7,804 research outputs found

    The ACIGA Data Analysis programme

    Full text link
    The Data Analysis programme of the Australian Consortium for Interferometric Gravitational Astronomy (ACIGA) was set up in 1998 by the first author to complement the then existing ACIGA programmes working on suspension systems, lasers and optics, and detector configurations. The ACIGA Data Analysis programme continues to contribute significantly in the field; we present an overview of our activities.Comment: 10 pages, 0 figures, accepted, Classical and Quantum Gravity, (Proceedings of the 5th Edoardo Amaldi Conference on Gravitational Waves, Tirrenia, Pisa, Italy, 6-11 July 2003

    What\u27s It Worth to Keep a Secret?

    Get PDF
    This article is the first major study of protection and valuation of trade secrets under federal criminal law. Trade secrecy is more important than ever as an economic complement and substitute for other intellectual property protections, particularly patents. Accordingly, U.S. public policy correctly places a growing emphasis on characterizing the scope of trade secrets, creating incentives for their productive use, and imposing penalties for their theft. Yet amid this complex ecosystem of legal doctrine, economic policy, commercial strategy, and enforcement, there is little research or consensus on how to assign value to trade secrets. One reason for this gap is that intangible assets in general are notoriously difficult to value, and trade secrecy by its opaque nature is ill-suited to the market-signaling mechanisms that offer at least some traction in other forms of valuation. Another reason is that criminal trade secret law is relatively young, and the usual corrective approaches to valuation in civil trade secrecy are not synonymous with the greater distributive concerns of criminal law. To begin to fill this gap, we examine over a decade of trade secret protection and valuation under the U.S. Economic Espionage Act of 1996. From original data on EEA prosecutions, we show that trade secret valuations are lognormally distributed as predicted by Gibrat’s Law, with valuations typically low on the order of 5millionbutreachingashighas5 million but reaching as high as 250 million. There is no notable difference among estimates from various valuation methods, but a difference between high and low estimates on one hand and the sentencing estimates on the other. These findings suggest that the EEA has not been used to its full capacity, a conclusion buttressed by recent Congressional actions to strengthen the EEA

    What's it worth to keep a secret?

    Get PDF
    This article is the first major study of protection and valuation of trade secrets under federal criminal law. Trade secrecy is more important than ever as an economic complement and substitute for other intellectual property protections, particularly patents. Accordingly, U.S. public policy correctly places a growing emphasis on characterizing the scope of trade secrets, creating incentives for their productive use, and imposing penalties for their theft. Yet amid this complex ecosystem of legal doctrine, economic policy, commercial strategy, and enforcement, there is little research or consensus on how to assign value to trade secrets. One reason for this gap is that intangible assets in general are notoriously difficult to value, and trade secrecy by its opaque nature is ill-suited to the market-signaling mechanisms that offer at least some traction in other forms of valuation. Another reason is that criminal trade secret law is relatively young, and the usual corrective approaches to valuation in civil trade secrecy are not synonymous with the greater distributive concerns of criminal law. To begin to fill this gap, we examine over a decade of trade secret protection and valuation under the U.S. Economic Espionage Act of 1996. From original data on EEA prosecutions, we show that trade secret valuations are lognormally distributed as predicted by Gibrat’s Law, with valuations typically low on the order of 5millionbutreachingashighas5 million but reaching as high as 250 million. There is no notable difference among estimates from various valuation methods, but a difference between high and low estimates on one hand and the sentencing estimates on the other. These findings suggest that the EEA has not been used to its full capacity, a conclusion buttressed by recent Congressional actions to strengthen the EEA

    Developments in GRworkbench

    Full text link
    The software tool GRworkbench is an ongoing project in visual, numerical General Relativity at The Australian National University. Recently, GRworkbench has been significantly extended to facilitate numerical experimentation in analytically-defined space-times. The numerical differential geometric engine has been rewritten using functional programming techniques, enabling objects which are normally defined as functions in the formalism of differential geometry and General Relativity to be directly represented as function variables in the C++ code of GRworkbench. The new functional differential geometric engine allows for more accurate and efficient visualisation of objects in space-times and makes new, efficient computational techniques available. Motivated by the desire to investigate a recent scientific claim using GRworkbench, new tools for numerical experimentation have been implemented, allowing for the simulation of complex physical situations.Comment: 14 pages. To appear A. Moylan, S.M. Scott and A.C. Searle, Developments in GRworkbench. Proceedings of the Tenth Marcel Grossmann Meeting on General Relativity, editors M. Novello, S. Perez-Bergliaffa and R. Ruffini. Singapore: World Scientific 200

    Social behaviour of the African turquoise killifish (Nothobranchius furzeri)

    Get PDF
    To date, very little is known about the African turquoise killifish and its social behaviour. It is emerging as a model organism in gerontological research due to its exceptionally short lifespan (approximately 6-8 months), yet its social behaviour is unknown. In this study, I investigate the grouping tendencies of juveniles using different methodologies to determine which best suits the species. Secondly, using the most suitable methodology, I investigate the grouping preferences of both juveniles and adults and observe whether they are capable of familiar and kin recognition. To my knowledge, this is the first study to investigate the grouping preferences and recognition capabilities of the African turquoise killifish. Using 7-week-old juveniles I compared a standard binary choice and Y-maze test arena and determined that the Y-maze was not only a more suitable test arena for my study species, but that at this age juveniles grouped. Using the Y-maze for further testing I investigated differences in juvenile and adult behaviour. I observed that at 5 weeks old juveniles displayed no preference for grouping, kin or familiar individuals. In contrast, adult killifish showed a preference for grouping and males demonstrated a preference for familiar male individuals. Similar to juveniles, adult killifish showed no preference for kin, nor did females show any preference for other familiar females. This work provides a framework for future studies to investigate this species further and increase our knowledge on both the African turquoise killifish and, more generally, on ontogenetic shifts in social behaviour

    Network sensitivity to geographical configuration

    Get PDF
    Gravitational wave astronomy will require the coordinated analysis of data from the global network of gravitational wave observatories. Questions of how to optimally configure the global network arise in this context. We have elsewhere proposed a formalism which is employed here to compare different configurations of the network, using both the coincident network analysis method and the coherent network analysis method. We have constructed a network model to compute a figure-of-merit based on the detection rate for a population of standard-candle binary inspirals. We find that this measure of network quality is very sensitive to the geographic location of component detectors under a coincident network analysis, but comparatively insensitive under a coherent network analysis.Comment: 7 pages, 4 figures, accepted for proceedings of the 4th Edoardo Amaldi conference, incorporated referees' suggestions and corrected diagra
    • …
    corecore