9,131 research outputs found

    Composition with Target Constraints

    Full text link
    It is known that the composition of schema mappings, each specified by source-to-target tgds (st-tgds), can be specified by a second-order tgd (SO tgd). We consider the question of what happens when target constraints are allowed. Specifically, we consider the question of specifying the composition of standard schema mappings (those specified by st-tgds, target egds, and a weakly acyclic set of target tgds). We show that SO tgds, even with the assistance of arbitrary source constraints and target constraints, cannot specify in general the composition of two standard schema mappings. Therefore, we introduce source-to-target second-order dependencies (st-SO dependencies), which are similar to SO tgds, but allow equations in the conclusion. We show that st-SO dependencies (along with target egds and target tgds) are sufficient to express the composition of every finite sequence of standard schema mappings, and further, every st-SO dependency specifies such a composition. In addition to this expressive power, we show that st-SO dependencies enjoy other desirable properties. In particular, they have a polynomial-time chase that generates a universal solution. This universal solution can be used to find the certain answers to unions of conjunctive queries in polynomial time. It is easy to show that the composition of an arbitrary number of standard schema mappings is equivalent to the composition of only two standard schema mappings. We show that surprisingly, the analogous result holds also for schema mappings specified by just st-tgds (no target constraints). This is proven by showing that every SO tgd is equivalent to an unnested SO tgd (one where there is no nesting of function symbols). Similarly, we prove unnesting results for st-SO dependencies, with the same types of consequences.Comment: This paper is an extended version of: M. Arenas, R. Fagin, and A. Nash. Composition with Target Constraints. In 13th International Conference on Database Theory (ICDT), pages 129-142, 201

    Stillbirth and loss: family practices and display

    No full text
    This paper explores how parents respond to their memories of their stillborn child over the years following their loss. When people die after living for several years or more, their family and friends have the residual traces of a life lived as a basis for an identity that may be remembered over a sustained period of time. For the parent of a stillborn child there is no such basis and the claim for a continuing social identity for their son or daughter is precarious. Drawing on interviews with the parents of 22 stillborn children, this paper explores the identity work performed by parents concerned to create a lasting and meaningful identity for their child and to include him or her in their families after death. The paper draws on Finch's (2007) concept of family display and Walter's (1999) thesis that links continue to exist between the living and the dead over a continued period. The paper argues that evidence from the experience of stillbirth suggests that there is scope for development for both theoretical frameworks

    A Focused Sequent Calculus Framework for Proof Search in Pure Type Systems

    Get PDF
    Basic proof-search tactics in logic and type theory can be seen as the root-first applications of rules in an appropriate sequent calculus, preferably without the redundancies generated by permutation of rules. This paper addresses the issues of defining such sequent calculi for Pure Type Systems (PTS, which were originally presented in natural deduction style) and then organizing their rules for effective proof-search. We introduce the idea of Pure Type Sequent Calculus with meta-variables (PTSCalpha), by enriching the syntax of a permutation-free sequent calculus for propositional logic due to Herbelin, which is strongly related to natural deduction and already well adapted to proof-search. The operational semantics is adapted from Herbelin's and is defined by a system of local rewrite rules as in cut-elimination, using explicit substitutions. We prove confluence for this system. Restricting our attention to PTSC, a type system for the ground terms of this system, we obtain the Subject Reduction property and show that each PTSC is logically equivalent to its corresponding PTS, and the former is strongly normalising iff the latter is. We show how to make the logical rules of PTSC into a syntax-directed system PS for proof-search, by incorporating the conversion rules as in syntax-directed presentations of the PTS rules for type-checking. Finally, we consider how to use the explicitly scoped meta-variables of PTSCalpha to represent partial proof-terms, and use them to analyse interactive proof construction. This sets up a framework PE in which we are able to study proof-search strategies, type inhabitant enumeration and (higher-order) unification

    Differentiating normal and problem gambling: a grounded theory approach.

    Get PDF
    A previous study (Ricketts &amp; Macaskill, 2003) delineated a theory of problem gambling based on the experiences of treatment seeking male gamblers and allowed predictions to be made regarding the processes that differentiate between normal and problem gamblers. These predictions are the focus of the present study, which also utilised a grounded theory approach, but with a sample of male high frequency normal gamblers. The findings suggest that there are common aspects of gambling associated with arousal and a sense of achievement. The use of gambling to manage negative emotional states differentiated normal and problem gambling. Perceived self-efficacy , emotion management skills and perceived likelihood of winning money back were intervening variables differentiating problem and normal gamblers.</p

