5,188 research outputs found

    The Original Understanding of the New Hampshire Constitution’s Education Clause

    Get PDF
    [Excerpt] “In 1993, the New Hampshire Supreme Court held that “part II, article 83 [of the state constitution] imposes a duty on the State to provide a constitutionally adequate education to every educable child in the public schools in New Hampshire and to guarantee adequate funding,” and that this duty is enforceable by the judiciary. This decision, known as Claremont I, was the wellspring of a line of decisions that has radically changed both the manner in which public education is funded in New Hampshire and the respective roles of the judicial branch and the representative branches in formulating education policy. Since the adoption of the state constitution in 1784, public education in New Hampshire had been funded primarily with local taxes. The Claremont decisions flatly rejected this long tradition of local control of the funding of public education: “Whatever the State identifies as comprising constitutional adequacy it must pay for. None of that financial obligation can be shifted to local school districts, regardless of their relative wealth or need.”

    New Hampshire’s Claremont Case and the Separation of Powers

    Get PDF
    [Excerpt] Court decisions involving the adequacy of public education raise some obvious separation of powers problems. These include the institutional competency of courts to determine what level of education is adequate and how much funding is necessary to reach that level, and the authority of courts to enforce such judgments. This article will examine these problems through New Hampshire’s serial education funding litigation, the Claremont case. [. . .] I will start by briefly reviewing the history of education funding litigation because this context is essential to understanding the Claremont case. I will then undertake a limited review of the Claremont case. Finally, I will consider Claremont from the standpoint of the separation of powers. I begin by examining the text and structure of the State Constitution and then consider whether there are judicially discoverable and manageable standards for determining what level of education is adequate and how much funding is necessary to reach that level. Because there is a textually demonstrable commitment of education funding and education policy to the legislative branch, and because what an adequate education comprises and costs are quintessentially political questions, Claremont represents a clear trespass on legislative powers and should be overruled.

    Health Insurance Competition: The Effect of Group Contracts

    Get PDF
    In countries like the US and the Netherlands health insurance is provided by private firms. These private firms can offer both individual and group contracts. The strategic and welfare implications of such group contracts are not well understood. Using a Dutch data set of about 700 group health insurance contracts over the period 2007-2008, we estimate a model to determine which factors explain the price of group contracts. We find that groups that are located close to an insurers’ home turf pay a higher premium than other groups. This finding is not consistent with the bargaining argument in the literature as it implies that concentrated groups close to an insurer’s home turf should get (if any) a larger discount than other groups. A simple Hotelling model, however, does explain our empirical results.health insurance;health-plan choice;managed competition

    Note about a second "evidence" for a WIMP annual modulation

    Full text link
    This note, with its five questions, is intended to contribute to a clarification about a claimed "evidence" by the DAMA group of an annual modulation of the counting rate of a Dark Matter NaI(Tl) detector as due to a neutralino (SUSY-LSP) Dark Matter candidate.Comment: LaTex, 3 pages, 2 figure

    On Quantum Algorithms

    Get PDF
    Quantum computers use the quantum interference of different computational paths to enhance correct outcomes and suppress erroneous outcomes of computations. In effect, they follow the same logical paradigm as (multi-particle) interferometers. We show how most known quantum algorithms, including quantum algorithms for factorising and counting, may be cast in this manner. Quantum searching is described as inducing a desired relative phase between two eigenvectors to yield constructive interference on the sought elements and destructive interference on the remaining terms.Comment: 15 pages, 8 figure

    Interface bonding of a ferromagnetic/semiconductor junction : a photoemission study of Fe/ZnSe(001)

    Full text link
    We have probed the interface of a ferromagnetic/semiconductor (FM/SC) heterojunction by a combined high resolution photoemission spectroscopy and x-ray photoelectron diffraction study. Fe/ZnSe(001) is considered as an example of a very low reactivity interface system and it expected to constitute large Tunnel Magnetoresistance devices. We focus on the interface atomic environment, on the microscopic processes of the interface formation and on the iron valence-band. We show that the Fe contact with ZnSe induces a chemical conversion of the ZnSe outermost atomic layers. The main driving force that induces this rearrangement is the requirement for a stable Fe-Se bonding at the interface and a Se monolayer that floats at the Fe growth front. The released Zn atoms are incorporated in substitution in the Fe lattice position. This formation process is independent of the ZnSe surface termination (Zn or Se). The Fe valence-band evolution indicates that the d-states at the Fermi level show up even at submonolayer Fe coverage but that the Fe bulk character is only recovered above 10 monolayers. Indeed, the Fe 1-band states, theoretically predicted to dominate the tunneling conductance of Fe/ZnSe/Fe junctions, are strongly modified at the FM/SC interface.Comment: 23 pages, 5 figures, submitted to Physical review

    Quantum Networks for Concentrating Entanglement

    Get PDF
    If two parties, Alice and Bob, share some number, n, of partially entangled pairs of qubits, then it is possible for them to concentrate these pairs into some smaller number of maximally entangled states. We present a simplified version of the algorithm for such entanglement concentration, and we describe efficient networks for implementing these operations.Comment: 15 pages, 2 figure

    Quantum state restoration and single-copy tomography

    Full text link
    Given a single copy of an n qubit quantum state |psi>, the no-cloning theorem greatly limits the amount of information which can be extracted from it. Moreover, given only a procedure which verifies the state, for example a procedure which measures the operator |psi> in time polynomial in n . In this paper, we consider the scenario in which we are given both a single copy of |psi> and the ability to verify it. We show that in this setting, we can do several novel things efficiently. We present a new algorithm that we call quantum state restoration which allows us to extend a large subsystem of |psi> to the full state, and in turn this allows us to copy small subsystems of |psi>. In addition, we present algorithms that can perform tomography on small subsystems of |psi>, and we show how to use these algorithms to estimate the statistics of any efficiently implementable POVM acting on |psi> in time polynomial in the number of outcomes of the POVM.Comment: edited for clarity; 13 pages, 1 figur

    Restrictions on Transversal Encoded Quantum Gate Sets

    Full text link
    Transversal gates play an important role in the theory of fault-tolerant quantum computation due to their simplicity and robustness to noise. By definition, transversal operators do not couple physical subsystems within the same code block. Consequently, such operators do not spread errors within code blocks and are, therefore, fault tolerant. Nonetheless, other methods of ensuring fault tolerance are required, as it is invariably the case that some encoded gates cannot be implemented transversally. This observation has led to a long-standing conjecture that transversal encoded gate sets cannot be universal. Here we show that the ability of a quantum code to detect an arbitrary error on any single physical subsystem is incompatible with the existence of a universal, transversal encoded gate set for the code.Comment: 4 pages, v2: minor change
    corecore