758 research outputs found
Interpellations : Three Essays on Kent Monkman = Trois essais sur Kent Monkman
"In Interpellations. Three Essays on Kent Monkman the art historians Jonathan D. Katz, Richard W. Hill and Todd Porterfield offer perspectives and analyses on Monkman's work that address history and genre painting, the queered Romantic landscape, the shifting and unfixed subject, race, sexuality conquest and soverignty, and modern versus discontinuous temporality." -- p. [4] of cover
Restricting benzodiazepine prescribing
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/29460/1/0000542.pd
Thermodynamics with long-range interactions: from Ising models to black-holes
New methods are presented which enables one to analyze the thermodynamics of
systems with long-range interactions. Generically, such systems have entropies
which are non-extensive, (do not scale with the size of the system). We show
how to calculate the degree of non-extensivity for such a system. We find that
a system interacting with a heat reservoir is in a probability distribution of
canonical ensembles. The system still possesses a parameter akin to a global
temperature, which is constant throughout the substance. There is also a useful
quantity which acts like a {\it local temperatures} and it varies throughout
the substance. These quantities are closely related to counterparts found in
general relativity. A lattice model with long-range spin-spin coupling is
studied. This is compared with systems such as those encountered in general
relativity, and gravitating systems with Newtonian-type interactions. A
long-range lattice model is presented which can be seen as a black-hole analog.
One finds that the analog's temperature and entropy have many properties which
are found in black-holes. Finally, the entropy scaling behavior of a
gravitating perfect fluid of constant density is calculated. For weak
interactions, the entropy scales like the volume of the system. As the
interactions become stronger, the entropy becomes higher near the surface of
the system, and becomes more area-scaling.Comment: Corrects some typos found in published version. Title changed 22
pages, 2 figure
Bell Inequality Experiment for a High Brightness Time-Energy Entangled Source
A periodically poled MgO - doped LiNbO3 (MgO:LN) non-degenerate photon pair source is utilized for spontaneous parametric down-conversion of 532-nanometer photons into time-energy entangled pairs of 800- and 1600-nanometer photons. The entangled photons are separated using previously detailed sorting optics, such that each wavelength is independently directed through one of two modified Mach-Zehnder interferometers - also known as a Franson interferometer - after which they are fiber-optically guided to high-efficiency photon detectors. Output from the detectors is sent to a high resolution time tagger, where coincidences between the entangled photons are recorded. By varying the length of the long path in one Mach-Zehnder interferometer, it is possible to observe high visibility sinusoidal fringes in the measured coincidence rates (while no variation is seen in single photon detection rates). These fringes - due to interference between the photon probability amplitudes - are indicative of a violation of the Bell inequality, and confirm inconsistencies with local hidden variable theory for the correlations of the time-energy entangled photon pairs
Bim/Bcl-2 balance is critical for maintaining naive and memory T cell homeostasis
We examined the role of the antiapoptotic molecule Bcl-2 in combating the proapoptotic molecule Bim in control of naive and memory T cell homeostasis using Bcl-2−/− mice that were additionally deficient in one or both alleles of Bim. Naive T cells were significantly decreased in Bim+/−Bcl-2−/− mice, but were largely restored in Bim−/−Bcl-2−/− mice. Similarly, a synthetic Bcl-2 inhibitor killed wild-type, but not Bim−/−, T cells. Further, T cells from Bim+/−Bcl-2−/− mice died rapidly ex vivo and were refractory to cytokine-driven survival in vitro. In vivo, naive CD8+ T cells required Bcl-2 to combat Bim to maintain peripheral survival, whereas naive CD4+ T cells did not. In contrast, Bim+/−Bcl-2−/− mice generated relatively normal numbers of memory T cells after lymphocytic choriomeningitis virus infection. Accumulation of memory T cells in Bim+/−Bcl-2−/− mice was likely caused by their increased proliferative renewal because of the lymphopenic environment of the mice. Collectively, these data demonstrate a critical role for a balance between Bim and Bcl-2 in controlling homeostasis of naive and memory T cells
Bell Inequality Experiment for a High Brightness Time-Energy Entangled Source
A periodically poled MgO doped LiNbO3 (MgO:LN) non-degenerate photon pair source is utilized for spontaneous parametric down-conversion of 532 nm photons into time-energy entangled pairs of 800 and 1600 nm photons. The entangled photons are separated using previously detailed sorting optics, such that each wavelength is independently directed through one of two modified Mach-Zehnder interferometers also known as a Franson interferometer after which they are fiber-optically guided to high-efficiency photon detectors. Output from the detectors is sent to a high resolution time tagger, where coincidences between the entangled photons are recorded. By varying the length of the long path in one Mach-Zehnder interferometer, it is possible to observe high visibility sinusoidal fringes in the measured coincidence rates (while no variation is seen in single photon detection rates). These fringes due to interference between the photon probability amplitudes are indicative of a violation of the Bell inequality, and confirm inconsistencies with local hidden variable theory for the correlations of the time-energy entangled photon pairs
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation
It is well known that the random oracle model is not sound in the sense that there exist cryptographic systems that are secure in the random oracle model but when instantiated by any family of hash functions become insecure. However, all known separation results require the attacker to send an appropriately crafted message to the challenger in order to break security. Thus, this leaves open the possibility that some cryptographic schemes, such as bit-encryption, are still sound in the random oracle model.
In this work we refute this possibility, assuming the existence of indistinguishability obfuscation. We do so in the following way. First, we present a random oracle separation for bit-encryption; namely, we show that there exists a bit-encryption protocol secure in the random oracle model but \emph{completely insecure} when the random oracle is instantiated by any concrete function. Second, we show how to adapt this separation to work for most natural simulation-based and game-based definitions. Our techniques can easily be adapted to other idealized models, and thus we present a \emph{unified approach} to showing separations for most protocols of interest in most idealized models
- …