7,628 research outputs found
Advancing Faculty DiversityThrough Self-Directed Mentoring
Mentoring is widely acknowledged to be important in career success, yet may be lacking for female and minority law professors, contributing to disparities in retention and promotion of diverse faculty. This Article presents the results of a unique diversity mentoring program conducted at one law school. Mentoring is often thought of as something directed by the mentor on behalf of the protégé. Our framework inverts that model, empowering diverse faculty members to proactively cultivate their own networks of research mentors. The studied intervention consisted of modest programming on mentorship, along with supplemental travel funds to focus specifically on travel for the purpose of cultivating mentors beyond one’s own institution. Participants were responsible for setting their own mentorship goals, approaching mentors and arranging meetings, and reporting annually on their activities and progress. Both quantitative and qualitative evidence demonstrate that the program has been effective along its measurable goals in its first year. Participants report growing their networks of mentors, receiving significant advice on research and the tenure process, and being sponsored for new opportunities. The authors conclude that this type of mentoring initiative, if more broadly applied, could have a significant impact on reducing disparities in retention and promotion in the legal academy. To facilitate such replication, the Article describes both the process of designing the program and the actual operation of the program as carried out at one school. In sum, the Article offers a concrete starting point for discussions at any law school interested in advancing faculty diversity through improved mentoring
Performance of polar codes for quantum and private classical communication
We analyze the practical performance of quantum polar codes, by computing
rigorous bounds on block error probability and by numerically simulating them.
We evaluate our bounds for quantum erasure channels with coding block lengths
between 2^10 and 2^20, and we report the results of simulations for quantum
erasure channels, quantum depolarizing channels, and "BB84" channels with
coding block lengths up to N = 1024. For quantum erasure channels, we observe
that high quantum data rates can be achieved for block error rates less than
10^(-4) and that somewhat lower quantum data rates can be achieved for quantum
depolarizing and BB84 channels. Our results here also serve as bounds for and
simulations of private classical data transmission over these channels,
essentially due to Renes' duality bounds for privacy amplification and
classical data transmission of complementary observables. Future work might be
able to improve upon our numerical results for quantum depolarizing and BB84
channels by employing a polar coding rule other than the heuristic used here.Comment: 8 pages, 6 figures, submission to the 50th Annual Allerton Conference
on Communication, Control, and Computing 201
Collisions of solitons and vortex rings in cylindrical Bose-Einstein condensates
Interactions of solitary waves in a cylindrically confined Bose-Einstein
condensate are investigated by simulating their head-on collisions. Slow vortex
rings and fast solitons are found to collide elastically contrary to the
situation in the three-dimensional homogeneous Bose gas. Strongly inelastic
collisions are absent for low density condensates but occur at higher densities
for intermediate velocities. The scattering behaviour is rationalised by use of
dispersion diagrams. During inelastic collisions, spherical shell-like
structures of low density are formed and they eventually decay into depletion
droplets with solitary wave features. The relation to similar shells observed
in a recent experiment [Ginsberg et al. Phys Rev. Lett. 94, 040403 (2005)] is
discussed
Recommended from our members
Organizational Images And Member Identification
We develop a model to explain how images of one's work organization shape the strength of his or her identification with the organization. We focus on two key organizational images: one based on what a member believes is distinctive, central, and enduring about his or her organization and one based on a member's beliefs about what outsiders think about the organization. According to the model, members assess the attractiveness of these images by how well the image preserves the continuity of their self-concept, provides distinctiveness, and enhances self-esteem. The model leads to a number of propositions about how organizational identification affects members' patterns of social interaction.Managemen
A machine vision extension for the Ruby programming language
Dynamically typed scripting languages have become popular in recent years. Although interpreted languages allow for substantial reduction of software development time, they are often rejected due to performance concerns.
In this paper we present an extension for the programming
language Ruby, called HornetsEye, which facilitates the development
of real-time machine vision algorithms within Ruby. Apart from providing integration of crucial libraries for input and output, HornetsEye provides fast native implementations (compiled code) for a generic set of array operators. Different array operators were compared with equivalent implementations in C++. Not only was it possible to achieve comparable real-time performance, but also to exceed the efficiency of the C++ implementation in several cases.
Implementations of several algorithms were given to demonstrate
how the array operators can be used to create concise
implementations.</p
Virtual Witness Confrontation in Criminal Cases
Maritime piracy is a serious problem, yet states are not prosecuting captured pirates with any regularity. One of the many reasons cited to explain this phenomenon focuses on the expense and difficulty of mounting cases of such international proportions and which involve evidence, suspects, victims, and witnesses from around the globe. In an effort to help close the impunity gap that surrounds piracy, this Article offers a potential solution to the difficulties associated with obtaining live witness testimony. It proposes a rule to allow witnesses under some circumstances to testify remotely by way of two-way, live videoconferencing technology. While remote testimony need not become the norm in maritime piracy cases, the proposed rule is carefully structured to balance both the public\u27s and the defendant\u27s interest in a fair trial
- …