10,658 research outputs found
Admissible semi-linear representations
The category of admissible (in the appropriately modified sense of
representation theory of totally disconnected groups) semi-linear
representations of the automorphism group of an algebraically closed extension
of infinite transcendence degree of the field of algebraic complex numbers is
described
Prosody and scope in German inverse linking constructions
In German, prosody interacts with quantifier scope. We investigate this interaction in inverse linking constructions. We present evidence from elicited production of linguistically naive speakers supporting the following two claims: 1) There are two kinds of inverse linking constructions of which only the prepositional type requires a marked intonation contour for inverse scope. 2) In the prepositional construction, a double focus contour is employed with inverse scope rather that a topic-focus (rise-fall) contour as previously assumed (Krifka 1998)
Configuration spaces and Vassiliev classes in any dimension
The real cohomology of the space of imbeddings of S^1 into R^n, n>3, is
studied by using configuration space integrals. Nontrivial classes are
explicitly constructed. As a by-product, we prove the nontriviality of certain
cycles of imbeddings obtained by blowing up transversal double points in
immersions. These cohomology classes generalize in a nontrivial way the
Vassiliev knot invariants. Other nontrivial classes are constructed by
considering the restriction of classes defined on the corresponding spaces of
immersions.Comment: Published by Algebraic and Geometric Topology at
http://www.maths.warwick.ac.uk/agt/AGTVol2/agt-2-39.abs.htm
Are 21st-century citizens grieving for their loss of privacy?
Although much research exists that examines cognitive events leading up to information disclosure, such as risk-benefit analysis and state-based and trait-based attributes, minimal research exists that examines user responses after a direct or indirect breach of privacy. The present study examines 1,004 consumer responses to two different high-profile privacy breaches using sentiment analysis. Our findings indicate that individuals who experience an actual or surrogate privacy breach exhibit similar emotional responses, and that the pattern of responses resembles well-known reactions to other losses. Specifically, we present evidence that users contemplating evidence of a privacy invasion experience and communicate very similar responses as individuals who have lost loved ones, gone through a divorce or who face impending death because of a terminal illness. These responses parallel behavior associated with the KĂźbler-Rossâs five stages of grief
Integral Invariants of 3-Manifolds
This note describes an invariant of rational homology 3-spheres in terms of
configuration space integrals which in some sense lies between the invariants
of Axelrod and Singer and those of Kontsevich.Comment: 39 pages, AMS-LaTeX, to appear in J. Diff. Geo
Exact results for strongly-correlated fermions in 2+1 dimensions
We derive exact results for a model of strongly-interacting spinless fermions
hopping on a two-dimensional lattice. By exploiting supersymmetry, we find the
number and type of ground states exactly. Exploring various lattices and
limits, we show how the ground states can be frustrated, quantum critical, or
combine frustration with a Wigner crystal. We show that on generic lattices,
the model is in an exotic ``super-frustrated'' state characterized by an
extensive ground-state entropy.Comment: 4 pages, 2 figures. v2: added discussion of "super-frustrated" state;
to appear in PR
The effect of negative polarity items on inference verification
The scalar approach to negative polarity item (NPI) licensing assumes that NPIs are allowable
in contexts in which the introduction of the NPI leads to proposition strengthening (e.g., Kadmon &
Landman 1993, Krifka 1995, Lahiri 1997, Chierchia 2006). A straightforward processing prediction
from such a theory is that NPIâs facilitate inference verification from sets to subsets. Three
experiments are reported that test this proposal. In each experiment, participants evaluated whether
inferences from sets to subsets were valid. Crucially, we manipulated whether the premises
contained an NPI. In Experiment 1, participants completed a metalinguistic reasoning task, and
Experiments 2 and 3 tested reading times using a self-paced reading task. Contrary to expectations,
no facilitation was observed when the NPI was present in the premise compared to when it was
absent. In fact, the NPI significantly slowed down reading times in the inference region. Our results
therefore favor those scalar theories that predict that the NPI is costly to process (Chierchia 2006),
or other, nonscalar theories (Giannakidou 1998, Ladusaw 1992, Postal 2005, Szabolcsi 2004) that
likewise predict NPI processing cost but, unlike Chierchia (2006), expect the magnitude of the
processing cost to vary with the actual pragmatics of the NPI
- âŚ