    Search for WW and WZ production in lepton plus jets final state at CDF

    Get PDF
    We present a search for WW and WZ production in final states that contain a charged lepton (electron or muon) and at least two jets, produced in sqrt(s) = 1.96 TeV ppbar collisions at the Fermilab Tevatron, using data corresponding to 1.2 fb-1 of integrated luminosity collected with the CDF II detector. Diboson production in this decay channel has yet to be observed at hadron colliders due to the large single W plus jets background. An artificial neural network has been developed to increase signal sensitivity, as compared with an event selection based on conventional cuts. We set a 95% confidence level upper limit of sigma_{WW}* BR(W->lnu,W->jets)+ sigma_{WZ}*BR(W->lnu,Z->jets)We present a search for WW and WZ production in final states that contain a charged lepton (electron or muon) and at least two jets, produced in √s=1.96  TeV pp̅ collisions at the Fermilab Tevatron, using data corresponding to 1.2  fb-1 of integrated luminosity collected with the CDF II detector. Diboson production in this decay channel has yet to be observed at hadron colliders due to the large single W plus jets background. An artificial neural network has been developed to increase signal sensitivity, as compared with an event selection based on conventional cuts. We set a 95% confidence level upper limit of σWW×BR(W→ℓνℓ,W→jets)+σWZ×BR(W→ℓνℓ,Z→jets)<2.88  pb, which is consistent with the standard model next-to-leading-order cross section calculation for this decay channel of 2.09±0.12  pb.Peer reviewe

    Substitutions near the hemagglutinin receptor-binding site determine the antigenic evolution of influenza A H3N2 viruses in U.S. swine

    Get PDF
    Swine influenza A virus is an endemic and economically important pathogen in pigs, with the potential to infect other host species. The hemagglutinin (HA) protein is the primary target of protective immune responses and the major component in swine influenza A vaccines. However, as a result of antigenic drift, vaccine strains must be regularly updated to reflect currently circulating strains. Characterizing the cross-reactivity between strains in pigs and seasonal influenza virus strains in humans is also important in assessing the relative risk of interspecies transmission of viruses from one host population to the other. Hemagglutination inhibition (HI) assay data for swine and human H3N2 viruses were used with antigenic cartography to quantify the antigenic differences among H3N2 viruses isolated from pigs in the United States from 1998 to 2013 and the relative cross-reactivity between these viruses and current human seasonal influenza A virus strains. Two primary antigenic clusters were found circulating in the pig population, but with enough diversity within and between the clusters to suggest updates in vaccine strains are needed. We identified single amino acid substitutions that are likely responsible for antigenic differences between the two primary antigenic clusters and between each antigenic cluster and outliers. The antigenic distance between current seasonal influenza virus H3 strains in humans and those endemic in swine suggests that population immunity may not prevent the introduction of human viruses into pigs, and possibly vice versa, reinforcing the need to monitor and prepare for potential incursions

    A qualitative study of stakeholders' perspectives on the social network service environment

    Get PDF
    Over two billion people are using the Internet at present, assisted by the mediating activities of software agents which deal with the diversity and complexity of information. There are, however, ethical issues due to the monitoring-and-surveillance, data mining and autonomous nature of software agents. Considering the context, this study aims to comprehend stakeholders' perspectives on the social network service environment in order to identify the main considerations for the design of software agents in social network services in the near future. Twenty-one stakeholders, belonging to three key stakeholder groups, were recruited using a purposive sampling strategy for unstandardised semi-structured e-mail interviews. The interview data were analysed using a qualitative content analysis method. It was possible to identify three main considerations for the design of software agents in social network services, which were classified into the following categories: comprehensive understanding of users' perception of privacy, user type recognition algorithms for software agent development and existing software agents enhancement

    ‘Get yourself some nice, neat, matching box files’: research administrators and occupational identity work

    Get PDF
    To date, qualitative research into occupational groups and cultures within academia has been relatively scarce, with an almost exclusive concentration upon teaching staff within universities and colleges. This article seeks to address this lacuna and applies the interactionist concept of ‘identity work’ in order to examine one specific group to date under-researched: graduate research administrators. This occupational group is of sociological interest as many of its members appear to span the putative divide between ‘academic’ and ‘administrative’ occupational worlds within higher education. An exploratory, qualitative research project was undertaken, based upon interviews with 27 research administrators. The study analyses how research administrators utilise various forms of identity work to sustain credible occupational identities, often in the face of considerable challenge from their academic colleagues

    Personalised service? Changing the role of the government librarian

    Get PDF
    Investigates the feasibility of personalised information service in a government department. A qualitative methodology explored stakeholder opinions on the remit, marketing, resourcing and measurement of the service. A questionnaire and interviews gathered experiences of personalised provision across the government sector. Potential users were similarly surveyed to discuss how the service could meet their needs. Data were analysed using coding techniques to identify emerging theory. Lessons learned from government librarians centred on clarifying requirements, balancing workloads and selective marketing. The user survey showed low usage and awareness of existing specialist services, but high levels of need and interest in services repackaged as a tailored offering. Fieldwork confirmed findings from the literature on the scope for adding value through information management advice, information skills training and substantive research assistance and the need to understand business processes and develop effective partnerships. Concluding recommendations focus on service definition, strategic marketing, resource utilisation and performance measurement
    corecore