1,750 research outputs found

    The Use and Abuse of Special-Purpose Entities in Public Finance

    Get PDF
    States increasingly are raising financing indirectly through special-purpose entities (SPEs), variously referred to as authorities, special authorities, or public authorities. Notwithstanding their long history and increasingly widespread use, relatively little is known or has been written about these entities. This article examines state SPEs and their functions, comparing them to SPEs used in corporate finance. States, even more than corporations, use these entities to reduce financial transparency and avoid public scrutiny, seriously threatening the integrity of public finance. The article analyzes how regulation could be designed in order to control that threat while maintaining the legitimate financing benefits provided by these state entities

    Continued investigation of LDEF's structural frame and thermal blankets by the Meteoroid and Debris Special Investigation Group

    Get PDF
    This report focuses on the data acquired by detailed examination of LDEF intercostals, 68 of which are now in possession of the Meteoroid and Debris Special Investigation Group (M&D SIG) at JSC. In addition, limited data will be presented for several small sections from the A0178 thermal control blankets that were examined/counted prior to being shipped to Principal Investigators (PI's) for scientific study. The data presented here are limited to measurements of crater and penetration-hole diameters and their frequency of occurrence which permits, yet also constrains, more model-dependent, interpretative efforts. Such efforts will focus on the conversion of crater and penetration-hole sizes to projectile diameters (and masses), on absolute particle fluxes, and on the distribution of particle-encounter velocities. These are all complex issues that presently cannot be pursued without making various assumptions which relate, in part, to crater-scaling relationships, and to assumed trajectories of natural and man-made particle populations in LEO that control the initial impact conditions

    Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution

    Get PDF
    The Internet relies on an underlying centralized hierarchy built into the domain name system (DNS) to control the routing for the vast majority of Internet traffic. At its heart is a single data file, known as the root. Control of the root provides singular power in cyberspace. This Article first describes how the United States government found itself in control of the root. It then describes how, in an attempt to meet concerns that the United States could so dominate an Internet chokepoint, the U. S. Department of Commerce (DoC) summoned into being the Internet Corporation for Assigned Names and Numbers (ICANN), a formally private nonprofit California corporation. DoC then signed contracts with ICANN in order to clothe it with most of the U. S. government\u27s power over the DNS, and convinced other parties to recognize ICANN\u27s authority. ICANN then took regulatory actions that the U. S. Department of Commerce was unable or unwilling to make itself, including the imposition on all registrants of Internet addresses of an idiosyncratic set of arbitration rules and procedures that benefit third-party trademark holders. Professor Froomkin then argues that the use of ICANN to regulate in the stead of an executive agency violates fundamental values and policies designed to ensure democratic control over the use of government power, and sets a precedent that risks being expanded into other regulatory activities. He argues that DoC\u27s use of ICANN to make rules either violates the APA\u27s requirement for notice and comment in rulemaking and judicial review, or it violates the Constitution\u27s nondelegation doctrine. Professor Froomkin reviews possible alternatives to ICANN, and ultimately proposes a decentralized structure in which the namespace of the DNS is spread out over a transnational group of policy partners with DoC

    Language of Lullabies: The Russification and De-Russification of the Baltic States

    Get PDF
    This article argues that the laws for promotion of the national languages are a legitimate means for the Baltic states to establish their cultural independence from Russia and the former Soviet Union

    CPT and Other Symmetries in String/M Theory

    Get PDF
    We initiate a search for non-perturbative consistency conditions in M theory. Some non-perturbative conditions are already known in Type I theories; we review these and search for others. We focus principally on possible anomalies in discrete symmetries. It is generally believed that discrete symmetries in string theories are gauge symmetries, so anomalies would provide evidence for inconsistencies. Using the orbifold cosmic string construction, we give some evidence that the symmetries we study are gauged. We then search for anomalies in discrete symmetries in a variety of models, both with and without supersymmetry. In symmetric orbifold models we extend previous searches, and show in a variety of examples that all anomalies may be canceled by a Green-Schwarz mechanism. We explore some asymmetric orbifold constructions and again find that all anomalies may be canceled this way. Then we turn to Type IIB orientifold models where it is known that even perturbative anomalies are non-universal. In the examples we study, by combining geometric discrete symmetries with continuous gauge symmetries, one may define non-anomalous discrete symmetries already in perturbation theory; in other cases, the anomalies are universal. Finally, we turn to the question of CPT conservation in string/M theory. It is well known that CPT is conserved in all string perturbation expansions; here in a number of examples for which a non-perturbative formulation is available we provide evidence that it is conserved exactly.Comment: 52 pages.1 paragraph added in introduction to clarify assumption
    • …
    corecore