3,133 research outputs found

    Three Stories and Their Morals

    Get PDF
    Fundamentally, the common law tradition is a collection of stories. Stories also become the law professor\u27s stock in trade. We tell students stories or have them read stories in the form of cases or hypothetical situations and help them discern the morals to the stories-i.e., what the stories mean in the context of business or in their business lives? In a sense, that is what the Socratic Method is all about: analyzing stories in the form of cases and discerning their greater meaning. In this paper I will relate three true stories within the context of just-in-time production management and develop their morals or implications for business and business lawyers

    Legal History Meets the Honors Program

    Get PDF
    In this article, the author discusses the Law and Culture course that he developed to teach in the Butler University Honors Program. The course looks at some landmark periods or events in legal history and explores how those events were the product of their culture, and how they affected their culture. Among the events or periods that the author has looked at in iterations of this course were the survival instinct on display in Regina v. Dudley and Stephens, the Nuremberg trials, the Scopes Monkey Trial, the modern American litigation explosion, and the events surrounding the U.S. Supreme Court decision Kelo v. City of New London. A goal of this course is to address the themes using a number of different types of texts, including court decisions, historical documents, novels, essays, research scholarship, and films. The interdisciplinary nature of this course and the interplay of fiction, nonfiction, and film have caused students to appreciate the importance of law and its development and the interplay of law and culture. They also develop insights on the influence of law and culture on their daily lives

    Enabling Data-Driven Transportation Safety Improvements in Rural Alaska

    Get PDF
    Safety improvements require funding. A clear need must be demonstrated to secure funding. For transportation safety, data, especially data about past crashes, is the usual method of demonstrating need. However, in rural locations, such data is often not available, or is not in a form amenable to use in funding applications. This research aids rural entities, often federally recognized tribes and small villages acquire data needed for funding applications. Two aspects of work product are the development of a traffic counting application for an iPad or similar device, and a review of the data requirements of the major transportation funding agencies. The traffic-counting app, UAF Traffic, demonstrated its ability to count traffic and turning movements for cars and trucks, as well as ATVs, snow machines, pedestrians, bicycles, and dog sleds. The review of the major agencies demonstrated that all the likely funders would accept qualitative data and Road Safety Audits. However, quantitative data, if it was available, was helpful

    A de Finetti representation for finite symmetric quantum states

    Full text link
    Consider a symmetric quantum state on an n-fold product space, that is, the state is invariant under permutations of the n subsystems. We show that, conditioned on the outcomes of an informationally complete measurement applied to a number of subsystems, the state in the remaining subsystems is close to having product form. This immediately generalizes the so-called de Finetti representation to the case of finite symmetric quantum states.Comment: 22 pages, LaTe

    The Nature and Location of Quantum Information

    Get PDF
    Quantum information is defined by applying the concepts of ordinary (Shannon) information theory to a quantum sample space consisting of a single framework or consistent family. A classical analogy for a spin-half particle and other arguments show that the infinite amount of information needed to specify a precise vector in its Hilbert space is not a measure of the information carried by a quantum entity with a dd-dimensional Hilbert space; the latter is, instead, bounded by log d bits (1 bit per qubit). The two bits of information transmitted in dense coding are located not in one but in the correlation between two qubits, consistent with this bound. A quantum channel can be thought of as a "structure" or collection of frameworks, and the physical location of the information in the individual frameworks can be used to identify the location of the channel. Analysis of a quantum circuit used as a model of teleportation shows that the location of the channel depends upon which structure is employed; for ordinary teleportation it is not (contrary to Deutsch and Hayden) present in the two bits resulting from the Bell-basis measurement, but in correlations of these with a distant qubit. In neither teleportation nor dense coding does information travel backwards in time, nor is it transmitted by nonlocal (superluminal) influences. It is (tentatively) proposed that all aspects of quantum information can in principle be understood in terms of the (basically classical) behavior of information in a particular framework, along with the framework dependence of this information.Comment: Latex 29 pages, uses PSTricks for figure

    The Federal Trademark Dilution Act of 1995: Potent Weapon or Uphill Battle?

    Get PDF
    Following a brief discussion of the history of trademark infringement law, the events leading to the FTDA, and an overview of the FTDA, this paper discusses the major causes of the FTDA\u27s ineffectiveness. We will then review the application of the act, discuss its implications on the future of trademark ownership in business, and suggest improvements to the legal application of the act

    Two qubit copying machine for economical quantum eavesdropping

    Get PDF
    We study the mapping which occurs when a single qubit in an arbitrary state interacts with another qubit in a given, fixed state resulting in some unitary transformation on the two qubit system which, in effect, makes two copies of the first qubit. The general problem of the quality of the resulting copies is discussed using a special representation, a generalization of the usual Schmidt decomposition, of an arbitrary two-dimensional subspace of a tensor product of two 2-dimensional Hilbert spaces. We exhibit quantum circuits which can reproduce the results of any two qubit copying machine of this type. A simple stochastic generalization (using a ``classical'' random signal) of the copying machine is also considered. These copying machines provide simple embodiments of previously proposed optimal eavesdropping schemes for the BB84 and B92 quantum cryptography protocols.Comment: Minor changes. 26 pages RevTex including 7 PS figure

    The Effect of Lifting the Blindfold From Civil Juries Charged with Apportioning Damages in Modified Comparative Fault Cases: An Empirical Study of the Alternatives

    Get PDF
    Focuses on a study on the effect of lifting the blindfold from civil juries charged with apportioning damages in modified comparative fault cases. Historical background on comparative fault in the United States; Origin of blindfolding; Comparison of blindfold modified comparative fault verdicts with sunshine verdicts; Conclusions
    corecore