3,044 research outputs found

    The Origins of \u27Heresy\u27 on Mount Athos: Ilarion\u27s Na Gorakh Kavkaza (1907)

    Full text link

    Addressing bioterrorist threats: where do we go from here?

    Get PDF

    Brief Amicus Curiae of the National Employment Lawyers Association in Support of Respondents. Hosanna-Tabor Evangelical Lutheran Church and School v. Equal Employment Opportunity Commission, 565 U.S. 171 (2012) (No. 10-553), 2011 U.S. S. Ct. Briefs LEXIS 984

    Get PDF
    QUESTION PRESENTED Is the anti-relatiation provision of the Americans with Disabilities Act, 42 U.S.C. 12203, unconstitutional as applied to the claims of respondents

    Non-invariant two-loop counterterms for the three-gauge-boson vertices

    Get PDF
    Some practical applications of algebraic renormalization are discussed. In particular we consider the two-loop QCD corrections to the three-gauge-boson vertices involving photons, Z and W bosons. For this purpose also the corresponding two-point functions have to be discussed. A recently developed procedure is used to analyze the breaking terms of the functional identities and explicit formulae for the universal counterterms are provided. Special attention is devoted to the treatment of infra-red divergences.Comment: Some minor corrections and improved discussion in the one-loop sectio

    Simultaneous effects on parvalbumin-positive interneuron and dopaminergic system development in a transgenic rat model for sporadic schizophrenia

    Get PDF
    To date, unequivocal neuroanatomical features have been demonstrated neither for sporadic nor for familial schizophrenia. Here, we investigated the neuroanatomical changes in a transgenic rat model for a subset of sporadic chronic mental illness (CMI), which modestly overexpresses human full-length, non-mutant Disrupted-in-Schizophrenia 1 (DISC1), and for which aberrant dopamine homeostasis consistent with some schizophrenia phenotypes has previously been reported. Neuroanatomical analysis revealed a reduced density of dopaminergic neurons in the substantia nigra and reduced dopaminergic fibres in the striatum. Parvalbumin-positive interneuron occurrence in the somatosensory cortex was shifted from layers II/III to V/VI, and the number of calbindin-positive interneurons was slightly decreased. Reduced corpus callosum thickness confirmed trend-level observations from in vivo MRI and voxel-wise tensor based morphometry. These neuroanatomical changes help explain functional phenotypes of this animal model, some of which resemble changes observed in human schizophrenia post mortem brain tissues. Our findings also demonstrate how a single molecular factor, DISC1 overexpression or misassembly, can account for a variety of seemingly unrelated morphological phenotypes and thus provides a possible unifying explanation for similar findings observed in sporadic schizophrenia patients. Our anatomical investigation of a defined model for sporadic mental illness enables a clearer definition of neuroanatomical changes associated with subsets of human sporadic schizophrenia

    Elligator : elliptic-curve points indistinguishable from uniform random strings

    Get PDF
    Censorship-circumvention tools are in an arms race against censors. The censors study all traffic passing into and out of their controlled sphere, and try to disable censorship-circumvention tools without completely shutting down the Internet. Tools aim to shape their traffic patterns to match unblocked programs, so that simple traffic profiling cannot identify the tools within a reasonable number of traces; the censors respond by deploying rewalls with increasingly sophisticated deep-packet inspection. Cryptography hides patterns in user data but does not evade censorship if the censor can recognize patterns in the cryptography itself. In particular, elliptic-curve cryptography often transmits points on known elliptic curves, and those points are easily distinguishable from uniform random strings of bits. This paper introduces high-security high-speed elliptic-curve systems in which elliptic-curve points are encoded so as to be indistinguishable from uniform random strings. At a lower level, this paper introduces a new bijection between strings and about half of all curve points; this bijection is applicable to every odd-characteristic elliptic curve with a point of order 2, except for curves of j-invariant 1728. This paper also presents guidelines to construct, and two examples of, secure curves suitable for these encodings

    Simple Opportunistic Encryption

    Get PDF
    Network traffic encryption is becoming a requirement, not an option. Enabling encryption will be a communal effort so a solution that gives partial benefits until fully deployed is needed. A solution that requires little changes to existing infrastructure will also help as it can be quickly deployed to give immediate shortterm benefits. We argue that tcpcrypt, a TCP option for opportunistic encryption is the path of least-resistance for a solution against large-scale traffic encryption. Tcpcrypt requires no changes to applications, is compatible with existing networks (works with NATs), and just works by default. It is high performance, so it can be deployed on servers without much concern. tcpcrypt attempts to maximize security for any given setting. By default, it will protect against passive eavesdropping, and also allows detecting large scale interception. With authentication, tcpcrypt can provide full security against active attackers and so it is a complete solution both for the short-term and long-term
    corecore