38,923 research outputs found
Cut-elimination for the modal Grzegorczyk logic via non-well-founded proofs
We present a sequent calculus for the modal Grzegorczyk logic Grz allowing
non-well-founded proofs and obtain the cut-elimination theorem for it by
constructing a continuous cut-elimination mapping acting on these proofs.Comment: WOLLIC'17, 12 pages, 1 appendi
QCD corrections to forward-backward charge asymmetries in l- l+ j production at hadron colliders
The large cross sections for gauge boson production at the Fermilab Tevatron
and the CERN Large Hadron Collider (LHC) might give a chance to determine the
electroweak parameters with high precision. We calculated two different
forward-backward charge asymmetries (A^CS_FB and A^j_FB) of lepton pairs in
events with a large transverse momentum jet p p (pbar) -> Z, gamma* + j -> e-
e+ j at next-to-leading order (NLO), O(alpha_s) corrections, making use of the
Monte Carlo programs MCFM and ALPGEN. These observables could provide a new
determination of the weak mixing angle sin^2 theta^lept_eff (M_Z^2) with a
statistical precision for each lepton flavour of 10^{-3} (7 x 10^{-3}) at LHC
(Tevatron). If b jets are identified, a new asymmetry with respect to the b
quark (A^b_FB) can also be measured with a statistical precision of 2 x 10^{-3}
(4 x 10^{-2}) at LHC (Tevatron). Finally, we comment on the dependence of our
results on various sources of uncertainties and compare, in the case of A^b_FB,
the exact result with an approximation that might be more suitable when
performing a realistic experimental analysis.Comment: 5 pages, 1 figure, talk presentad by R. Pittau at the International
Europhysics Conference on High Energy Physics, July 21st - 27th 2005, Lisbon,
Portuga
Expertise with non-speech 'auditory Greebles' recruits speech-sensitive cortical regions
Regions of the human temporal lobe show greater activation for speech than for other sounds. These differences may reflect intrinsically specialized domain-specific adaptations for processing speech, or they may be driven by the significant expertise we have in listening to the speech signal. To test the expertise hypothesis, we used a video-game-based paradigm that tacitly trained listeners to categorize acoustically complex, artificial nonlinguistic sounds. Before and after training, we used functional MRI to
measure how expertise with these sounds modulated temporal lobe activation. Participants’ ability to explicitly categorize the nonspeech sounds predicted the change in pretraining to posttraining activation in speech-sensitive regions of the left posterior superior temporal sulcus, suggesting that emergent auditory expertise may help drive this functional regionalization. Thus, seemingly domain-specific patterns of neural activation in higher cortical regions may be driven in part by experience-based
restructuring of high-dimensional perceptual space
Identity of Leu-19 (CD56) leukocyte differentiation antigen and neural cell adhesion molecule.
Neural cell adhesion molecule (N-CAM) is a membrane glycoprotein expressed on neural and muscle tissues that is involved in homotypic adhesive interactions. We have demonstrated that N-CAM also is expressed on hematopoietic cells, and is recognized by the anti-Leu-19 mAb. Leu-19 is preferentially expressed on NK cells and T lymphocytes that mediate MHC-unrestricted cytotoxicity, but is also present on some myeloid leukemia cell lines. On NK cells, T cells, the KG1a.5 hematopoietic cell line, and a neuroblastoma cell line, Leu-19 is a approximately 140-kD polypeptide with N-linked carbohydrates and abundant sialic acid residues. Sequential immunoprecipitation and peptide mapping demonstrated that the Leu-19 and N-CAM molecules expressed on leukocyte and neuroblastoma cell lines are similar structures. These findings suggest that the Leu-19 antigen on leukocytes may be involved in cell adhesion, analogous to the function on N-CAM on neural cells
Full security of quantum key distribution from no-signaling constraints
We analyze a cryptographic protocol for generating a distributed secret key
from correlations that violate a Bell inequality by a sufficient amount, and
prove its security against eavesdroppers, constrained only by the assumption
that any information accessible to them must be compatible with the
non-signaling principle. The claim holds with respect to the state-of-the-art
security definition used in cryptography, known as universally-composable
security. The non-signaling assumption only refers to the statistics of
measurement outcomes depending on the choices of measurements; hence security
is independent of the internal workings of the devices --- they do not even
need to follow the laws of quantum theory. This is relevant for practice as a
correct and complete modeling of realistic devices is generally impossible. The
techniques developed are general and can be applied to other Bell
inequality-based protocols. In particular, we provide a scheme for estimating
Bell-inequality violations when the samples are not independent and identically
distributed.Comment: 15 pages, 2 figur
A case study of argumentation at undergraduate level in history
This article examines two essays by undergraduate students in the first year of study in History at a university in the UK. It also draws on documentary evidence from the department in question and interviews with the students themselves to paint a picture of the way argumentation operates at this level. While no firm conclusions can be drawn, the evidence suggests a department with a high degree of awareness of the importance of argument and argumentation in studying History; and students who are aware and articulate about the problem facing them in constructing essays in the discipline. Suggestions are made about induction into the epistemological and argumentative demands of undergraduate study
Multipartite Bound Information exists and can be activated
We prove the conjectured existence of Bound Information, a classical analog
of bound entanglement, in the multipartite scenario. We give examples of
tripartite probability distributions from which it is impossible to extract any
kind of secret key, even in the asymptotic regime, although they cannot be
created by local operations and public communication. Moreover, we show that
bound information can be activated: three honest parties can distill a common
secret key from different distributions having bound information. Our results
demonstrate that quantum information theory can provide useful insight for
solving open problems in classical information theory.Comment: four page
Mn valence instability in La2/3Ca1/3MnO3 thin films
A Mn valence instability on La2/3Ca1/3MnO3 thin films, grown on LaAlO3
(001)substrates is observed by x-ray absorption spectroscopy at the Mn L-edge
and O K-edge. As-grown samples, in situ annealed at 800 C in oxygen, exhibit a
Curie temperature well below that of the bulk material. Upon air exposure a
reduction of the saturation magnetization, MS, of the films is detected.
Simultaneously a Mn2+ spectral signature develops, in addition to the expected
Mn3+ and Mn4+ contributions, which increases with time. The similarity of the
spectral results obtained by total electron yield and fluorescence yield
spectroscopy indicates that the location of the Mn valence anomalies is not
confined to a narrow surface region of the film, but can extend throughout the
whole thickness of the sample. High temperature annealing at 1000 C in air,
immediately after growth, improves the magnetic and transport properties of
such films towards the bulk values and the Mn2+ signature in the spectra does
not appear. The Mn valence is then stable even to prolonged air exposure. We
propose a mechanism for the Mn2+ ions formation and discuss the importance of
these observations with respect to previous findings and production of thin
films devices.Comment: Double space, 21 pages, 6 figure
- …