1,928 research outputs found
Honor and Destruction: The Conflicted Object in Moral Rights Law
In 1990, the Copyright Act was amended to name visual artists, alone among protected authors, possessors of moral rights, a set of non-economic intellectual property rights originating in nineteenth-century Europe. Although enhancing authors\u27 rights in a user-oriented system was a novel undertaking, it was rendered further anomalous by the statute\u27s designated class, given copyright\u27s longstanding alliance with text. And although moral rights epitomize the legacy of the Romantic author as a cultural trope embedded in the law, American culture offered little to support or explain the apparent privileging of visual artists over other authors. What, if not a legal or cultural disposition toward visual artists, precipitated the enactment of a moral rights statute like the Visual Artists Rights Act of 1990 (\u27\u27VARA )? This Article demonstrates that the answer is less related to authorship concerns than would reasonably be surmised from a doctrine premised on the theory that a creative work embodies the author\u27s honor, personhood, and even soul
Analogical Reasoning
This chapter from our book Legal Writing in Context aims to demystify analogical reasoning for law students
Ex Post Modernism: How the First Amendment Framed Nonrepresentational Art
In Hurley v. Irish-American Gay, Lesbian & Bisexual Group of Boston, the Supreme Court asserted that Jackson Pollockâs paintings are âunquestionably shieldedâ under the First Amendment. Previously, visual artâs main doctrinal residence stood in obscenity lawâs backyard, as a vague definitional tautology: art constitutes speech so long as it is not obscene, and speech is not obscene if it is art. The Hurley Court offered no elaboration as to the âdripâ paintingâs constitutional relevance, but, even as mere illustrative dictum, the declaration received independent attention on two levels. First, the remark reified a longstanding assumption that visual art was âspeech,â offering a specific example outside the realm of obscenity law. Second, the reference to Jackson Pollockâs painting did not merely confer robust protection to art, but definitively extended its embrace to apolitical, nonlinguistic imagery
Effect of Loss on Multiplexed Single-Photon Sources
An on-demand single-photon source is a key requirement for scaling many
optical quantum technologies. A promising approach to realize an on-demand
single-photon source is to multiplex an array of heralded single-photon sources
using an active optical switching network. However, the performance of
multiplexed sources is degraded by photon loss in the optical components and
the non-unit detection efficiency of the heralding detectors. We provide a
theoretical description of a general multiplexed single-photon source with
lossy components and derive expressions for the output probabilities of
single-photon emission and multi-photon contamination. We apply these
expressions to three specific multiplexing source architectures and consider
their tradeoffs in design and performance. To assess the effect of lossy
components on near- and long-term experimental goals, we simulate the
multiplexed sources when used for many-photon state generation under various
amounts of component loss. We find that with a multiplexed source composed of
switches with ~0.2-0.4 dB loss and high efficiency number-resolving detectors,
a single-photon source capable of efficiently producing 20-40 photon states
with low multi-photon contamination is possible, offering the possibility of
unlocking new classes of experiments and technologies.Comment: Journal versio
Lattice energy-momentum tensor with Symanzik improved actions
We define the energy-momentum tensor on lattice for the and
for the nonlinear -model Symanzik tree-improved actions, using Ward
identities or an explicit matching procedure. The resulting operators give the
correct one loop scale anomaly, and in the case of the sigma model they can
have applications in Monte Carlo simulations.Comment: Self extracting archive fil
Bose-Einstein Condensation and Spin Mixtures of Optically Trapped Metastable Helium
We report the realization of a BEC of metastable helium-4 atoms (4He*) in an
all optical potential. Up to 10^5 spin polarized 4He* atoms are condensed in an
optical dipole trap formed from a single, focused, vertically propagating far
off-resonance laser beam. The vertical trap geometry is chosen to best match
the resolution characteristics of a delay-line anode micro-channel plate
detector capable of registering single He* atoms. We also confirm the
instability of certain spin state combinations of 4He* to two-body inelastic
processes, which necessarily affects the scope of future experiments using
optically trapped spin mixtures. In order to better quantify this constraint,
we measure spin state resolved two-body inelastic loss rate coefficients in the
optical trap
GOTCHA Password Hackers!
We introduce GOTCHAs (Generating panOptic Turing Tests to Tell Computers and
Humans Apart) as a way of preventing automated offline dictionary attacks
against user selected passwords. A GOTCHA is a randomized puzzle generation
protocol, which involves interaction between a computer and a human.
Informally, a GOTCHA should satisfy two key properties: (1) The puzzles are
easy for the human to solve. (2) The puzzles are hard for a computer to solve
even if it has the random bits used by the computer to generate the final
puzzle --- unlike a CAPTCHA. Our main theorem demonstrates that GOTCHAs can be
used to mitigate the threat of offline dictionary attacks against passwords by
ensuring that a password cracker must receive constant feedback from a human
being while mounting an attack. Finally, we provide a candidate construction of
GOTCHAs based on Inkblot images. Our construction relies on the usability
assumption that users can recognize the phrases that they originally used to
describe each Inkblot image --- a much weaker usability assumption than
previous password systems based on Inkblots which required users to recall
their phrase exactly. We conduct a user study to evaluate the usability of our
GOTCHA construction. We also generate a GOTCHA challenge where we encourage
artificial intelligence and security researchers to try to crack several
passwords protected with our scheme.Comment: 2013 ACM Workshop on Artificial Intelligence and Security (AISec
Einstein-Weyl structures and Bianchi metrics
We analyse in a systematic way the (non-)compact four dimensional
Einstein-Weyl spaces equipped with a Bianchi metric. We show that Einstein-Weyl
structures with a Class A Bianchi metric have a conformal scalar curvature of
constant sign on the manifold. Moreover, we prove that most of them are
conformally Einstein or conformally K\"ahler ; in the non-exact Einstein-Weyl
case with a Bianchi metric of the type or , we show that the
distance may be taken in a diagonal form and we obtain its explicit
4-parameters expression. This extends our previous analysis, limited to the
diagonal, K\"ahler Bianchi case.Comment: Latex file, 12 pages, a minor modification, accepted for publication
in Class. Quant. Gra
- âŠ