)θ(\ell_\infty, \ell_1)_\theta, both at θ=1/2\theta=1/2

    Symmetries in Quantum Key Distribution and the Connection between Optimal Attacks and Optimal Cloning

    Full text link
    We investigate the connection between the optimal collective eavesdropping attack and the optimal cloning attack where the eavesdropper employs an optimal cloner to attack the quantum key distribution (QKD) protocol. The analysis is done in the context of the security proof in [Devetak and Winter, Proc. of the Roy. Soc. of London Series A, 461, 207 (2005); Kraus, Gisin and Renner, Phys. Rev. Lett. 95, 080501 (2005)] for discrete variable protocols in d-dimensional Hilbert spaces. We consider a scenario in which the protocols and cloners are equipped with symmetries. These symmetries are used to define a quantum cloning scenario. We find that, in general, it does not hold that the optimal attack is an optimal cloner. However, there are classes of protocols, where we can identify an optimal attack by an optimal cloner. We analyze protocols with 2, d and d+1 mutually unbiased bases where d is a prime, and show that for the protocols with 2 and d+1 MUBs the optimal attack is an optimal cloner, but for the protocols with d MUBs, it is not. Finally, we give criteria to identify protocols which have different signal states, but the same optimal attack. Using these criteria, we present qubit protocols which have the same optimal attack as the BB84 protocol or the 6-state protocol
    • …
    corecore