3,808 research outputs found
Juhl's Formulae for GJMS Operators and Q-Curvatures
Direct proofs are given of Juhl's formulae for GJMS operators and
Q-curvatures starting from the original construction of GJMS.Comment: 18 page
Using Problem Frames and projections to analyze requirements for distributed systems
Subproblems in a problem frames decomposition frequently make use of projections of the complete problem context. One specific use of projec-tions occurs when an eventual implementation will be distributed, in which case a subproblem must interact with (use) the machine in a projection that represents another subproblem. We refer to subproblems used in this way as services, and propose an extension to projections to represent services as a spe-cial connection domain between subproblems. The extension provides signifi-cant benefits: verification of the symmetry of the interfaces, exposure of the machine-to-machine interactions, and prevention of accidental introduction of shared state. The extension’s usefulness is validated using a case study
Authentic Corporate Social Responsibility Based on Authentic Empowerment: An Exemplary Business Leadership Case
Authors Dillon, Back, and Manz examine the underpinnings of genuine or authentic Corporate Social Responsibility (CSR), noting the direct nexus between stakeholder empowerment and the socially-responsible actions of authentic leaders. Such an empowering leadership approach– involving structural, psychological, developmental, and financial components – is particularly exemplified by a family-owned (Back) wine and cheese company (Fairview Trust), situate in South Africa
Naked Price and Pharmaceutical Trade Secret Overreach
Trade secret has drifted from a quiet backwater doctrine to a pervasive force in intellectual property. As always, the risk of distortion is great when a legal arena is developing and expanding rapidly. Nowhere do the theoretical tensions of trade secret law appear in such stark relief as in the modern pharmaceutical debates, where the heart of the theoretical question involves whether pricing is a proper subject for trade secrecy claims.
We aim to bring trade secret into greater harmony with broad concepts that reach across all intellectual property regimes. As with other areas of intellectual property law, trade secret law is not a mere contest of private commercial interests. Rather, it embeds substantial dedication to the public interest, reflecting utilitarian balancing of key societal interests. In this context, we develop the concept of “thin” trade secret, looking to the analogous concepts in other intellectual property regimes. Such approaches embody the recognition that intellectual property rights are not solid monoliths, presenting an impenetrable wall through which no party but the rights holder may pass. Rather, they are brilliantly nimble and subtle systems, deftly threading their way among various societal goals.
This Article offers the potential of anchoring trade secret more firmly to its theoretical base, as well as bringing trade secret closer to the family of other intellectual property regimes. Although squabbling, chaotic, and somewhat dispersed, all members of this time-honored family can learn from each other, sharing their battleworn wisdom with the newest, young upstart
A High-Resolution Hubble Space Telescope Study of Apparent Lyman Continuum Leakers at
We present follow-up observations of 16
candidate LyC emitters in the HS1549+1919 field. With these data, we
obtain high spatial-resolution photometric redshifts of all sub-arcsecond
components of the LyC candidates in order to eliminate foreground contamination
and identify robust candidates for leaking LyC emission. Of the 16 candidates,
we find one object with a robust LyC detection that is not due to foreground
contamination. This object (MD5) resolves into two components; we refer to the
LyC-emitting component as MD5b. MD5b has an observed 1500\AA\ to 900\AA\
flux-density ratio of , compatible with
predictions from stellar population synthesis models. Assuming minimal IGM
absorption, this ratio corresponds to a relative (absolute) escape fraction of
% (%). The stellar
population fit to MD5b indicates an age of Myr, which is in the
youngest 10% of the sample and the youngest third of typical
Lyman break galaxies, and may be a contributing factor to its LyC detection. We
obtain a revised, contamination-free estimate for the comoving specific
ionizing emissivity at , indicating (with large uncertainties) that
star-forming galaxies provide roughly the same contribution as QSOs to the
ionizing background at this redshift. Our results show that foreground
contamination prevents ground-based LyC studies from obtaining a full
understanding of LyC emission from star-forming galaxies. Future
progress in direct LyC searches is contingent upon the elimination of
foreground contaminants through high spatial-resolution observations, and upon
acquisition of sufficiently deep LyC imaging to probe ionizing radiation in
high-redshift galaxies.Comment: 31 pages, 5 tables, 19 figures. Accepted to ApJ. Version with
full-resolution figures is available at:
http://www.astro.ucla.edu/~aes/Mostardi_HST_LyC.pd
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General security requirements frustrate this goal because it is difficult to determine how they affect the functional requirements of the system.
This paper illustrates how representing threats as crosscutting concerns aids in determining the effect of security requirements on the functional requirements. Assets (objects that have value in a system) are first enumerated, and then threats on these assets are listed. The points where assets and functional requirements join are examined to expose vulnerabilities to the threats. Security requirements, represented as constraints, are added to the functional requirements to reduce the scope of the vulnerabilities. These requirements are used during the analysis and specification process, thereby incorporating security concerns into the functional requirements of the system
- …