1,293,517 research outputs found
Violation Maxims in Awas Ada Sule Situation Comedy
The objectives of this research were to discover the types of violation maxims, the most dominant violation maxim, and to explain the causes of the most dominant violation maxim in Awas Ada Sule situation comedy. The source of data was situation comedy and taken from internet. The data were the scripts in Awas Ada Sule situation comedy. There were 50 violation maxims in this research. The descriptive qualitative design was used to analyze the data. The results of the analysis showed that all types of maxim were violated; 33 utterances violation maxim of quantity (66%), 7 utterances violation maxim of quality (14%), 7 utterances violation maxim of relation (14%), and 3 utterances violation maxim of manner (6%). The most dominant type of violation maxims was the violation maxim of quantity because the main characters said something without giving enough information or even providing it too much by adding something unimportant to say which was aimed at creating humor, entertaining
CP violation and modular symmetries
We reconsider the origin of CP violation in fundamental theory. Existing
string models of spontaneous CP violation make ambiguous predictions, due to
the arbitrariness of CP transformation and the apparent non-invariance of the
results under duality. We find an unambiguous modular CP invariance condition,
applicable to predictive models of spontaneous CP violation, which circumvents
these problems; it strongly constrains CP violation by heterotic string moduli.
The dilaton is also evaluated as a source of CP violation, but is likely
experimentally excluded. We consider the prospects for explaining CP violation
in strongly-coupled strings and brane worlds.Comment: 6 pages, REVTeX 4b5+amssymb. 2 references added, substantially the
same as published versio
CPT Violation Implies Violation of Lorentz Invariance
An interacting theory that violates CPT invariance necessarily violates
Lorentz invariance. On the other hand, CPT invariance is not sufficient for
out-of-cone Lorentz invariance. Theories that violate CPT by having different
particle and antiparticle masses must be nonlocal.Comment: Minor changes in the published versio
CP Violation
Several pieces of direct and indirect evidence now suggest that the
Kobayashi-Maskawa mechanism plays a distinguished role for CP violation at the
electroweak scale. This talk provides a general overview of CP violation in its
various contexts, emphasizing CP violation in flavour-violating interactions,
such as due to the Kobayashi-Maskawa mechanism. I then review a few recent
theoretical developments relevant to the interpretation of CP violation.Comment: 27 pages, LaTeX; plenary talk presented at the International
Europhysics Conference on High Energy Physics, Budapest, July 2001;
manuscript has some overlap with hep-lat/020101
CP Violation
Three possibilities for the origin of CP violation are discussed: (1) the
Standard Model in which all CP violation is due to one parameter in the CKM
matrix, (2) the superweak model in which all CP violation is due to new physics
and (3) the Standard Model plus new physics. A major goal of B physics is to
distinguish these possibilities. CP violation implies time reversal violation
(TRV) but direct evidence for TRV is difficult to obtain.Comment: 13 pages, to be published in Lecture Notes of TASI-2000, edited by
Jonathan L. Rosner, World Scientific, 200
Bug Hunting with False Negatives Revisited
Safe data abstractions are widely used for verification purposes. Positive verification results can be transferred from the abstract to the concrete system. When a property is violated in the abstract system, one still has to check whether a concrete violation scenario exists. However, even when the violation scenario is not reproducible in the concrete system (a false negative), it may still contain information on possible sources of bugs. Here, we propose a bug hunting framework based on abstract violation scenarios. We first extract a violation pattern from one abstract violation scenario. The violation pattern represents multiple abstract violation scenarios, increasing the chance that a corresponding concrete violation exists. Then, we look for a concrete violation that corresponds to the violation pattern by using constraint solving techniques. Finally, we define the class of counterexamples that we can handle and argue correctness of the proposed framework. Our method combines two formal techniques, model checking and constraint solving. Through an analysis of contracting and precise abstractions, we are able to integrate overapproximation by abstraction with concrete counterexample generation
- …
