4,759 research outputs found

    New waterboatmen records for Western Canada (Hemiptera: Corixidae)

    Get PDF
    Trichocorixa verticalis (Fieber) is reported for the first time from the mainland of British Columbia and the subspecific assignment is discussed. Based on specimens in the Spencer Entomological Museum, one provincial record and one territorial record are added to the recent checklist of Canadian Hemiptera

    Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    Get PDF
    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples

    Competitive market for multiple firms and economic crisis

    Full text link
    The origin of economic crises is a key problem for economics. We present a model of long-run competitive markets to show that the multiplicity of behaviors in an economic system, over a long time scale, emerge as statistical regularities (perfectly competitive markets obey Bose-Einstein statistics and purely monopolistic-competitive markets obey Boltzmann statistics) and that how interaction among firms influences the evolutionary of competitive markets. It has been widely accepted that perfect competition is most efficient. Our study shows that the perfectly competitive system, as an extreme case of competitive markets, is most efficient but not stable, and gives rise to economic crises as society reaches full employment. In the economic crisis revealed by our model, many firms condense (collapse) into the lowest supply level (zero supply, namely bankruptcy status), in analogy to Bose-Einstein condensation. This curious phenomenon arises because perfect competition (homogeneous competitions) equals symmetric (indistinguishable) investment direction, a fact abhorred by nature. Therefore, we urge the promotion of monopolistic competition (heterogeneous competitions) rather than perfect competition. To provide early warning of economic crises, we introduce a resolving index of investment, which approaches zero in the run-up to an economic crisis. On the other hand, our model discloses, as a profound conclusion, that the technological level for a long-run social or economic system is proportional to the freedom (disorder) of this system; in other words, technology equals the entropy of system. As an application of this new concept, we give a possible answer to the Needham question: "Why was it that despite the immense achievements of traditional China it had been in Europe and not in China that the scientific and industrial revolutions occurred?"Comment: 17 pages; 3 figure

    Artemis Curation: Preparing for Sample Return from the Lunar South Pole

    Get PDF
    Space Policy Directive-1 mandates that the United States will lead the return of humans to the Moon for long-term exploration and utilization, followed by human missions to Mars and other destinations. In addition, the Vice President stated that It is the stated policy of this administration and the United States of America to return American astronauts to the Moon within the next five years, that is, by 2024. These efforts, under the umbrella of the recently formed Artemis Program, include such historic goals as the flight of the first woman to the Moon and the exploration of the lunar south-polar region. Among the top priorities of the Artemis Program is the return of a suite of geologic samples, providing new and significant opportunities for progressing lunar science and human exploration. In particular, successful sample return is necessary for understanding the history of volatiles in the Solar System and the evolution of the Earth-Moon system, fully constraining the hazards of the lunar polar environment for astronauts, and providing the necessary data for constraining the abundance and distribution of resources for in-situ resource utilization (ISRU). Here we summarize the ef-forts of the Astromaterials Acquisition and Curation Office (hereafter referred to as the Curation Office) to ensure the success of Artemis sample return (per NASA Policy Directive (NPD) 7100.10E)

    Overcharging a Black Hole and Cosmic Censorship

    Get PDF
    We show that, contrary to a widespread belief, one can overcharge a near extremal Reissner-Nordstrom black hole by throwing in a charged particle, as long as the backreaction effects may be considered negligible. Furthermore, we find that we can make the particle's classical radius, mass, and charge, as well as the relative size of the backreaction terms arbitrarily small, by adjusting the parameters corresponding to the particle appropriately. This suggests that the question of cosmic censorship is still not wholly resolved even in this simple scenario. We contrast this with attempting to overcharge a black hole with a charged imploding shell, where we find that cosmic censorship is upheld. We also briefly comment on a number of possible extensions.Comment: 26 pages, 3 figures, LaTe

    Notes on Conformal Invisibility Devices

    Get PDF
    As a consequence of the wave nature of light, invisibility devices based on isotropic media cannot be perfect. The principal distortions of invisibility are due to reflections and time delays. Reflections can be made exponentially small for devices that are large in comparison with the wavelength of light. Time delays are unavoidable and will result in wave-front dislocations. This paper considers invisibility devices based on optical conformal mapping. The paper shows that the time delays do not depend on the directions and impact parameters of incident light rays, although the refractive-index profile of any conformal invisibility device is necessarily asymmetric. The distortions of images are thus uniform, which reduces the risk of detection. The paper also shows how the ideas of invisibility devices are connected to the transmutation of force, the stereographic projection and Escheresque tilings of the plane

    Formal Verification of Security Protocol Implementations: A Survey

    Get PDF
    Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages. Recently, some researchers have started investigating techniques that bring automated formal proofs closer to real implementations. This paper surveys these attempts, focusing on approaches that target the application code that implements protocol logic, rather than the libraries that implement cryptography. According to these approaches, libraries are assumed to correctly implement some models. The aim is to derive formal proofs that, under this assumption, give assurance about the application code that implements the protocol logic. The two main approaches of model extraction and code generation are presented, along with the main techniques adopted for each approac

    Classification of Complex Polynomial Vector Fields in One Complex Variable

    Full text link
    A classification of the global structure of monic and centered one-variable complex polynomial vector fields is presented.Comment: 57 pages, 35 figures, submitted to the Journal of Difference Equations and Application

    A phenomenological approach to the simulation of metabolism and proliferation dynamics of large tumour cell populations

    Full text link
    A major goal of modern computational biology is to simulate the collective behaviour of large cell populations starting from the intricate web of molecular interactions occurring at the microscopic level. In this paper we describe a simplified model of cell metabolism, growth and proliferation, suitable for inclusion in a multicell simulator, now under development (Chignola R and Milotti E 2004 Physica A 338 261-6). Nutrients regulate the proliferation dynamics of tumor cells which adapt their behaviour to respond to changes in the biochemical composition of the environment. This modeling of nutrient metabolism and cell cycle at a mesoscopic scale level leads to a continuous flow of information between the two disparate spatiotemporal scales of molecular and cellular dynamics that can be simulated with modern computers and tested experimentally.Comment: 58 pages, 7 figures, 3 tables, pdf onl
    • …
    corecore