38,923 research outputs found

    Cut-elimination for the modal Grzegorczyk logic via non-well-founded proofs

    Full text link
    We present a sequent calculus for the modal Grzegorczyk logic Grz allowing non-well-founded proofs and obtain the cut-elimination theorem for it by constructing a continuous cut-elimination mapping acting on these proofs.Comment: WOLLIC'17, 12 pages, 1 appendi

    QCD corrections to forward-backward charge asymmetries in l- l+ j production at hadron colliders

    Get PDF
    The large cross sections for gauge boson production at the Fermilab Tevatron and the CERN Large Hadron Collider (LHC) might give a chance to determine the electroweak parameters with high precision. We calculated two different forward-backward charge asymmetries (A^CS_FB and A^j_FB) of lepton pairs in events with a large transverse momentum jet p p (pbar) -> Z, gamma* + j -> e- e+ j at next-to-leading order (NLO), O(alpha_s) corrections, making use of the Monte Carlo programs MCFM and ALPGEN. These observables could provide a new determination of the weak mixing angle sin^2 theta^lept_eff (M_Z^2) with a statistical precision for each lepton flavour of 10^{-3} (7 x 10^{-3}) at LHC (Tevatron). If b jets are identified, a new asymmetry with respect to the b quark (A^b_FB) can also be measured with a statistical precision of 2 x 10^{-3} (4 x 10^{-2}) at LHC (Tevatron). Finally, we comment on the dependence of our results on various sources of uncertainties and compare, in the case of A^b_FB, the exact result with an approximation that might be more suitable when performing a realistic experimental analysis.Comment: 5 pages, 1 figure, talk presentad by R. Pittau at the International Europhysics Conference on High Energy Physics, July 21st - 27th 2005, Lisbon, Portuga

    Expertise with non-speech 'auditory Greebles' recruits speech-sensitive cortical regions

    Get PDF
    Regions of the human temporal lobe show greater activation for speech than for other sounds. These differences may reflect intrinsically specialized domain-specific adaptations for processing speech, or they may be driven by the significant expertise we have in listening to the speech signal. To test the expertise hypothesis, we used a video-game-based paradigm that tacitly trained listeners to categorize acoustically complex, artificial nonlinguistic sounds. Before and after training, we used functional MRI to measure how expertise with these sounds modulated temporal lobe activation. Participants’ ability to explicitly categorize the nonspeech sounds predicted the change in pretraining to posttraining activation in speech-sensitive regions of the left posterior superior temporal sulcus, suggesting that emergent auditory expertise may help drive this functional regionalization. Thus, seemingly domain-specific patterns of neural activation in higher cortical regions may be driven in part by experience-based restructuring of high-dimensional perceptual space

    Identity of Leu-19 (CD56) leukocyte differentiation antigen and neural cell adhesion molecule.

    Get PDF
    Neural cell adhesion molecule (N-CAM) is a membrane glycoprotein expressed on neural and muscle tissues that is involved in homotypic adhesive interactions. We have demonstrated that N-CAM also is expressed on hematopoietic cells, and is recognized by the anti-Leu-19 mAb. Leu-19 is preferentially expressed on NK cells and T lymphocytes that mediate MHC-unrestricted cytotoxicity, but is also present on some myeloid leukemia cell lines. On NK cells, T cells, the KG1a.5 hematopoietic cell line, and a neuroblastoma cell line, Leu-19 is a approximately 140-kD polypeptide with N-linked carbohydrates and abundant sialic acid residues. Sequential immunoprecipitation and peptide mapping demonstrated that the Leu-19 and N-CAM molecules expressed on leukocyte and neuroblastoma cell lines are similar structures. These findings suggest that the Leu-19 antigen on leukocytes may be involved in cell adhesion, analogous to the function on N-CAM on neural cells

    Full security of quantum key distribution from no-signaling constraints

    Full text link
    We analyze a cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a sufficient amount, and prove its security against eavesdroppers, constrained only by the assumption that any information accessible to them must be compatible with the non-signaling principle. The claim holds with respect to the state-of-the-art security definition used in cryptography, known as universally-composable security. The non-signaling assumption only refers to the statistics of measurement outcomes depending on the choices of measurements; hence security is independent of the internal workings of the devices --- they do not even need to follow the laws of quantum theory. This is relevant for practice as a correct and complete modeling of realistic devices is generally impossible. The techniques developed are general and can be applied to other Bell inequality-based protocols. In particular, we provide a scheme for estimating Bell-inequality violations when the samples are not independent and identically distributed.Comment: 15 pages, 2 figur

    A case study of argumentation at undergraduate level in history

    Get PDF
    This article examines two essays by undergraduate students in the first year of study in History at a university in the UK. It also draws on documentary evidence from the department in question and interviews with the students themselves to paint a picture of the way argumentation operates at this level. While no firm conclusions can be drawn, the evidence suggests a department with a high degree of awareness of the importance of argument and argumentation in studying History; and students who are aware and articulate about the problem facing them in constructing essays in the discipline. Suggestions are made about induction into the epistemological and argumentative demands of undergraduate study

    Multipartite Bound Information exists and can be activated

    Full text link
    We prove the conjectured existence of Bound Information, a classical analog of bound entanglement, in the multipartite scenario. We give examples of tripartite probability distributions from which it is impossible to extract any kind of secret key, even in the asymptotic regime, although they cannot be created by local operations and public communication. Moreover, we show that bound information can be activated: three honest parties can distill a common secret key from different distributions having bound information. Our results demonstrate that quantum information theory can provide useful insight for solving open problems in classical information theory.Comment: four page

    Mn valence instability in La2/3Ca1/3MnO3 thin films

    Full text link
    A Mn valence instability on La2/3Ca1/3MnO3 thin films, grown on LaAlO3 (001)substrates is observed by x-ray absorption spectroscopy at the Mn L-edge and O K-edge. As-grown samples, in situ annealed at 800 C in oxygen, exhibit a Curie temperature well below that of the bulk material. Upon air exposure a reduction of the saturation magnetization, MS, of the films is detected. Simultaneously a Mn2+ spectral signature develops, in addition to the expected Mn3+ and Mn4+ contributions, which increases with time. The similarity of the spectral results obtained by total electron yield and fluorescence yield spectroscopy indicates that the location of the Mn valence anomalies is not confined to a narrow surface region of the film, but can extend throughout the whole thickness of the sample. High temperature annealing at 1000 C in air, immediately after growth, improves the magnetic and transport properties of such films towards the bulk values and the Mn2+ signature in the spectra does not appear. The Mn valence is then stable even to prolonged air exposure. We propose a mechanism for the Mn2+ ions formation and discuss the importance of these observations with respect to previous findings and production of thin films devices.Comment: Double space, 21 pages, 6 figure

    Cuatro notas sobre esquemas de interdependencia y visiones teĂłricas

    Full text link
    • …
    corecore