3,808 research outputs found

    Juhl's Formulae for GJMS Operators and Q-Curvatures

    Full text link
    Direct proofs are given of Juhl's formulae for GJMS operators and Q-curvatures starting from the original construction of GJMS.Comment: 18 page

    Using Problem Frames and projections to analyze requirements for distributed systems

    Get PDF
    Subproblems in a problem frames decomposition frequently make use of projections of the complete problem context. One specific use of projec-tions occurs when an eventual implementation will be distributed, in which case a subproblem must interact with (use) the machine in a projection that represents another subproblem. We refer to subproblems used in this way as services, and propose an extension to projections to represent services as a spe-cial connection domain between subproblems. The extension provides signifi-cant benefits: verification of the symmetry of the interfaces, exposure of the machine-to-machine interactions, and prevention of accidental introduction of shared state. The extension’s usefulness is validated using a case study

    Authentic Corporate Social Responsibility Based on Authentic Empowerment: An Exemplary Business Leadership Case

    Get PDF
    Authors Dillon, Back, and Manz examine the underpinnings of genuine or authentic Corporate Social Responsibility (CSR), noting the direct nexus between stakeholder empowerment and the socially-responsible actions of authentic leaders. Such an empowering leadership approach– involving structural, psychological, developmental, and financial components – is particularly exemplified by a family-owned (Back) wine and cheese company (Fairview Trust), situate in South Africa

    Naked Price and Pharmaceutical Trade Secret Overreach

    Get PDF
    Trade secret has drifted from a quiet backwater doctrine to a pervasive force in intellectual property. As always, the risk of distortion is great when a legal arena is developing and expanding rapidly. Nowhere do the theoretical tensions of trade secret law appear in such stark relief as in the modern pharmaceutical debates, where the heart of the theoretical question involves whether pricing is a proper subject for trade secrecy claims. We aim to bring trade secret into greater harmony with broad concepts that reach across all intellectual property regimes. As with other areas of intellectual property law, trade secret law is not a mere contest of private commercial interests. Rather, it embeds substantial dedication to the public interest, reflecting utilitarian balancing of key societal interests. In this context, we develop the concept of “thin” trade secret, looking to the analogous concepts in other intellectual property regimes. Such approaches embody the recognition that intellectual property rights are not solid monoliths, presenting an impenetrable wall through which no party but the rights holder may pass. Rather, they are brilliantly nimble and subtle systems, deftly threading their way among various societal goals. This Article offers the potential of anchoring trade secret more firmly to its theoretical base, as well as bringing trade secret closer to the family of other intellectual property regimes. Although squabbling, chaotic, and somewhat dispersed, all members of this time-honored family can learn from each other, sharing their battleworn wisdom with the newest, young upstart

    A High-Resolution Hubble Space Telescope Study of Apparent Lyman Continuum Leakers at z3z\sim3

    Get PDF
    We present U336V606J125H160U_{336}V_{606}J_{125}H_{160} follow-up HSTHST observations of 16 z3z\sim3 candidate LyC emitters in the HS1549+1919 field. With these data, we obtain high spatial-resolution photometric redshifts of all sub-arcsecond components of the LyC candidates in order to eliminate foreground contamination and identify robust candidates for leaking LyC emission. Of the 16 candidates, we find one object with a robust LyC detection that is not due to foreground contamination. This object (MD5) resolves into two components; we refer to the LyC-emitting component as MD5b. MD5b has an observed 1500\AA\ to 900\AA\ flux-density ratio of (FUV/FLyC)obs=4.0±2.0(F_{UV}/F_{LyC})_{obs}=4.0\pm2.0, compatible with predictions from stellar population synthesis models. Assuming minimal IGM absorption, this ratio corresponds to a relative (absolute) escape fraction of fesc,relMD5b=75100f_{esc,rel}^{MD5b}=75-100% (fesc,absMD5b=1419f_{esc,abs}^{MD5b}=14-19%). The stellar population fit to MD5b indicates an age of 50\lesssim50Myr, which is in the youngest 10% of the HSTHST sample and the youngest third of typical z3z\sim3 Lyman break galaxies, and may be a contributing factor to its LyC detection. We obtain a revised, contamination-free estimate for the comoving specific ionizing emissivity at z=2.85z=2.85, indicating (with large uncertainties) that star-forming galaxies provide roughly the same contribution as QSOs to the ionizing background at this redshift. Our results show that foreground contamination prevents ground-based LyC studies from obtaining a full understanding of LyC emission from z3z\sim3 star-forming galaxies. Future progress in direct LyC searches is contingent upon the elimination of foreground contaminants through high spatial-resolution observations, and upon acquisition of sufficiently deep LyC imaging to probe ionizing radiation in high-redshift galaxies.Comment: 31 pages, 5 tables, 19 figures. Accepted to ApJ. Version with full-resolution figures is available at: http://www.astro.ucla.edu/~aes/Mostardi_HST_LyC.pd

    Deriving security requirements from crosscutting threat descriptions

    Get PDF
    It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General security requirements frustrate this goal because it is difficult to determine how they affect the functional requirements of the system. This paper illustrates how representing threats as crosscutting concerns aids in determining the effect of security requirements on the functional requirements. Assets (objects that have value in a system) are first enumerated, and then threats on these assets are listed. The points where assets and functional requirements join are examined to expose vulnerabilities to the threats. Security requirements, represented as constraints, are added to the functional requirements to reduce the scope of the vulnerabilities. These requirements are used during the analysis and specification process, thereby incorporating security concerns into the functional requirements of the system
    corecore