53,639 research outputs found

    High p_T Triggered Delta-eta,Delta-phi Correlations over a Broad Range in Delta-eta

    Full text link
    The first measurement of pseudorapidity (Delta-eta) and azimuthal angle (Delta-phi) correlations between high transverse momentum charged hadrons (p_T > 2.5 GeV/c) and all associated particles is presented at both short- (small Delta-eta) and long-range (large Delta-eta) over a continuous pseudorapidity acceptance (-4<Delta-eta<2). In these proceedings, the various near- and away-side features of the correlation structure are discussed as a function of centrality in Au+Au collisions measured by PHOBOS at sqrt(s_NN)=200 GeV. In particular, this measurement allows a much more complete determination of the longitudinal extent of the ridge structure, first observed by the STAR collaboration over a limited eta range. In central collisions the ridge persists to at least Delta-eta=4, diminishing in magnitude as collisions become more peripheral until it disappears around Npart=80.Comment: 5 pages, 2 figures, presented at the 20th International Conference on Ultra-Relativistic Nucleus-Nucleus Collisions, "Quark Matter 2008", Jaipur, India, February 4-10, 2008. Full author list included and typo corrected in equation

    Sense-making in visual analytics: processes and challenges

    Get PDF
    Since Visual Analytic systems support human sensemaking it is essential that such systems are designed with characteristics of this process in mind. Drawing on our previous work with lawyers and reports from experienced fraud investigators we describe the nature of the cognitive work to be supported. We describe the cognitive work domain in terms of its data characteristics, and develop a model of the sensemaking as basis for discussing a distinction between ā€˜naturalisticā€™ and ā€˜normativeā€™ sensemaking with a particular emphasis on inference types and the potential for bias. We also report results from a questionnaire-based case study designed to elicit memorable incidents from fraud investigatorsā€™ experiences. Given the legal context the case study exemplifies skills and strategies that are necessary in order to achieve normative and defensible sensemaking under pressure of high volume datasets

    Cultural influences and differences in software process improvement programs

    Full text link
    Implementing software process improvement (SPI) program successfully in a software organization is possibly the most challenging issue that the industry faces today. It is even more challenging to implement an SPI program in software organizations of developing countries like Bangladesh because of the difference in norms and values of the national culture, and organizational culture as compared to those of the developed European and Western countries. This research extends the prior research on SPI in Bangladesh (Wong & Hasan, 2006) and addresses the factors involved in the implementation of SPI programs in software organizations. A study of ten top software companies in Bangladesh was conducted to investigate whether cultural factors hindered the process improvement program and whether this hindrance led to deterioration of the business goals. The results showed that the lack of cultural awareness and lack of skills from the management perspective acted as barriers during the implementation of SPI programs and so affected the business goals sought by these organizations. Copyright 2008 ACM

    A Study of How User Satisfaction and User Dissatisfaction Affect the Success of an Information System

    Get PDF
    Information Technology; Data Transmission systems; Electronic Commerce; Internet; Human-Computer Interaction; Information Storage and Retrieval System

    Direct observation of voids in the vacancy excess region of ion bombarded silicon

    Get PDF
    The results reported in this letter indicate that the spatial separation of the vacancy and interstitial excesses which result from ion bombardment gives rise to stable voids upon annealing at 850ā€ŠĀ°C even for implants where the projected ion range is only of the order of a few thousand ƅngstrom. Such voids have been observed directly by transmission electron microscopy. Furthermore, in cases where both voids and interstitial-based defects are present at different depths, it is found that Au has a strong preference for decorating void surfaces and hence Au can, indeed, be used as a selective detector of open volume defects in Si.One of the authors ~J.W.-L.! acknowledges the Australian Research Council for financial support

    Odontoameloblastoma with extensive chondroid matrix deposition in a guinea pig

    Get PDF
    Odontoameloblastomas (previously incorporated within ameloblastic odontomas) are matrix-producing odontogenic mixed tumors and are closely related in histologic appearance to the 2 other types of matrix-producing odontogenic mixed tumors: odontomas and ameloblastic fibro-odontomas. The presence or absence of intralesional, induced non-neoplastic tissue must be accounted for in the diagnosis. Herein we describe a naturally occurring odontoameloblastoma with extensive chondroid cementum deposition in a guinea pig (Cavia porcellus). Microscopically, the mass featured palisading neoplastic odontogenic epithelium closely apposed to ribbons and rings of a pink dental matrix (dentinoid), alongside extensive sheets and aggregates of chondroid cementum. The final diagnosis was an odontoameloblastoma given the abundance of odontogenic epithelium in association with dentinoid but a paucity of pulp ectomesenchyme. Chondroid cementum is an expected anatomical feature of cavies, and its presence within the odontoameloblastoma was interpreted as a response of the ectomesenchyme of the dental follicle to the described neoplasm. Our case illustrates the inductive capabilities of odontoameloblastomas while highlighting species-specific anatomy that has resulted in a histologic appearance unique to cavies and provides imaging and histologic data to aid diagnosis of these challenging lesions

    Provenance for intelligence analysis using visual analytics.

    Get PDF
    In this paper we discuss various aspects in intelligence analysis relating to provenance and the new requirements resulting from the changed nature of terrorist activities. We propose a three-layer provenance model which relates the scope of provenance to the intelligence workflow and the idea of a ā€™provenance reasoning workspaceā€™ for integrating provenance information into visual analytic tools
    • ā€¦
    corecore