16,764 research outputs found
A signature of anisotropic bubble collisions
Our universe may have formed via bubble nucleation in an eternally-inflating
background. Furthermore, the background may have a compact dimension---the
modulus of which tunnels out of a metastable minimum during bubble
nucleation---which subsequently grows to become one of our three large spatial
dimensions. When in this scenario our bubble universe collides with other ones
like it, the collision geometry is constrained by the reduced symmetry of the
tunneling instanton. While the regions affected by such bubble collisions still
appear (to leading order) as disks in an observer's sky, the centers of these
disks all lie on a single great circle, providing a distinct signature of
anisotropic bubble nucleation.Comment: 10 pages, 5 figures; v2: crucial error corrected, conclusions revise
Closed conformal Killing-Yano tensor and geodesic integrability
Assuming the existence of a single rank-2 closed conformal Killing-Yano
tensor with a certain symmetry we show that there exist mutually commuting
rank-2 Killing tensors and Killing vectors. We also discuss the condition of
separation of variables for the geodesic Hamilton-Jacobi equations.Comment: 17 pages, no figure, LaTe
Proof of the Generalized Second Law for Quasistationary Semiclassical Black Holes
A simple direct explicit proof of the generalized second law of black hole
thermodynamics is given for a quasistationary semiclassical black hole.Comment: 12 pages, LaTeX, report Alberta-Thy-10-93 (revision of paper in
response to Phys. Rev. Lett. referees' comments, which suffered a series of
long delays
Software Engineering Laboratory (SEL). Data base organization and user's guide, revision 1
The structure of the Software Engineering Laboratory (SEL) data base is described. It defines each data base file in detail and provides information about how to access and use the data for programmers and other users. Several data base reporting programs are described also
Going nuclear: gene family evolution and vertebrate phylogeny reconciled
Gene duplications have been common throughout vertebrate evolution, introducing paralogy and so complicating phylogenctic inference from nuclear genes. Reconciled trees are one method capable of dealing with paralogy, using the relationship between a gene phylogeny and the phylogeny of the organisms containing those genes to identify gene duplication events. This allows us to infer phylogenies from gene families containing both orthologous and paralogous copies. Vertebrate phylogeny is well understood from morphological and palaeontological data, but studies using mitochondrial sequence data have failed to reproduce this classical view. Reconciled tree analysis of a database of 118 vertebrate gene families supports a largely classical vertebrate phylogeny
A window into the neutron star: Modelling the cooling of accretion heated neutron star crusts
In accreting neutron star X-ray transients, the neutron star crust can be
substantially heated out of thermal equilibrium with the core during an
accretion outburst. The observed subsequent cooling in quiescence (when
accretion has halted) offers a unique opportunity to study the structure and
thermal properties of the crust. Initially crust cooling modelling studies
focussed on transient X-ray binaries with prolonged accretion outbursts (> 1
year) such that the crust would be significantly heated for the cooling to be
detectable. Here we present the results of applying a theoretical model to the
observed cooling curve after a short accretion outburst of only ~10 weeks. In
our study we use the 2010 outburst of the transiently accreting 11 Hz X-ray
pulsar in the globular cluster Terzan 5. Observationally it was found that the
crust in this source was still hot more than 4 years after the end of its short
accretion outburst. From our modelling we found that such a long-lived hot
crust implies some unusual crustal properties such as a very low thermal
conductivity (> 10 times lower than determined for the other crust cooling
sources). In addition, we present our preliminary results of the modelling of
the ongoing cooling of the neutron star in MXB 1659-298. This transient X-ray
source went back into quiescence in March 2017 after an accretion phase of ~1.8
years. We compare our predictions for the cooling curve after this outburst
with the cooling curve of the same source obtained after its previous outburst
which ended in 2001.Comment: 4 pages, 1 figure, to appear in the proceedings of "IAUS 337: Pulsar
Astrophysics - The Next 50 Years" eds: P. Weltevrede, B.B.P. Perera, L. Levin
Preston & S. Sanida
What Have We Learned from Policy Transfer Research? Dolowitz and Marsh Revisited
Over the last decade, policy transfer has emerged as an important concept within public policy analysis, guiding both theoretical and empirical research spanning many venues and issue areas. Using Dolowitz and Marsh's 1996 stocktake as its starting point, this article reviews what has been learned by whom and for what purpose. It finds that the literature has evolved from its rather narrow, state-centred roots to cover many more actors and venues. While policy transfer still represents a niche topic for some researchers, an increasing number have successfully assimilated it into wider debates on topics such as globalisation, Europeanisation and policy innovation. This article assesses the concept's position in the overall ‘tool-kit’ of policy analysis, examines some possible future directions and reflects on their associated risks and opportunities
Towards operational measures of computer security
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free of security breaches under particular conditions of operation (including attack). Instead, current security levels at best merely reflect the extensiveness of safeguards introduced during the design and development of a system. Whilst we might expect a system developed to a higher level than another to exhibit ‘more secure behaviour’ in operation, this cannot be guaranteed; more particularly, we cannot infer what the actual security behaviour will be from knowledge of such a level. In the paper we discuss similarities between reliability and security with the intention of working towards measures of ‘operational security’ similar to those that we have for reliability of systems. Very informally, these measures could involve expressions such as the rate of occurrence of security breaches (cf rate of occurrence of failures in reliability), or the probability that a specified ‘mission’ can be accomplished without a security breach (cf reliability function). This new approach is based on the analogy between system failure and security breach. A number of other analogies to support this view are introduced. We examine this duality critically, and have identified a number of important open questions that need to be answered before this quantitative approach can be taken further. The work described here is therefore somewhat tentative, and one of our major intentions is to invite discussion about the plausibility and feasibility of this new approach
- …