758 research outputs found

    Interpellations : Three Essays on Kent Monkman = Trois essais sur Kent Monkman

    Get PDF
    "In Interpellations. Three Essays on Kent Monkman the art historians Jonathan D. Katz, Richard W. Hill and Todd Porterfield offer perspectives and analyses on Monkman's work that address history and genre painting, the queered Romantic landscape, the shifting and unfixed subject, race, sexuality conquest and soverignty, and modern versus discontinuous temporality." -- p. [4] of cover

    Restricting benzodiazepine prescribing

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/29460/1/0000542.pd

    Thermodynamics with long-range interactions: from Ising models to black-holes

    Get PDF
    New methods are presented which enables one to analyze the thermodynamics of systems with long-range interactions. Generically, such systems have entropies which are non-extensive, (do not scale with the size of the system). We show how to calculate the degree of non-extensivity for such a system. We find that a system interacting with a heat reservoir is in a probability distribution of canonical ensembles. The system still possesses a parameter akin to a global temperature, which is constant throughout the substance. There is also a useful quantity which acts like a {\it local temperatures} and it varies throughout the substance. These quantities are closely related to counterparts found in general relativity. A lattice model with long-range spin-spin coupling is studied. This is compared with systems such as those encountered in general relativity, and gravitating systems with Newtonian-type interactions. A long-range lattice model is presented which can be seen as a black-hole analog. One finds that the analog's temperature and entropy have many properties which are found in black-holes. Finally, the entropy scaling behavior of a gravitating perfect fluid of constant density is calculated. For weak interactions, the entropy scales like the volume of the system. As the interactions become stronger, the entropy becomes higher near the surface of the system, and becomes more area-scaling.Comment: Corrects some typos found in published version. Title changed 22 pages, 2 figure

    Bell Inequality Experiment for a High Brightness Time-Energy Entangled Source

    Get PDF
    A periodically poled MgO - doped LiNbO3 (MgO:LN) non-degenerate photon pair source is utilized for spontaneous parametric down-conversion of 532-nanometer photons into time-energy entangled pairs of 800- and 1600-nanometer photons. The entangled photons are separated using previously detailed sorting optics, such that each wavelength is independently directed through one of two modified Mach-Zehnder interferometers - also known as a Franson interferometer - after which they are fiber-optically guided to high-efficiency photon detectors. Output from the detectors is sent to a high resolution time tagger, where coincidences between the entangled photons are recorded. By varying the length of the long path in one Mach-Zehnder interferometer, it is possible to observe high visibility sinusoidal fringes in the measured coincidence rates (while no variation is seen in single photon detection rates). These fringes - due to interference between the photon probability amplitudes - are indicative of a violation of the Bell inequality, and confirm inconsistencies with local hidden variable theory for the correlations of the time-energy entangled photon pairs

    Bim/Bcl-2 balance is critical for maintaining naive and memory T cell homeostasis

    Get PDF
    We examined the role of the antiapoptotic molecule Bcl-2 in combating the proapoptotic molecule Bim in control of naive and memory T cell homeostasis using Bcl-2−/− mice that were additionally deficient in one or both alleles of Bim. Naive T cells were significantly decreased in Bim+/−Bcl-2−/− mice, but were largely restored in Bim−/−Bcl-2−/− mice. Similarly, a synthetic Bcl-2 inhibitor killed wild-type, but not Bim−/−, T cells. Further, T cells from Bim+/−Bcl-2−/− mice died rapidly ex vivo and were refractory to cytokine-driven survival in vitro. In vivo, naive CD8+ T cells required Bcl-2 to combat Bim to maintain peripheral survival, whereas naive CD4+ T cells did not. In contrast, Bim+/−Bcl-2−/− mice generated relatively normal numbers of memory T cells after lymphocytic choriomeningitis virus infection. Accumulation of memory T cells in Bim+/−Bcl-2−/− mice was likely caused by their increased proliferative renewal because of the lymphopenic environment of the mice. Collectively, these data demonstrate a critical role for a balance between Bim and Bcl-2 in controlling homeostasis of naive and memory T cells

    Bell Inequality Experiment for a High Brightness Time-Energy Entangled Source

    Get PDF
    A periodically poled MgO doped LiNbO3 (MgO:LN) non-degenerate photon pair source is utilized for spontaneous parametric down-conversion of 532 nm photons into time-energy entangled pairs of 800 and 1600 nm photons. The entangled photons are separated using previously detailed sorting optics, such that each wavelength is independently directed through one of two modified Mach-Zehnder interferometers also known as a Franson interferometer after which they are fiber-optically guided to high-efficiency photon detectors. Output from the detectors is sent to a high resolution time tagger, where coincidences between the entangled photons are recorded. By varying the length of the long path in one Mach-Zehnder interferometer, it is possible to observe high visibility sinusoidal fringes in the measured coincidence rates (while no variation is seen in single photon detection rates). These fringes due to interference between the photon probability amplitudes are indicative of a violation of the Bell inequality, and confirm inconsistencies with local hidden variable theory for the correlations of the time-energy entangled photon pairs

    A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation

    Get PDF
    It is well known that the random oracle model is not sound in the sense that there exist cryptographic systems that are secure in the random oracle model but when instantiated by any family of hash functions become insecure. However, all known separation results require the attacker to send an appropriately crafted message to the challenger in order to break security. Thus, this leaves open the possibility that some cryptographic schemes, such as bit-encryption, are still sound in the random oracle model. In this work we refute this possibility, assuming the existence of indistinguishability obfuscation. We do so in the following way. First, we present a random oracle separation for bit-encryption; namely, we show that there exists a bit-encryption protocol secure in the random oracle model but \emph{completely insecure} when the random oracle is instantiated by any concrete function. Second, we show how to adapt this separation to work for most natural simulation-based and game-based definitions. Our techniques can easily be adapted to other idealized models, and thus we present a \emph{unified approach} to showing separations for most protocols of interest in most idealized models
    • …
    corecore