1,293,517 research outputs found

    Violation Maxims in Awas Ada Sule Situation Comedy

    Full text link
    The objectives of this research were to discover the types of violation maxims, the most dominant violation maxim, and to explain the causes of the most dominant violation maxim in Awas Ada Sule situation comedy. The source of data was situation comedy and taken from internet. The data were the scripts in Awas Ada Sule situation comedy. There were 50 violation maxims in this research. The descriptive qualitative design was used to analyze the data. The results of the analysis showed that all types of maxim were violated; 33 utterances violation maxim of quantity (66%), 7 utterances violation maxim of quality (14%), 7 utterances violation maxim of relation (14%), and 3 utterances violation maxim of manner (6%). The most dominant type of violation maxims was the violation maxim of quantity because the main characters said something without giving enough information or even providing it too much by adding something unimportant to say which was aimed at creating humor, entertaining

    CP violation and modular symmetries

    Get PDF
    We reconsider the origin of CP violation in fundamental theory. Existing string models of spontaneous CP violation make ambiguous predictions, due to the arbitrariness of CP transformation and the apparent non-invariance of the results under duality. We find an unambiguous modular CP invariance condition, applicable to predictive models of spontaneous CP violation, which circumvents these problems; it strongly constrains CP violation by heterotic string moduli. The dilaton is also evaluated as a source of CP violation, but is likely experimentally excluded. We consider the prospects for explaining CP violation in strongly-coupled strings and brane worlds.Comment: 6 pages, REVTeX 4b5+amssymb. 2 references added, substantially the same as published versio

    CPT Violation Implies Violation of Lorentz Invariance

    Get PDF
    An interacting theory that violates CPT invariance necessarily violates Lorentz invariance. On the other hand, CPT invariance is not sufficient for out-of-cone Lorentz invariance. Theories that violate CPT by having different particle and antiparticle masses must be nonlocal.Comment: Minor changes in the published versio

    CP Violation

    Get PDF
    Several pieces of direct and indirect evidence now suggest that the Kobayashi-Maskawa mechanism plays a distinguished role for CP violation at the electroweak scale. This talk provides a general overview of CP violation in its various contexts, emphasizing CP violation in flavour-violating interactions, such as due to the Kobayashi-Maskawa mechanism. I then review a few recent theoretical developments relevant to the interpretation of CP violation.Comment: 27 pages, LaTeX; plenary talk presented at the International Europhysics Conference on High Energy Physics, Budapest, July 2001; manuscript has some overlap with hep-lat/020101

    CP Violation

    Get PDF
    Three possibilities for the origin of CP violation are discussed: (1) the Standard Model in which all CP violation is due to one parameter in the CKM matrix, (2) the superweak model in which all CP violation is due to new physics and (3) the Standard Model plus new physics. A major goal of B physics is to distinguish these possibilities. CP violation implies time reversal violation (TRV) but direct evidence for TRV is difficult to obtain.Comment: 13 pages, to be published in Lecture Notes of TASI-2000, edited by Jonathan L. Rosner, World Scientific, 200

    Bug Hunting with False Negatives Revisited

    Get PDF
    Safe data abstractions are widely used for verification purposes. Positive verification results can be transferred from the abstract to the concrete system. When a property is violated in the abstract system, one still has to check whether a concrete violation scenario exists. However, even when the violation scenario is not reproducible in the concrete system (a false negative), it may still contain information on possible sources of bugs. Here, we propose a bug hunting framework based on abstract violation scenarios. We first extract a violation pattern from one abstract violation scenario. The violation pattern represents multiple abstract violation scenarios, increasing the chance that a corresponding concrete violation exists. Then, we look for a concrete violation that corresponds to the violation pattern by using constraint solving techniques. Finally, we define the class of counterexamples that we can handle and argue correctness of the proposed framework. Our method combines two formal techniques, model checking and constraint solving. Through an analysis of contracting and precise abstractions, we are able to integrate overapproximation by abstraction with concrete counterexample generation
    corecore