70 research outputs found

    Electromagnetically induced spatial light modulation

    Full text link
    We theoretically report that, utilizing electromagnetically induced transparency (EIT), the transverse spatial properties of weak probe fields can be fast modulated by using optical patterns (e.g. images) with desired intensity distributions in the coupling fields. Consequently, EIT systems can function as high-speed optically addressed spatial light modulators. To exemplify our proposal, we indicate the generation and manipulation of Laguerre-Gaussian beams based on either phase or amplitude modulation in hot vapor EIT systems.Comment: 8 pages, 3 figure

    Detecting and Correcting Conservativity Principle Violations in Ontology-to-Ontology Mappings

    Full text link
    In order to enable interoperability between ontology-based systems, ontology matching techniques have been proposed. However, when the generated mappings suffer from logical flaws, their usefulness may be diminished. In this paper we present an approximate method to detect and correct violations to the so-called conservativity principle where novel subsumption entailments between named concepts in one of the input ontologies are considered as unwanted. We show that this is indeed the case in our application domain based on the EU Optique project. Additionally, our extensive evaluation conducted with both the Optique use case and the data sets from the Ontology Alignment Evaluation Initiative (OAEI) suggests that our method is both useful and feasible in practice.Copyright 2014 Springer International Publishing Switzerland. The final publication is available at http://link.springer.com/chapter/10.1007%2F978-3-319-11915-1_

    System Description: DLV with Aggregates

    No full text

    Merging heterogeneous security orderings

    No full text

    Gödel and the Origins of Computer Science

    No full text

    Including Diagnostic Information in Configuration Models

    No full text
    This work presents a new formal model for software configuration. The configuration knowledge is stored in a configuration model that is specified using a rule-based..

    P ≠ P

    No full text
    corecore