251 research outputs found

    Religion without fear. Plutarch on superstition and Early Christian Literature

    Get PDF

    Religion without fear: Plutarch on superstition and early Christian literature

    Get PDF
    After some introductory remarks on the role of fear in religious discourse and on the vocabulary, Plutarch's treatise On Superstition is analysed according to its rhetorical outline. Questions of authenticity are discussed and answered by locating The essay in Plutarch's early career. Then we ask for the place of ''fear of God" in biblical teaching and theology, compare it to Plutarch and show some limits in Plutarch's youthful thinking, which doesn't yet pay due respect to the life values of myth. We conclude with two New Testament passages, Romans 8:15, masterfully interpreted by Martin Luther, and 1 John 4:17f, excellently explained by 20th century's Swiss theologian and psychologian Oskar Pfister, and we show that these texts are propagating "belief without fear".Continued 2001 as 'Verbum et Ecclesia'Spine cut of Journal binding and pages scanned on flatbed EPSON Expression 10000 XL; 400dpi; text/lineart - black and white - stored to Tiff Derivation: Abbyy Fine Reader v.9 work with PNG-format (black and white); Photoshop CS3; Adobe Acrobat v.9 Web display format PDFhttp://explore.up.ac.za/record=b102527

    Unbounded-Error Classical and Quantum Communication Complexity

    Full text link
    Since the seminal work of Paturi and Simon \cite[FOCS'84 & JCSS'86]{PS86}, the unbounded-error classical communication complexity of a Boolean function has been studied based on the arrangement of points and hyperplanes. Recently, \cite[ICALP'07]{INRY07} found that the unbounded-error {\em quantum} communication complexity in the {\em one-way communication} model can also be investigated using the arrangement, and showed that it is exactly (without a difference of even one qubit) half of the classical one-way communication complexity. In this paper, we extend the arrangement argument to the {\em two-way} and {\em simultaneous message passing} (SMP) models. As a result, we show similarly tight bounds of the unbounded-error two-way/one-way/SMP quantum/classical communication complexities for {\em any} partial/total Boolean function, implying that all of them are equivalent up to a multiplicative constant of four. Moreover, the arrangement argument is also used to show that the gap between {\em weakly} unbounded-error quantum and classical communication complexities is at most a factor of three.Comment: 11 pages. To appear at Proc. ISAAC 200

    An Improved Interactive Streaming Algorithm for the Distinct Elements Problem

    Full text link
    The exact computation of the number of distinct elements (frequency moment F0F_0) is a fundamental problem in the study of data streaming algorithms. We denote the length of the stream by nn where each symbol is drawn from a universe of size mm. While it is well known that the moments F0,F1,F2F_0,F_1,F_2 can be approximated by efficient streaming algorithms, it is easy to see that exact computation of F0,F2F_0,F_2 requires space Ω(m)\Omega(m). In previous work, Cormode et al. therefore considered a model where the data stream is also processed by a powerful helper, who provides an interactive proof of the result. They gave such protocols with a polylogarithmic number of rounds of communication between helper and verifier for all functions in NC. This number of rounds (O(log2m)  in the case of  F0)\left(O(\log^2 m) \;\text{in the case of} \;F_0 \right) can quickly make such protocols impractical. Cormode et al. also gave a protocol with logm+1\log m +1 rounds for the exact computation of F0F_0 where the space complexity is O(logmlogn+log2m)O\left(\log m \log n+\log^2 m\right) but the total communication O(nlogm(logn+logm))O\left(\sqrt{n}\log m\left(\log n+ \log m \right)\right). They managed to give logm\log m round protocols with polylog(m,n)\operatorname{polylog}(m,n) complexity for many other interesting problems including F2F_2, Inner product, and Range-sum, but computing F0F_0 exactly with polylogarithmic space and communication and O(logm)O(\log m) rounds remained open. In this work, we give a streaming interactive protocol with logm\log m rounds for exact computation of F0F_0 using O(logm(logn+logmloglogm))O\left(\log m \left(\,\log n + \log m \log\log m\,\right)\right) bits of space and the communication is O(logm(logn+log3m(loglogm)2))O\left( \log m \left(\,\log n +\log^3 m (\log\log m)^2 \,\right)\right). The update time of the verifier per symbol received is O(log2m)O(\log^2 m).Comment: Submitted to ICALP 201

    Asymmetric exclusion process with next-nearest-neighbor interaction: some comments on traffic flow and a nonequilibrium reentrance transition

    Full text link
    We study the steady-state behavior of a driven non-equilibrium lattice gas of hard-core particles with next-nearest-neighbor interaction. We calculate the exact stationary distribution of the periodic system and for a particular line in the phase diagram of the system with open boundaries where particles can enter and leave the system. For repulsive interactions the dynamics can be interpreted as a two-speed model for traffic flow. The exact stationary distribution of the periodic continuous-time system turns out to coincide with that of the asymmetric exclusion process (ASEP) with discrete-time parallel update. However, unlike in the (single-speed) ASEP, the exact flow diagram for the two-speed model resembles in some important features the flow diagram of real traffic. The stationary phase diagram of the open system obtained from Monte Carlo simulations can be understood in terms of a shock moving through the system and an overfeeding effect at the boundaries, thus confirming theoretical predictions of a recently developed general theory of boundary-induced phase transitions. In the case of attractive interaction we observe an unexpected reentrance transition due to boundary effects.Comment: 12 pages, Revtex, 7 figure

    A genome-wide scan for common alleles affecting risk for autism

    Get PDF
    Although autism spectrum disorders (ASDs) have a substantial genetic basis, most of the known genetic risk has been traced to rare variants, principally copy number variants (CNVs). To identify common risk variation, the Autism Genome Project (AGP) Consortium genotyped 1558 rigorously defined ASD families for 1 million single-nucleotide polymorphisms (SNPs) and analyzed these SNP genotypes for association with ASD. In one of four primary association analyses, the association signal for marker rs4141463, located within MACROD2, crossed the genome-wide association significance threshold of P < 5 × 10−8. When a smaller replication sample was analyzed, the risk allele at rs4141463 was again over-transmitted; yet, consistent with the winner's curse, its effect size in the replication sample was much smaller; and, for the combined samples, the association signal barely fell below the P < 5 × 10−8 threshold. Exploratory analyses of phenotypic subtypes yielded no significant associations after correction for multiple testing. They did, however, yield strong signals within several genes, KIAA0564, PLD5, POU6F2, ST8SIA2 and TAF1C

    Automata for true concurrency properties

    Get PDF
    We present an automata-theoretic framework for the model checking of true concurrency properties. These are specified in a fixpoint logic, corresponding to history-preserving bisimilarity, capable of describing events in computations and their dependencies. The models of the logic are event structures or any formalism which can be given a causal semantics, like Petri nets. Given a formula and an event structure satisfying suitable regularity conditions we show how to construct a parity tree automaton whose language is non-empty if and only if the event structure satisfies the formula. The automaton, due to the nature of event structure models, is usually infinite. We discuss how it can be quotiented to an equivalent finite automaton, where emptiness can be checked effectively. In order to show the applicability of the approach, we discuss how it instantiates to finite safe Petri nets. As a proof of concept we provide a model checking tool implementing the technique
    corecore