294 research outputs found

    Comments on the global constraints in light-cone string and membrane theories

    Get PDF
    In the light-cone closed string and toroidal membrane theories, we associate the global constraints with gauge symmetries. In the closed string case, we show that the physical states defined by the BRS charge satisfy the level-matching condition. In the toroidal membrane case, we show that the Faddeev-Popov ghost and anti-ghost corresponding to the global constraints are essentially free even if we adopt any gauge fixing condition for the local constraint. We discuss the quantum double-dimensional reduction of the wrapped supermembrane with the global constraints.Comment: 12 pages, typos corrected, to appear in JHE

    The So-called Person Restriction of Internal State Predicates in Japanese in Contrast with Thai

    Get PDF
    Internal state predicates or ISPs refer to internal states of sentient beings, such as emotions, sensations and thought processes. Japanese ISPs with zero pronouns exhibit the “person restriction ” in that the zero form of their subjects must be first person at the utterance time. This paper examines the person restriction of ISPs in Japanese in contrast with those in Thai, which is a zero pronominal language like Japanese. It is found that the person restriction is applicable to Japanese ISPs but not to Thai ones. This paper argues that the person restriction is not adequate to account for Japanese and Thai ISPs. We propose a new constraint to account for this phenomenon, i.e., the Experiencer-Conceptualizer Identity (ECI) Constraint, which states that “The experiencer of the situation/event must be identical with the conceptualizer of that situation/event. ” It is argued that both languages conventionalize the ECI constraint in ISP expressions but differ in how the ECI constraint is conventionalized.

    Development of A Distributed Print‐Out Monitoring System for Efficient Forensic Investigation

    Get PDF
    If information leakage occurs, an investigator is instructed to specify what documents were leaked and who leaked them. In the present work, a distributed print-out monitoring system—which consists of a virtual printer driver and print-out policy/log management servers—was developed. For easily matching the discovered (i.e., leaked) paper document with the print-out log, the virtual printer driver acquires full-text of printed-out documents by DDI hooking technique to check the content, transforms a spool file to a picture file and creates both a thumbnail and text log for forensic investigation afterwards. The log size is as only about 0.04 times bigger than that for printed-out electronic documents, so the storage size needed for the thumbnail and text log is also small. Keywords: Information leakage, Print-out, Digital forensics, Log, Virtual printer drive

    Wrapped membranes, matrix string theory and an infinite dimensional Lie algebra

    Full text link
    We examine the algebraic structure of the matrix regularization for the wrapped membrane on R10×S1R^{10}\times S^1 in the light-cone gauge. We give a concrete representation for the algebra and obtain the matrix string theory having the boundary conditions for the matrix variables corresponding to the wrapped membrane, which is referred to neither Seiberg and Sen's arguments nor string dualities. We also embed the configuration of the multi-wrapped membrane in matrix string theory.Comment: 19 pages, 1 figure, references added, minor change
    corecore