3,649 research outputs found

    Airbag Products Liability Litigation: State Common Law Tort Claims Are Not Automatically Preempted by Federal Legislation

    Get PDF
    This article addresses an important and recurring issue of federalism, and attempts to resolve the tensions that exist between federal and state laws in the context of recent automobile airbag litigation. The authors trace the evolution of the preemption doctrine as it relates to airbag litigation, and write further as to how manufacturers adapt, developing business and ethical strategies of compliance to concurrent state and federal regulation. Two recent important decisions involving no airbag litigation, Tebbetts v. Ford Motor Co. and Wilson v. Pleasant, are interpretive of two provisions of the Safety Act. The former case discussed a preemption clause, and the latter a state common law savings clause. These cases have posed important and controversial legal and ethical issues that have an enormous impact on auto manufacturers\u27 exposure to liability. This article will discuss the issues emanating from the decisions in Tebbetts and Wilson with major emphasis on the doctrine of preemption, the Supremacy Clause of the U.S. Constitution, state police powers, the potential of the judiciary to shape business policy, and the ethical obligations of auto manufacturers to the many stakeholders involved. In addition, the authors proffer suggestions regarding the best road to travel when there are different options for meeting the overlapping layers of federal and state safety requirements

    Exploring barriers in expertise seeking : why don\u27t they ask an expert?

    Get PDF
    This paper reports findings from a research project that explores reasons why some employees prefer to seek expertise to resolve work-related problems from direct colleagues rather than designated internal experts. Several studies suggest that while an expert generally provides a higher quality solution in a shorter time, workers tend to ask friendly or proximate colleagues to help with knowledge-based problems at work. Prior research provides only fragmented insights into understanding the barriers to asking a designated internal expert for help at work. To address this gap, we asked post-graduate students enrolled in a knowledge management subject at a large Australian university to share their perspectives in an online discussion forum. Content analysis of the collected perspectives enabled identification of twenty-one factors that may limit the seeking of expertise from a designated internal expert. The factors are grouped in four categories: environment, accessibility, communication and personality. In addition one context variable is described, determining the extent to which the barriers are influential in a specific situation. By synthesising the results, we have proposed two models of expertise-seeking barriers. A literature review helps validate the barriers identified by the study. Key theoretical and practical implications are also discussed.<br /

    Intrusion Detection Systems for Community Wireless Mesh Networks

    Get PDF
    Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive. Unfortunately, computer networks (including mesh networks) are frequently being exploited by increasingly profit-driven and insidious attackers, which can affect their utility for legitimate use. In response to this, a number of countermeasures have been developed, including intrusion detection systems that aim to detect anomalous behaviour caused by attacks. We present a set of socio-technical challenges associated with developing an intrusion detection system for a community wireless mesh network. The attack space on a mesh network is particularly large; we motivate the need for and describe the challenges of adopting an asset-driven approach to managing this space. Finally, we present an initial design of a modular architecture for intrusion detection, highlighting how it addresses the identified challenges

    Domino Tatami Covering is NP-complete

    Full text link
    A covering with dominoes of a rectilinear region is called \emph{tatami} if no four dominoes meet at any point. We describe a reduction from planar 3SAT to Domino Tatami Covering. As a consequence it is NP-complete to decide whether there is a perfect matching of a graph that meets every 4-cycle, even if the graph is restricted to be an induced subgraph of the grid-graph. The gadgets used in the reduction were discovered with the help of a SAT-solver.Comment: 10 pages, accepted at The International Workshop on Combinatorial Algorithms (IWOCA) 201

    Simple Wriggling is Hard unless You Are a Fat Hippo

    Full text link
    We prove that it is NP-hard to decide whether two points in a polygonal domain with holes can be connected by a wire. This implies that finding any approximation to the shortest path for a long snake amidst polygonal obstacles is NP-hard. On the positive side, we show that snake's problem is "length-tractable": if the snake is "fat", i.e., its length/width ratio is small, the shortest path can be computed in polynomial time.Comment: A shorter version is to be presented at FUN 201

    Celestial mechanics of elastic bodies

    Get PDF
    We construct time independent configurations of two gravitating elastic bodies. These configurations either correspond to the two bodies moving in a circular orbit around their center of mass or strictly static configurations.Comment: 16 pages, 2 figures, several typos removed, erratum appeared in MathZ.263:233,200

    Dynamical Mean-Field Theory within the Full-Potential Methods: Electronic structure of Ce-115 materials

    Full text link
    We implemented the charge self-consistent combination of Density Functional Theory and Dynamical Mean Field Theory (DMFT) in two full-potential methods, the Augmented Plane Wave and the Linear Muffin-Tin Orbital methods. We categorize the commonly used projection methods in terms of the causality of the resulting DMFT equations and the amount of partial spectral weight retained. The detailed flow of the Dynamical Mean Field algorithm is described, including the computation of response functions such as transport coefficients. We discuss the implementation of the impurity solvers based on hybridization expansion and an analytic continuation method for self-energy. We also derive the formalism for the bold continuous time quantum Monte Carlo method. We test our method on a classic problem in strongly correlated physics, the isostructural transition in Ce metal. We apply our method to the class of heavy fermion materials CeIrIn_5, CeCoIn_5 and CeRhIn_5 and show that the Ce 4f electrons are more localized in CeRhIn_5 than in the other two, a result corroborated by experiment. We show that CeIrIn_5 is the most itinerant and has a very anisotropic hybridization, pointing mostly towards the out-of-plane In atoms. In CeRhIn_5 we stabilized the antiferromagnetic DMFT solution below 3K, in close agreement with the experimental N\'eel temperature.Comment: The implementation of Bold-CTQMC added and some test of the method adde

    Sustaining entrepreneurial business: a complexity perspective on processes that produce emergent practice

    Get PDF
    This article examines the management practices in an entrepreneurial small firm which sustain the business. Using a longitudinal qualitative case study, four general processes are identified (experimentation, reflexivity, organising and sensing), that together provide a mechanism to sustain the enterprise. The analysis draws on concepts from entrepreneurship and complexity science. We suggest that an entrepreneur’s awareness of the role of these parallel processes will facilitate their approaches to sustaining and developing enterprises. We also suggest that these processes operate in parallel at multiple levels, including the self, the business and inter-firm networks. This finding contributes to a general theory of entrepreneurship. A number of areas for further research are discussed arising from this result

    Information scraps: how and why information eludes our personal information management tools

    No full text
    In this paper we describe information scraps -- a class of personal information whose content is scribbled on Post-it notes, scrawled on corners of random sheets of paper, buried inside the bodies of e-mail messages sent to ourselves, or typed haphazardly into text files. Information scraps hold our great ideas, sketches, notes, reminders, driving directions, and even our poetry. We define information scraps to be the body of personal information that is held outside of its natural or We have much still to learn about these loose forms of information capture. Why are they so often held outside of our traditional PIM locations and instead on Post-its or in text files? Why must we sometimes go around our traditional PIM applications to hold on to our scraps, such as by e-mailing ourselves? What are information scraps' role in the larger space of personal information management, and what do they uniquely offer that we find so appealing? If these unorganized bits truly indicate the failure of our PIM tools, how might we begin to build better tools? We have pursued these questions by undertaking a study of 27 knowledge workers. In our findings we describe information scraps from several angles: their content, their location, and the factors that lead to their use, which we identify as ease of capture, flexibility of content and organization, and avilability at the time of need. We also consider the personal emotive responses around scrap management. We present a set of design considerations that we have derived from the analysis of our study results. We present our work on an application platform, jourknow, to test some of these design and usability findings
    corecore