509 research outputs found

    The startup cartography project: measuring and mapping entrepreneurial ecosystems

    Full text link
    This paper presents the Startup Cartography Project, which offers a new set of entrepreneurial ecosystem statistics for the United States from 1988-2016. The SCP combines state-level business registration records with a predictive analytics approach to estimate the probability of “extreme” growth (IPO or high-value acquisition) at or near the time of founding for all newlyregistered firms in a given year. The results indicate the ability of predictive analytics to identify high-potential start-ups at founding (using a variety of different approaches and measures). The SCP then leverages estimates of entrepreneurial quality to develop four entrepreneurial ecosystem statistics, including the rate of start-up formation, average entrepreneurial quality, the quality-adjusted quantity of entrepreneurship, and entrepreneurial ecosystem performance over time. These statistics offer sharp insight into patterns of regional entrepreneurship, their correlation with regional economic growth and the evolution of entrepreneurial ecosystems over time. The SCP includes both a public-access dataset at the state, MSA, county, and zip code level, as well as an interactive map, the U.S. Startup Map, that allows academic and policy users to assess entrepreneurial ecosystems at an arbitrary level of granularity (from the level of states down to individual street addresses).https://www.startupcartography.com/researc

    On the Gold Standard for Security of Universal Steganography

    Get PDF
    While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them. The computational model for public-key steganography was proposed by von Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first universal public-key stegosystem - i.e. one that works on all channels - achieving security against replayable chosen-covertext attacks (SS-RCCA) and asked whether security against non-replayable chosen-covertext attacks (SS-CCA) is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every efficiently sampleable channel, but did not achieve universality. He posed the question whether universality and SS-CCA-security can be achieved simultaneously. No progress on this question has been achieved since more than a decade. In our work we solve Hopper's problem in a somehow complete manner: As our main positive result we design an SS-CCA-secure stegosystem that works for every memoryless channel. On the other hand, we prove that this result is the best possible in the context of universal steganography. We provide a family of 0-memoryless channels - where the already sent documents have only marginal influence on the current distribution - and prove that no SS-CCA-secure steganography for this family exists in the standard non-look-ahead model.Comment: EUROCRYPT 2018, llncs styl

    Direct photon production with effective field theory

    Get PDF
    The production of hard photons in hadronic collisions is studied using Soft-Collinear Effective Theory (SCET). This is the first application of SCET to a physical, observable cross section involving energetic partons in more than two directions. A factorization formula is derived which involves a non-trivial interplay of the angular dependence in the hard and soft functions, both quark and gluon jet functions, and multiple partonic channels. The relevant hard, jet and soft functions are computed to one loop and their anomalous dimensions are determined to three loops. The final resummed inclusive direct photon distribution is valid to next-to-next-to-leading logarithmic order (NNLL), one order beyond previous work. The result is improved by including non-logarithmic terms and photon isolation cuts through matching, and compared to Tevatron data and to fixed order results at the Tevatron and the LHC. The resummed cross section has a significantly smaller theoretical uncertainty than the next-to-leading fixed-order result, particularly at high transverse momentum.Comment: 42 pages, 9 figures; v2: references added, minor changes; v3: typos; v4: typos, corrections in (16), (47), (72

    Dynamics and transport near quantum-critical points

    Full text link
    The physics of non-zero temperature dynamics and transport near quantum-critical points is discussed by a detailed study of the O(N)-symmetric, relativistic, quantum field theory of a N-component scalar field in dd spatial dimensions. A great deal of insight is gained from a simple, exact solution of the long-time dynamics for the N=1 d=1 case: this model describes the critical point of the Ising chain in a transverse field, and the dynamics in all the distinct, limiting, physical regions of its finite temperature phase diagram is obtained. The N=3, d=1 model describes insulating, gapped, spin chain compounds: the exact, low temperature value of the spin diffusivity is computed, and compared with NMR experiments. The N=3, d=2,3 models describe Heisenberg antiferromagnets with collinear N\'{e}el correlations, and experimental realizations of quantum-critical behavior in these systems are discussed. Finally, the N=2, d=2 model describes the superfluid-insulator transition in lattice boson systems: the frequency and temperature dependence of the the conductivity at the quantum-critical coupling is described and implications for experiments in two-dimensional thin films and inversion layers are noted.Comment: Lectures presented at the NATO Advanced Study Institute on "Dynamical properties of unconventional magnetic systems", Geilo, Norway, April 2-12, 1997, edited by A. Skjeltorp and D. Sherrington, Kluwer Academic, to be published. 46 page

    For which side the bell tolls: The laterality of approach-avoidance associative networks

    Get PDF
    The two hemispheres of the brain appear to play different roles in emotion and/or motivation. A great deal of previous research has examined the valence hypothesis (left hemisphere = positive; right = negative), but an increasing body of work has supported the motivational hypothesis (left hemisphere = approach; right = avoidance) as an alternative. The present investigation (N = 117) sought to provide novel support for the latter perspective. Left versus right hemispheres were briefly activated by neutral lateralized auditory primes. Subsequently, participants categorized approach versus avoidance words as quickly and accurately as possible. Performance in the task revealed that approach-related thoughts were more accessible following left-hemispheric activation, whereas avoidance-related thoughts were more accessible following right-hemispheric activation. The present results are the first to examine such lateralized differences in accessible motivational thoughts, which may underlie more “downstream” manifestations of approach and avoidance motivation such as judgments, decision making, and behavior

    Defending the genome from the enemy within:mechanisms of retrotransposon suppression in the mouse germline

    Get PDF
    The viability of any species requires that the genome is kept stable as it is transmitted from generation to generation by the germ cells. One of the challenges to transgenerational genome stability is the potential mutagenic activity of transposable genetic elements, particularly retrotransposons. There are many different types of retrotransposon in mammalian genomes, and these target different points in germline development to amplify and integrate into new genomic locations. Germ cells, and their pluripotent developmental precursors, have evolved a variety of genome defence mechanisms that suppress retrotransposon activity and maintain genome stability across the generations. Here, we review recent advances in understanding how retrotransposon activity is suppressed in the mammalian germline, how genes involved in germline genome defence mechanisms are regulated, and the consequences of mutating these genome defence genes for the developing germline

    Structural basis of nucleosome assembly by the Abo1 AAA+ ATPase histone chaperone

    Get PDF
    The fundamental unit of chromatin, the nucleosome, is an intricate structure that requires histone chaperones for assembly. ATAD2 AAA+???ATPases are a family of histone chaperones that regulate nucleosome density and chromatin dynamics. Here, we demonstrate that the fission yeast ATAD2 homolog, Abo1, deposits histone H3???H4 onto DNA in an ATP-hydrolysis-dependent manner by in vitro reconstitution and single-tethered DNA curtain assays. We present cryo-EM structures of an ATAD2 family ATPase to atomic resolution in three different nucleotide states, revealing unique structural features required for histone loading on DNA, and directly visualize the transitions of Abo1 from an asymmetric spiral (ATP-state) to a symmetric ring (ADP- and apo-states) using high-speed atomic force microscopy (HS-AFM). Furthermore, we find that the acidic pore of ATP-Abo1 binds a peptide substrate which is suggestive of a histone tail. Based on these results, we propose a model whereby Abo1 facilitates H3???H4 loading by utilizing ATP
    corecore