30,103 research outputs found

    Who gets the Carrot and Who gets the Stick? Evidence of Gender Disparities in Executive Remuneration

    Get PDF
    This paper offers a new explanation of the gender pay gap in leadership positions by examining the relationship between managerial bonuses and company performance. Drawing on findings of gender studies, agency theory, and the leadership literature, we argue that the gender pay gap is a context-specific phenomenon which results partly from the fact that company performance has a moderating impact on pay inequalities. Employing a matched sample of 192 female and male executive directors of UK listed firms we corroborate the existence of the gender pay disparities in corporate boardrooms. In line with our theoretical predictions, we find that bonuses awarded to men are not only larger than those allocated to women, but also that managerial compensation of male executive directors is much more performance-sensitive than that of female executives. The contribution of attributional and expectancy-related dynamics to these patterns is highlighted in line with previous work on gender stereotypes and implicit leadership theories such as the romance of leadership. Gender differences in risk-taking and confidence are also considered as potential explanations for the observed pay disparities. The implications of organizations’ indifference to women’s performance are examined in relation to issues surrounding the recognition and retention of female talent.executive compensation;gender pay gap;gender stereotypes;implicit leadership theories;corporate performance;romance of leadership

    Experimental approximation of the Jones polynomial with DQC1

    Full text link
    We present experimental results approximating the Jones polynomial using 4 qubits in a liquid state nuclear magnetic resonance quantum information processor. This is the first experimental implementation of a complete problem for the deterministic quantum computation with one quantum bit model of quantum computation, which uses a single qubit accompanied by a register of completely random states. The Jones polynomial is a knot invariant that is important not only to knot theory, but also to statistical mechanics and quantum field theory. The implemented algorithm is a modification of the algorithm developed by Shor and Jordan suitable for implementation in NMR. These experimental results show that for the restricted case of knots whose braid representations have four strands and exactly three crossings, identifying distinct knots is possible 91% of the time.Comment: 5 figures. Version 2 changes: published version, minor errors corrected, slight changes to improve readabilit

    Dilute Bose gases interacting via power-law potentials

    Full text link
    Neutral atoms interact through a van der Waals potential which asymptotically falls off as r^{-6}. In ultracold gases, this interaction can be described to a good approximation by the atom-atom scattering length. However, corrections arise that depend on the characteristic length of the van der Waals potential. We parameterize these corrections by analyzing the energies of two- and few-atom systems under external harmonic confinement, obtained by numerically and analytically solving the Schrodinger equation. We generalize our results to particles interacting through a longer-ranged potential which asymptotically falls off as r^{-4}.Comment: 7 pages, 4 figure

    Energetic proton spectra in the 11 June 1991 solar flare

    Get PDF
    We have studied a subset of the 11 June 1991 solar flare γ-ray data that we believe arise from soft proton or ion spectra. Using data from the COMPTEL instrument on the Compton Observatory we discuss the gamma-ray intensities at 2.223 MeV, 4–7 MeV, and 8–30 MeV in terms of the parent proton spectrum responsible for the emission

    Spatially Resolved Galaxy Star Formation and its Environmental Dependence I

    Full text link
    We use the photometric information contained in individual pixels of 44,964 (0.019<z<0.125 and -23.5<M_r<-20.5) galaxies in the Fourth Data Release (DR4) of the Sloan Digital Sky Survey to investigate the effects of environment on galaxy star formation (SF). We use the pixel-z technique, which combines stellar population synthesis models with photometric redshift template fitting on the scale of individual pixels in galaxy images. Spectral energy distributions are constructed, sampling a wide range of properties such as age, star formation rate (SFR), dust obscuration and metallicity. By summing the SFRs in the pixels, we demonstrate that the distribution of total galaxy SFR shifts to lower values as the local density of surrounding galaxies increases, as found in other studies. The effect is most prominent in the galaxies with the highest star formation, and we see the break in the SFR-density relation at a local galaxy density of ≈0.05\approx 0.05 (Mpc/h)−3^{-3}. Since our method allows us to spatially resolve the SF distribution within galaxies, we can calculate the mean SFR of each galaxy as a function of radius. We find that on average the mean SFR is dominated by SF in the central regions of galaxies, and that the trend for suppression of SFR in high density environments is driven by a reduction in this nuclear SF. We also find that the mean SFR in the outskirts is largely independent of environmental effects. This trend in the mean SFR is shared by galaxies which are highly star forming, while those which are weakly star forming show no statistically significant correlation between their environment and the mean SFR at any radius.Comment: 37 pages, 11 figures. Referee's comments included and matches version accepted for publication in the Astrophysical Journal. For high resolution figures, see http://www.phyast.pitt.edu/~welikala/pixelz/paper1

    Bayesian multiscale deconvolution applied to gamma-ray spectroscopy

    Get PDF
    A common task in gamma-ray astronomy is to extract spectral information, such as model constraints and incident photon spectrum estimates, given the measured energy deposited in a detector and the detector response. This is the classic problem of spectral “deconvolution” or spectral inversion. The methods of forward folding (i.e., parameter fitting) and maximum entropy “deconvolution” (i.e., estimating independent input photon rates for each individual energy bin) have been used successfully for gamma-ray solar flares (e.g., Rank, 1997; Share and Murphy, 1995). These methods have worked well under certain conditions but there are situations were they don’t apply. These are: 1) when no reasonable model (e.g., fewer parameters than data bins) is yet known, for forward folding; 2) when one expects a mixture of broad and narrow features (e.g., solar flares), for the maximum entropy method; and 3) low count rates and low signal-to-noise, for both. Low count rates are a problem because these methods (as they have been implemented) assume Gaussian statistics but Poisson are applicable. Background subtraction techniques often lead to negative count rates. For Poisson data the Maximum Likelihood Estimator (MLE) with a Poisson likelihood is appropriate. Without a regularization term, trying to estimate the “true” individual input photon rates per bin can be an ill-posed problem, even without including both broad and narrow features in the spectrum (i.e., amultiscale approach). One way to implement this regularization is through the use of a suitable Bayesian prior. Nowak and Kolaczyk (1999) have developed a fast, robust, technique using a Bayesian multiscale framework that addresses these problems with added algorithmic advantages. We outline this new approach and demonstrate its use with time resolved solar flare gamma-ray spectroscopy

    Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)

    Full text link
    Security protocols are often found to be flawed after their deployment. We present an approach that aims at the neutralization or mitigation of the attacks to flawed protocols: it avoids the complete dismissal of the interested protocol and allows honest agents to continue to use it until a corrected version is released. Our approach is based on the knowledge of the network topology, which we model as a graph, and on the consequent possibility of creating an interference to an ongoing attack of a Dolev-Yao attacker, by means of non-collaboration actuated by ad-hoc benign attackers that play the role of network guardians. Such guardians, positioned in strategical points of the network, have the task of monitoring the messages in transit and discovering at runtime, through particular types of inference, whether an attack is ongoing, interrupting the run of the protocol in the positive case. We study not only how but also where we can attempt to defend flawed security protocols: we investigate the different network topologies that make security protocol defense feasible and illustrate our approach by means of concrete examples.Comment: 29 page
    • 

    corecore