16,764 research outputs found

    A signature of anisotropic bubble collisions

    Full text link
    Our universe may have formed via bubble nucleation in an eternally-inflating background. Furthermore, the background may have a compact dimension---the modulus of which tunnels out of a metastable minimum during bubble nucleation---which subsequently grows to become one of our three large spatial dimensions. When in this scenario our bubble universe collides with other ones like it, the collision geometry is constrained by the reduced symmetry of the tunneling instanton. While the regions affected by such bubble collisions still appear (to leading order) as disks in an observer's sky, the centers of these disks all lie on a single great circle, providing a distinct signature of anisotropic bubble nucleation.Comment: 10 pages, 5 figures; v2: crucial error corrected, conclusions revise

    Closed conformal Killing-Yano tensor and geodesic integrability

    Full text link
    Assuming the existence of a single rank-2 closed conformal Killing-Yano tensor with a certain symmetry we show that there exist mutually commuting rank-2 Killing tensors and Killing vectors. We also discuss the condition of separation of variables for the geodesic Hamilton-Jacobi equations.Comment: 17 pages, no figure, LaTe

    Proof of the Generalized Second Law for Quasistationary Semiclassical Black Holes

    Full text link
    A simple direct explicit proof of the generalized second law of black hole thermodynamics is given for a quasistationary semiclassical black hole.Comment: 12 pages, LaTeX, report Alberta-Thy-10-93 (revision of paper in response to Phys. Rev. Lett. referees' comments, which suffered a series of long delays

    Software Engineering Laboratory (SEL). Data base organization and user's guide, revision 1

    Get PDF
    The structure of the Software Engineering Laboratory (SEL) data base is described. It defines each data base file in detail and provides information about how to access and use the data for programmers and other users. Several data base reporting programs are described also

    Going nuclear: gene family evolution and vertebrate phylogeny reconciled

    Get PDF
    Gene duplications have been common throughout vertebrate evolution, introducing paralogy and so complicating phylogenctic inference from nuclear genes. Reconciled trees are one method capable of dealing with paralogy, using the relationship between a gene phylogeny and the phylogeny of the organisms containing those genes to identify gene duplication events. This allows us to infer phylogenies from gene families containing both orthologous and paralogous copies. Vertebrate phylogeny is well understood from morphological and palaeontological data, but studies using mitochondrial sequence data have failed to reproduce this classical view. Reconciled tree analysis of a database of 118 vertebrate gene families supports a largely classical vertebrate phylogeny

    A window into the neutron star: Modelling the cooling of accretion heated neutron star crusts

    Full text link
    In accreting neutron star X-ray transients, the neutron star crust can be substantially heated out of thermal equilibrium with the core during an accretion outburst. The observed subsequent cooling in quiescence (when accretion has halted) offers a unique opportunity to study the structure and thermal properties of the crust. Initially crust cooling modelling studies focussed on transient X-ray binaries with prolonged accretion outbursts (> 1 year) such that the crust would be significantly heated for the cooling to be detectable. Here we present the results of applying a theoretical model to the observed cooling curve after a short accretion outburst of only ~10 weeks. In our study we use the 2010 outburst of the transiently accreting 11 Hz X-ray pulsar in the globular cluster Terzan 5. Observationally it was found that the crust in this source was still hot more than 4 years after the end of its short accretion outburst. From our modelling we found that such a long-lived hot crust implies some unusual crustal properties such as a very low thermal conductivity (> 10 times lower than determined for the other crust cooling sources). In addition, we present our preliminary results of the modelling of the ongoing cooling of the neutron star in MXB 1659-298. This transient X-ray source went back into quiescence in March 2017 after an accretion phase of ~1.8 years. We compare our predictions for the cooling curve after this outburst with the cooling curve of the same source obtained after its previous outburst which ended in 2001.Comment: 4 pages, 1 figure, to appear in the proceedings of "IAUS 337: Pulsar Astrophysics - The Next 50 Years" eds: P. Weltevrede, B.B.P. Perera, L. Levin Preston & S. Sanida

    What Have We Learned from Policy Transfer Research? Dolowitz and Marsh Revisited

    Get PDF
    Over the last decade, policy transfer has emerged as an important concept within public policy analysis, guiding both theoretical and empirical research spanning many venues and issue areas. Using Dolowitz and Marsh's 1996 stocktake as its starting point, this article reviews what has been learned by whom and for what purpose. It finds that the literature has evolved from its rather narrow, state-centred roots to cover many more actors and venues. While policy transfer still represents a niche topic for some researchers, an increasing number have successfully assimilated it into wider debates on topics such as globalisation, Europeanisation and policy innovation. This article assesses the concept's position in the overall ‘tool-kit’ of policy analysis, examines some possible future directions and reflects on their associated risks and opportunities

    Towards operational measures of computer security

    Get PDF
    Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free of security breaches under particular conditions of operation (including attack). Instead, current security levels at best merely reflect the extensiveness of safeguards introduced during the design and development of a system. Whilst we might expect a system developed to a higher level than another to exhibit ‘more secure behaviour’ in operation, this cannot be guaranteed; more particularly, we cannot infer what the actual security behaviour will be from knowledge of such a level. In the paper we discuss similarities between reliability and security with the intention of working towards measures of ‘operational security’ similar to those that we have for reliability of systems. Very informally, these measures could involve expressions such as the rate of occurrence of security breaches (cf rate of occurrence of failures in reliability), or the probability that a specified ‘mission’ can be accomplished without a security breach (cf reliability function). This new approach is based on the analogy between system failure and security breach. A number of other analogies to support this view are introduced. We examine this duality critically, and have identified a number of important open questions that need to be answered before this quantitative approach can be taken further. The work described here is therefore somewhat tentative, and one of our major intentions is to invite discussion about the plausibility and feasibility of this new approach
    • …
    corecore