1,928 research outputs found

    Honor and Destruction: The Conflicted Object in Moral Rights Law

    Get PDF
    In 1990, the Copyright Act was amended to name visual artists, alone among protected authors, possessors of moral rights, a set of non-economic intellectual property rights originating in nineteenth-century Europe. Although enhancing authors\u27 rights in a user-oriented system was a novel undertaking, it was rendered further anomalous by the statute\u27s designated class, given copyright\u27s longstanding alliance with text. And although moral rights epitomize the legacy of the Romantic author as a cultural trope embedded in the law, American culture offered little to support or explain the apparent privileging of visual artists over other authors. What, if not a legal or cultural disposition toward visual artists, precipitated the enactment of a moral rights statute like the Visual Artists Rights Act of 1990 (\u27\u27VARA )? This Article demonstrates that the answer is less related to authorship concerns than would reasonably be surmised from a doctrine premised on the theory that a creative work embodies the author\u27s honor, personhood, and even soul

    Analogical Reasoning

    Get PDF
    This chapter from our book Legal Writing in Context aims to demystify analogical reasoning for law students

    Ex Post Modernism: How the First Amendment Framed Nonrepresentational Art

    Get PDF
    In Hurley v. Irish-American Gay, Lesbian & Bisexual Group of Boston, the Supreme Court asserted that Jackson Pollock’s paintings are “unquestionably shielded” under the First Amendment. Previously, visual art’s main doctrinal residence stood in obscenity law’s backyard, as a vague definitional tautology: art constitutes speech so long as it is not obscene, and speech is not obscene if it is art. The Hurley Court offered no elaboration as to the “drip” painting’s constitutional relevance, but, even as mere illustrative dictum, the declaration received independent attention on two levels. First, the remark reified a longstanding assumption that visual art was “speech,” offering a specific example outside the realm of obscenity law. Second, the reference to Jackson Pollock’s painting did not merely confer robust protection to art, but definitively extended its embrace to apolitical, nonlinguistic imagery

    Effect of Loss on Multiplexed Single-Photon Sources

    Full text link
    An on-demand single-photon source is a key requirement for scaling many optical quantum technologies. A promising approach to realize an on-demand single-photon source is to multiplex an array of heralded single-photon sources using an active optical switching network. However, the performance of multiplexed sources is degraded by photon loss in the optical components and the non-unit detection efficiency of the heralding detectors. We provide a theoretical description of a general multiplexed single-photon source with lossy components and derive expressions for the output probabilities of single-photon emission and multi-photon contamination. We apply these expressions to three specific multiplexing source architectures and consider their tradeoffs in design and performance. To assess the effect of lossy components on near- and long-term experimental goals, we simulate the multiplexed sources when used for many-photon state generation under various amounts of component loss. We find that with a multiplexed source composed of switches with ~0.2-0.4 dB loss and high efficiency number-resolving detectors, a single-photon source capable of efficiently producing 20-40 photon states with low multi-photon contamination is possible, offering the possibility of unlocking new classes of experiments and technologies.Comment: Journal versio

    Lattice energy-momentum tensor with Symanzik improved actions

    Get PDF
    We define the energy-momentum tensor on lattice for the λϕ4\lambda \phi^4 and for the nonlinear σ\sigma-model Symanzik tree-improved actions, using Ward identities or an explicit matching procedure. The resulting operators give the correct one loop scale anomaly, and in the case of the sigma model they can have applications in Monte Carlo simulations.Comment: Self extracting archive fil

    Bose-Einstein Condensation and Spin Mixtures of Optically Trapped Metastable Helium

    Full text link
    We report the realization of a BEC of metastable helium-4 atoms (4He*) in an all optical potential. Up to 10^5 spin polarized 4He* atoms are condensed in an optical dipole trap formed from a single, focused, vertically propagating far off-resonance laser beam. The vertical trap geometry is chosen to best match the resolution characteristics of a delay-line anode micro-channel plate detector capable of registering single He* atoms. We also confirm the instability of certain spin state combinations of 4He* to two-body inelastic processes, which necessarily affects the scope of future experiments using optically trapped spin mixtures. In order to better quantify this constraint, we measure spin state resolved two-body inelastic loss rate coefficients in the optical trap

    GOTCHA Password Hackers!

    Full text link
    We introduce GOTCHAs (Generating panOptic Turing Tests to Tell Computers and Humans Apart) as a way of preventing automated offline dictionary attacks against user selected passwords. A GOTCHA is a randomized puzzle generation protocol, which involves interaction between a computer and a human. Informally, a GOTCHA should satisfy two key properties: (1) The puzzles are easy for the human to solve. (2) The puzzles are hard for a computer to solve even if it has the random bits used by the computer to generate the final puzzle --- unlike a CAPTCHA. Our main theorem demonstrates that GOTCHAs can be used to mitigate the threat of offline dictionary attacks against passwords by ensuring that a password cracker must receive constant feedback from a human being while mounting an attack. Finally, we provide a candidate construction of GOTCHAs based on Inkblot images. Our construction relies on the usability assumption that users can recognize the phrases that they originally used to describe each Inkblot image --- a much weaker usability assumption than previous password systems based on Inkblots which required users to recall their phrase exactly. We conduct a user study to evaluate the usability of our GOTCHA construction. We also generate a GOTCHA challenge where we encourage artificial intelligence and security researchers to try to crack several passwords protected with our scheme.Comment: 2013 ACM Workshop on Artificial Intelligence and Security (AISec

    Einstein-Weyl structures and Bianchi metrics

    Get PDF
    We analyse in a systematic way the (non-)compact four dimensional Einstein-Weyl spaces equipped with a Bianchi metric. We show that Einstein-Weyl structures with a Class A Bianchi metric have a conformal scalar curvature of constant sign on the manifold. Moreover, we prove that most of them are conformally Einstein or conformally K\"ahler ; in the non-exact Einstein-Weyl case with a Bianchi metric of the type VII0,VIIIVII_0, VIII or IXIX, we show that the distance may be taken in a diagonal form and we obtain its explicit 4-parameters expression. This extends our previous analysis, limited to the diagonal, K\"ahler Bianchi IXIX case.Comment: Latex file, 12 pages, a minor modification, accepted for publication in Class. Quant. Gra
    • 

    corecore